Matching Items (2)
153447-Thumbnail Image.png
Description
The use of blogging tools in the second language classroom has been investigated from a variety of theoretical and methodological perspectives (Alm, 2009; Armstrong & Retterer, 2008; Dippold, 2009; Ducate & Lomicka, 2008; Elola & Oskoz, 2008; Jauregi & Banados, 2008; Lee, 2009; Petersen, Divitini, & Chabert, 2008; Pinkman, 2005;

The use of blogging tools in the second language classroom has been investigated from a variety of theoretical and methodological perspectives (Alm, 2009; Armstrong & Retterer, 2008; Dippold, 2009; Ducate & Lomicka, 2008; Elola & Oskoz, 2008; Jauregi & Banados, 2008; Lee, 2009; Petersen, Divitini, & Chabert, 2008; Pinkman, 2005; Raith, 2009; Soares, 2008; Sun, 2009, 2012; Vurdien, 2011; Yang, 2009) and a growing number of studies examine the use of microblogging tools for language learning (Antenos-Conforti, 2009; Borau, Ullrich, Feng, & Shen, 2009; Lomicka & Lord, 2011; Perifanou, 2009). Grounded in Cultural Historical Activity Theory (Engestrom, 1987), the present study explores the outcomes of a semester-long project based on the Bridging Activities framework (Thorne & Reinhardt, 2008) and implemented in an intermediate hybrid Spanish-language course at a large public university in Arizona, in which students used microblogging and blogging tools to collect digital texts, analyze perspectives of the target culture, and participate as part of an online community of language learners with a broader audience of native speakers. The research questions are: (1) What technology is used by the students, with what frequency and for what purposes in both English and Spanish prior to beginning the project?, (2) What are students' values and attitudes toward using Twitter and Blogger as tools for learning Spanish and how do they change over time through their use in the project during the semester course?, and (3) What tensions emerge in the activity systems of the intermediate Spanish-language students throughout the process of using Twitter and Blogger for the project? What are the underlying reasons for the tensions? How are they resolved? The data was collected using pre-, post-, and periodic surveys, which included Likert and open-ended questions, as well as the participants' microblog and blog posts. The quantitative data was analyzed using descriptive statistics and the qualitative data was analyzed to identify emerging themes following the Constant Comparative Method (Glaser & Strauss, 1967). Finally, three participant outliers were selected as case studies for activity theoretical analysis in order to identify tensions and, through their resolution, evidence of expansive learning.
ContributorsAlvarado, Margaret (Author) / Lafford, Barbara (Thesis advisor) / González, Verónica (Committee member) / Cerron-Palomino, Alvaro (Committee member) / Arizona State University (Publisher)
Created2015
154767-Thumbnail Image.png
Description
Microblogging services such as Twitter, Sina Weibo, and Tumblr have been emerging and deeply embedded into people's daily lives. Used by hundreds of millions of users to connect the people worldwide and share and access information in real-time, the microblogging service has also became the target of malicious attackers due

Microblogging services such as Twitter, Sina Weibo, and Tumblr have been emerging and deeply embedded into people's daily lives. Used by hundreds of millions of users to connect the people worldwide and share and access information in real-time, the microblogging service has also became the target of malicious attackers due to its massive user engagement and structural openness. Although existed, little is still known in the community about new types of vulnerabilities in current microblogging services which could be leveraged by the intelligence-evolving attackers, and more importantly, the corresponding defenses that could prevent both the users and the microblogging service providers from being attacked. This dissertation aims to uncover a number of challenging security and privacy issues in microblogging services and also propose corresponding defenses.

This dissertation makes fivefold contributions. The first part presents the social botnet, a group of collaborative social bots under the control of a single botmaster, demonstrate the effectiveness and advantages of exploiting a social botnet for spam distribution and digital-influence manipulation, and propose the corresponding countermeasures and evaluate their effectiveness. Inspired by Pagerank, the second part describes TrueTop, the first sybil-resilient system to find the top-K influential users in microblogging services with very accurate results and strong resilience to sybil attacks. TrueTop has been implemented to handle millions of nodes and 100 times more edges on commodity computers. The third and fourth part demonstrate that microblogging systems' structural openness and users' carelessness could disclose the later's sensitive information such as home city and age. LocInfer, a novel and lightweight system, is presented to uncover the majority of the users in any metropolitan area; the dissertation also proposes MAIF, a novel machine learning framework that leverages public content and interaction information in microblogging services to infer users' hidden ages. Finally, the dissertation proposes the first privacy-preserving social media publishing framework to let the microblogging service providers publish their data to any third-party without disclosing users' privacy and meanwhile meeting the data's commercial utilities. This dissertation sheds the light on the state-of-the-art security and privacy issues in the microblogging services.
ContributorsZhang, Jinxue (Author) / Zhang, Yanchao (Thesis advisor) / Zhang, Junshan (Committee member) / Ying, Lei (Committee member) / Ahn, Gail-Joon (Committee member) / Arizona State University (Publisher)
Created2016