Matching Items (25)
Filtering by

Clear all filters

152228-Thumbnail Image.png
Description
ABSTRACT This study describes student interactions in the academic social network site Edmodo versus student interactions in Facebook. This qualitative case study relies upon four high school juniors enrolled in Advanced Placement Language and Composition who use Edmodo to complete assignments for their English class. Their experiences were gathered in

ABSTRACT This study describes student interactions in the academic social network site Edmodo versus student interactions in Facebook. This qualitative case study relies upon four high school juniors enrolled in Advanced Placement Language and Composition who use Edmodo to complete assignments for their English class. Their experiences were gathered in an attempt to describe specific experiences in a complex system. Students were selected using an Internet Connectedness Index survey. Using a Virtual Community of Practice framework, students were asked about their experiences in Edmodo. This study concludes that Edmodo and Facebook can be compared in three categories: accessibility, functionality, and environment. Unlike Facebook, which students access regularly, students access Edmodo only to fulfill the teacher's participation expectations for the specific grade they wish to receive. Additionally, students appreciated the convenience of using Edmodo to complete assignments. The functionality of Edmodo is quite similar in layout and appearance to Facebook, yet students were unaware of the media sharing capability, wished for private messaging options, and desired the ability to tag peers for direct comment using the @ sign, all options that are available in Facebook. Students felt the environment in Edmodo could best be characterized as intellectual and academic, which some mentioned might best be used with honors or AP students. A surprising benefit of Edmodo is the lack of social cues enable students to feel free of judgment when composing writing. Some felt this allowed students to know their classmates better and share their true personae free from judgment of classmates. As a result of the case studies of four students, this study seeks to illustrate how students interact in Edmodo versus Facebook to provide a robust image of the academic social network site for teachers seeking to implement educational technology in their classes.
ContributorsCurran-Sejkora, Elizabeth (Author) / Blasingame, James (Thesis advisor) / Nilsen, Alleen (Committee member) / Rodrigo, Rochelle (Committee member) / Turchi, Laura (Committee member) / Arizona State University (Publisher)
Created2013
151950-Thumbnail Image.png
Description
Social media offers a powerful platform for the independent digital content producer community to develop, disperse, and maintain their brands. In terms of information systems research, the broad majority of the work has not examined hedonic consumption on Social Media Sites (SMS). The focus has mostly been on the organizational

Social media offers a powerful platform for the independent digital content producer community to develop, disperse, and maintain their brands. In terms of information systems research, the broad majority of the work has not examined hedonic consumption on Social Media Sites (SMS). The focus has mostly been on the organizational perspectives and utilitarian gains from these services. Unlike through traditional commerce channels, including e-commerce retailers, consumption enhancing hedonic utility is experienced differently in the context of a social media site; consequently, the dynamic of the decision-making process shifts when it is made in a social context. Previous research assumed a limited influence of a small, immediate group of peers. But the rules change when the network of peers expands exponentially. The assertion is that, while there are individual differences in the level of susceptibility to influence coming from others, these are not the most important pieces of the analysis--unlike research centered completely on influence. Rather, the context of the consumption can play an important role in the way social influence factors affect consumer behavior on Social Media Sites. Over the course of three studies, this dissertation will examine factors that influence consumer decision-making and the brand personalities created and interpreted in these SMS. Study one examines the role of different types of peer influence on consumer decision-making on Facebook. Study two observes the impact of different types of producer message posts with the different types of influence on decision-making on Twitter. Study three will conclude this work with an exploratory empirical investigation of actual twitter postings of a set of musicians. These studies contribute to the body of IS literature by evaluating the specific behavioral changes related to consumption in the context of digital social media: (a) the power of social influencers in contrast to personal preferences on SMS, (b) the effect on consumers of producer message types and content on SMS at both the profile level and the individual message level.
ContributorsSopha, Matthew (Author) / Santanam, Raghu T (Thesis advisor) / Goul, Kenneth M (Committee member) / Gu, Bin (Committee member) / Arizona State University (Publisher)
Created2013
152270-Thumbnail Image.png
Description
Numerous studies have examined the attachments individuals have to the places they visit, and that those attachments are formed through experiencing a place in person. This study is unique in that it examines pre-trip place attachment formation via the use of mobile technology and social media. It proposes that media

Numerous studies have examined the attachments individuals have to the places they visit, and that those attachments are formed through experiencing a place in person. This study is unique in that it examines pre-trip place attachment formation via the use of mobile technology and social media. It proposes that media experienced through the use of a participant's smartphone can foster the development of positive emotions, which in turn, facilitates greater mental imagery processing that ultimately influences pre-trip place attachment formation. An experimental design was constructed to examine how text and video on a destination's Facebook page influences an individual's emotions, mental imagery, and subsequently attachment to that destination. Specifically, a 2 (narrative text vs. descriptive text) x 2 (short, fast-paced video vs. long, slow-paced video) between-subjects design was used. A total of 343 usable participant responses were included in the analysis. The data was then analyzed through a two-step process using structural equation modeling. Results revealed no significant influence of textual or video media on emotions although the choice in text has a greater influence on emotions than choice in video. Additionally, emotions had a significant impact on mental imagery. Finally, mental imagery processing had a significant impact on only the social bonding dimension of place attachment. In conclusion, while media had no significant impact on emotions, the effect of previous traveler's retelling of personal accounts on the emotions of potential travelers researching a destination should be examined more closely. Further, the study participants had no prior experience with the destination, yet emotions influenced mental imagery, which also influenced social bonding. Thus further research should be conducted to better understand how potential traveler's image of a destination can be affected by the stories or others.
ContributorsPlunkett, Daniel (Author) / Budruk, Megha (Thesis advisor) / Lee, Woojin (Thesis advisor) / Wetmore, Jameson (Committee member) / Wise, Greg (Committee member) / Arizona State University (Publisher)
Created2013
152693-Thumbnail Image.png
Description
This dissertation research analyzes the vernacular cosmopolitan praxis of Muslim women in transnational cyberspaces related to topical and collective action networks, in an effort to detangle cosmopolitanism from its Western biases and to move away from studies of online Muslim populations based on geographical locations or homogenous networks, linking individuals

This dissertation research analyzes the vernacular cosmopolitan praxis of Muslim women in transnational cyberspaces related to topical and collective action networks, in an effort to detangle cosmopolitanism from its Western biases and to move away from studies of online Muslim populations based on geographical locations or homogenous networks, linking individuals through their religious practices or consumption of religious knowledge. Through highlighting praxes rather than contexts, this dissertation disrupts the East/West binary and challenges stereotypes ascribed to Muslim women. One of the research questions related to the cosmopolitan praxis of Muslim women is the following: in what ways do Muslim women engage with "others" online and contribute to bridging dissimilar people? Findings suggest that the social media use of Muslim women contributes to their subtle resistance against communal norms and, although it can serve as an extension to their voices, some of their voices are more readily mediated than others. I employ a connective content analysis methodology to put various datasets associated with topics and collective actions related to Muslim women into conversation. The methodology not only highlights consistencies in the qualitative themes that were iteratively developed through the analyses of the datasets, but also more tangible connections related to social media users, topics, and content. Consequently, this thesis is as much concerned with recasting Western-oriented conceptualizations of cosmopolitanism as it is with how networks dynamics foster and constrain cosmopolitan praxis because digital networks have the extraordinary capacity to link dissimilar people beyond any other type of medium. One of the research questions related to the methodology is: how do network dynamics facilitate and constrain cosmopolitan praxis? The substantive chapters related to the datasets discuss various forms of cosmopolitan praxis that were identified in the analysis: social media use by Muslim women that expands the connective memory, which could contribute to dispelling stereotypes ascribed to them; activism that addresses universal concerns related to women's rights regardless of context; dialogically devising basic standards of social conduct and gender relations; and expressions of tolerance toward divergent views, including alternative interpretations of Islamic beliefs and practices.
ContributorsRobinson, Rebecca S (Author) / Lim, Merlyna (Thesis advisor) / Ali, Souad T. (Committee member) / Parmentier, Mary Jane C, (Committee member) / Arizona State University (Publisher)
Created2014
153428-Thumbnail Image.png
Description
Social networking services have emerged as an important platform for large-scale information sharing and communication. With the growing popularity of social media, spamming has become rampant in the platforms. Complex network interactions and evolving content present great challenges for social spammer detection. Different from some existing well-studied platforms, distinct characteristics

Social networking services have emerged as an important platform for large-scale information sharing and communication. With the growing popularity of social media, spamming has become rampant in the platforms. Complex network interactions and evolving content present great challenges for social spammer detection. Different from some existing well-studied platforms, distinct characteristics of newly emerged social media data present new challenges for social spammer detection. First, texts in social media are short and potentially linked with each other via user connections. Second, it is observed that abundant contextual information may play an important role in distinguishing social spammers and normal users. Third, not only the content information but also the social connections in social media evolve very fast. Fourth, it is easy to amass vast quantities of unlabeled data in social media, but would be costly to obtain labels, which are essential for many supervised algorithms. To tackle those challenges raise in social media data, I focused on developing effective and efficient machine learning algorithms for social spammer detection.

I provide a novel and systematic study of social spammer detection in the dissertation. By analyzing the properties of social network and content information, I propose a unified framework for social spammer detection by collectively using the two types of information in social media. Motivated by psychological findings in physical world, I investigate whether sentiment analysis can help spammer detection in online social media. In particular, I conduct an exploratory study to analyze the sentiment differences between spammers and normal users; and present a novel method to incorporate sentiment information into social spammer detection framework. Given the rapidly evolving nature, I propose a novel framework to efficiently reflect the effect of newly emerging social spammers. To tackle the problem of lack of labeling data in social media, I study how to incorporate network information into text content modeling, and design strategies to select the most representative and informative instances from social media for labeling. Motivated by publicly available label information from other media platforms, I propose to make use of knowledge learned from cross-media to help spammer detection on social media.
ContributorsHu, Xia, Ph.D (Author) / Liu, Huan (Thesis advisor) / Kambhampati, Subbarao (Committee member) / Ye, Jieping (Committee member) / Faloutsos, Christos (Committee member) / Arizona State University (Publisher)
Created2015
153032-Thumbnail Image.png
Description
Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods

Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods and defense techniques. In this dissertation, I study how to discover and use patterns with uncertainty and randomness to counter security challenges. By extracting and modeling patterns in security events, I am able to handle previously unknown security events with quantified confidence, rather than simply making binary decisions. In particular, I cope with the following four real-world security challenges by modeling and analyzing with pattern-based approaches: 1) How to detect and attribute previously unknown shellcode? I propose instruction sequence abstraction that extracts coarse-grained patterns from an instruction sequence and use Markov chain-based model and support vector machines to detect and attribute shellcode; 2) How to safely mitigate routing attacks in mobile ad hoc networks? I identify routing table change patterns caused by attacks, propose an extended Dempster-Shafer theory to measure the risk of such changes, and use a risk-aware response mechanism to mitigate routing attacks; 3) How to model, understand, and guess human-chosen picture passwords? I analyze collected human-chosen picture passwords, propose selection function that models patterns in password selection, and design two algorithms to optimize password guessing paths; and 4) How to identify influential figures and events in underground social networks? I analyze collected underground social network data, identify user interaction patterns, and propose a suite of measures for systematically discovering and mining adversarial evidence. By solving these four problems, I demonstrate that discovering and using patterns could help deal with challenges in computer security, network security, human-computer interaction security, and social network security.
ContributorsZhao, Ziming (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2014
153038-Thumbnail Image.png
Description
Most new first-year composition (FYC) students already have a great deal of writing experience. Much of this experience comes from writing in digital spaces, such as Facebook, Twitter, Instagram, and Pinterest. This type of writing is often invisible to students: they may not consider it to be writing at all.

Most new first-year composition (FYC) students already have a great deal of writing experience. Much of this experience comes from writing in digital spaces, such as Facebook, Twitter, Instagram, and Pinterest. This type of writing is often invisible to students: they may not consider it to be writing at all. This dissertation seeks to better understand the actual connections between writing in online spaces and writing in FYC, to see the connections students see between these types of writing, and to work toward a theory for making use of those connections in the FYC classroom. The following interconnected articles focus specifically on Facebook--the largest and most ubiquitous social network site (SNS)-- as a means to better understand students' digital literacy practices.

Initial data was gathered through a large-scale survey of FYC students about their Facebook use and how they saw that use as connected to composition and writing. Chapter 1 uses the data to suggest that FYC students are not likely to see a connection between Facebook and FYC but that such a connection exists. The second chapter uses the same data to demonstrate that men and women are approaching Facebook slightly differently and to explore what that may mean for FYC teachers. The third chapter uses 10 one-on-one interviews with FYC students to further explore Facebook literacies. The interviews suggest that the literacy of Facebook is actually quite complex and includes many modes of communication in addition to writing, such as pictures, links, and "likes." The final chapter explores the issue of transfer. While transfer is popular in composition literature, studies tend to focus on forward-reading and not backward-reaching transfer. This final chapter stresses the importance of this type of transfer, especially when looking back at digital literacy knowledge that students have gained through writing online.

While these articles are intended as stand-alone pieces, together they demonstrate the complex nature of literacies on Facebook, how they connection to FYC, and how FYC teachers may use them in their classrooms. They serve as a starting off point for discussions of effective integration of digital literacies into composition pedagogies.
ContributorsShepherd, Ryan P (Author) / Gee, Elisabeth (Thesis advisor) / Matsuda, Paul Kei (Committee member) / Rose, Shirley K. (Committee member) / Daer, Alice (Committee member) / Arizona State University (Publisher)
Created2014
153374-Thumbnail Image.png
Description
Users often join an online social networking (OSN) site, like Facebook, to remain social, by either staying connected with friends or expanding social networks. On an OSN site, users generally share variety of personal information which is often expected to be visible to their friends, but sometimes vulnerable to

Users often join an online social networking (OSN) site, like Facebook, to remain social, by either staying connected with friends or expanding social networks. On an OSN site, users generally share variety of personal information which is often expected to be visible to their friends, but sometimes vulnerable to unwarranted access from others. The recent study suggests that many personal attributes, including religious and political affiliations, sexual orientation, relationship status, age, and gender, are predictable using users' personal data from an OSN site. The majority of users want to remain socially active, and protect their personal data at the same time. This tension leads to a user's vulnerability, allowing privacy attacks which can cause physical and emotional distress to a user, sometimes with dire consequences. For example, stalkers can make use of personal information available on an OSN site to their personal gain. This dissertation aims to systematically study a user vulnerability against such privacy attacks.

A user vulnerability can be managed in three steps: (1) identifying, (2) measuring and (3) reducing a user vulnerability. Researchers have long been identifying vulnerabilities arising from user's personal data, including user names, demographic attributes, lists of friends, wall posts and associated interactions, multimedia data such as photos, audios and videos, and tagging of friends. Hence, this research first proposes a way to measure and reduce a user vulnerability to protect such personal data. This dissertation also proposes an algorithm to minimize a user's vulnerability while maximizing their social utility values.

To address these vulnerability concerns, social networking sites like Facebook usually let their users to adjust their profile settings so as to make some of their data invisible. However, users sometimes interact with others using unprotected posts (e.g., posts from a ``Facebook page\footnote{The term ''Facebook page`` refers to the page which are commonly dedicated for businesses, brands and organizations to share their stories and connect with people.}''). Such interactions help users to become more social and are publicly accessible to everyone. Thus, visibilities of these interactions are beyond the control of their profile settings. I explore such unprotected interactions so that users' are well aware of these new vulnerabilities and adopt measures to mitigate them further. In particular, {\em are users' personal attributes predictable using only the unprotected interactions}? To answer this question, I address a novel problem of predictability of users' personal attributes with unprotected interactions. The extreme sparsity patterns in users' unprotected interactions pose a serious challenge. Therefore, I approach to mitigating the data sparsity challenge by designing a novel attribute prediction framework using only the unprotected interactions. Experimental results on Facebook dataset demonstrates that the proposed framework can predict users' personal attributes.
ContributorsGundecha, Pritam S (Author) / Liu, Huan (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Ye, Jieping (Committee member) / Barbier, Geoffrey (Committee member) / Arizona State University (Publisher)
Created2015
150808-Thumbnail Image.png
Description
The goal of this research was to understand the different kinds of learning that take place in Mod The Sims (MTS), an online Sims gaming community. The study aimed to explore users' experiences and to understand learning practices that are not commonly observed in formal educational settings. To achieve this

The goal of this research was to understand the different kinds of learning that take place in Mod The Sims (MTS), an online Sims gaming community. The study aimed to explore users' experiences and to understand learning practices that are not commonly observed in formal educational settings. To achieve this goal, the researcher conducted a four-year virtual ethnographic study that followed guidelines set forth in Hine (2000). After Hine, the study focused on understanding the complexity of the relationships between technology and social interactions among people, with a particular emphasis on investigating how participants shaped both the culture and structure of the affinity space. The format for the dissertation consists of an introduction, three core chapters that present different sets of findings, and a concluding chapter. Each of the core chapters, which can stand alone as separate studies, applies different theoretical lenses and analytic methods and uses a separate data set. The data corpus includes hundreds of thread posts, member profiles, online interview data obtained through email and personal messaging (PM), numerous screenshots, field notes, and additional artifacts, such as college coursework shared by a participant. Chapter 2 examines thread posts to understand the social support system in MTS and the language learning practices of one member who was a non-English speaker. Chapter 3 analyzes thread posts from administrative staff and users in MTS to identify patterns of interactions, with the goal of ascertaining how users contribute to the ongoing design and redesign of the site. Chapter 4 investigates user-generated tutorials to understand the nature of these instructional texts and how they are adapted to an online context. The final chapter (Chapter 5) presents conclusions about how the analyses overall represent examples of participatory learning practices that expand our understanding of 21st century learning. Finally, the chapter offers theoretical and practical implications, reflections on lessons learned, and suggestions for future research.
ContributorsLee, Yoonhee Naseef (Author) / Hayes, Elisabeth (Thesis advisor) / Gee, James (Committee member) / Nelson, Brian (Committee member) / Arizona State University (Publisher)
Created2012
151152-Thumbnail Image.png
Description
Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control

Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control policies are often error-prone due to the lack of effective analysis mechanisms and tools. In this dissertation, I present an Assurance Management Framework (AMF) that is designed to cope with various assurance management requirements from both access control system development and policy-based computing. On one hand, the AMF framework facilitates comprehensive analysis and thorough realization of formal access control models in secure system development. I demonstrate how this method can be applied to build role-based access control systems by adopting the NIST/ANSI RBAC standard as an underlying security model. On the other hand, the AMF framework ensures the correctness of access control policies in policy-based computing through automated reasoning techniques and anomaly management mechanisms. A systematic method is presented to formulate XACML in Answer Set Programming (ASP) that allows users to leverage off-the-shelf ASP solvers for a variety of analysis services. In addition, I introduce a novel anomaly management mechanism, along with a grid-based visualization approach, which enables systematic and effective detection and resolution of policy anomalies. I further evaluate the AMF framework through modeling and analyzing multiparty access control in Online Social Networks (OSNs). A MultiParty Access Control (MPAC) model is formulated to capture the essence of multiparty authorization requirements in OSNs. In particular, I show how AMF can be applied to OSNs for identifying and resolving privacy conflicts, and representing and reasoning about MPAC model and policy. To demonstrate the feasibility of the proposed methodology, a suite of proof-of-concept prototype systems is implemented as well.
ContributorsHu, Hongxin (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Dasgupta, Partha (Committee member) / Ye, Nong (Committee member) / Arizona State University (Publisher)
Created2012