A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Shadows of Reading: Reasons for the Bad Results of Bulgarians in PISA studies
2016
European Journal of Contemporary Education
and video-citing, for e-mail correspondence and electronic exchange of documents. 1.3. ...
users. ...
doi:10.13187/ejced.2016.17.368
fatcat:lgrdrxqwdvhf3ehj6eova3b4fu
Text Mining in Big Data Analytics
2020
Big Data and Cognitive Computing
In accordance with this, more than 200 academic journal articles on the subject are included and discussed in this review; the state-of-the-art text mining approaches and techniques used for analyzing ...
Text mining in big data analytics is emerging as a powerful tool for harnessing the power of unstructured textual data by analyzing it to extract new knowledge and to identify significant patterns and ...
Two general approaches are adopted for mail filtering: knowledge engineering (KE) and machine learning (ML) [127] . ...
doi:10.3390/bdcc4010001
fatcat:6fvmne7f2fbovjp4na5hl2tmv4
Some Reflections on Manuel Castells' Book "Communication Power"
1970
tripleC: Communication, Capitalism & Critique
Manuel Castells deals in his book Communication Power with the question where power lies in the network society. ...
In this paper, I discuss important issues that this book addresses, and connect them, where possible, to my own works and reflections. ...
on YouTube, a blog with RSS links to a number of web sources, or a message to a massive e-mail list. ...
doi:10.31269/triplec.v7i1.136
fatcat:53kzcfg7nfhu7ixh7pdpgquvpy
Some Reflections on Manuel Castells' Book "Communication Power"
1970
tripleC: Communication, Capitalism & Critique
Manuel Castells deals in his book Communication Power with the question where power lies in the network society. ...
In this paper, I discuss important issues that this book addresses, and connect them, where possible, to my own works and reflections. ...
on YouTube, a blog with RSS links to a number of web sources, or a message to a massive e-mail list. ...
doi:10.31269/vol7iss1pp94-108
fatcat:3vblipnxjrah3pdgmjt7cmtbma
Psychosocial Features for Hate Speech Detection in Code-switched Texts
2021
International Journal of Information Technology and Computer Science
Results obtained from frequency-based models using the PDC feature on the dataset comprising of tweets generated during the 2012 and 2017 presidential elections in Kenya indicate an f-score of 83% (precision ...
The study is significant in that it publicly shares a unique codeswitched dataset for hate speech that is valuable for comparative studies. ...
Besides, a pipeline was used to seamlessly combine these parameters with the vectorizer parameters each time the
algorithm was run.
E. ...
doi:10.5815/ijitcs.2021.06.03
fatcat:zfpl6tc3ardzxambqazyqo2z3i
Application-Centered Internet Analysis
1999
Virginia law review
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. ...
We need, I think, to focus on the user, not on the network, and that means legal analysis that begins with the application. What's the difference? ...
For an individual user-by this I mean someone using the Internet for herself-the utility of filters is in selecting desired content and avoiding unwanted content. ...
doi:10.2307/1073968
fatcat:qnuzppr2k5fxbbnhf5zcpoj65i
TRUSTWORTHINESS AND TRUTH: THE EPISTEMIC PITFALLS OF INTERNET ACCOUNTABILITY
2013
Episteme: A journal of individual and social epistemology
AbstractSince anonymous agents can spread misinformation with impunity, many people advocate for greater accountability for internet speech. ...
Drawing on social psychology and behavioral economics, I suggest alternative mechanisms for increasing the trustworthiness of internet communication. ...
Given the ease with which many can post permanent and widelyaccessible online messages with impunity, it is unsurprising that many argue for greater accountability for internet speech. ...
doi:10.1017/epi.2013.43
fatcat:4lqhdyl4urh2xkx3cn7sdww3k4
The global village: online cross‐cultural communication and HRM
2007
Cross Cultural Management An International Journal
Thus, we contend that the combined use of IC HRM practices would facilitate the most effective message, format and channels of communication that both cultures can understand in an objective manner, while ...
A key tenet of this paper, therefore, is that diversity oriented HRM is crucial for culturally diverse employees to perceive that their values and norms are supported and appreciated within the cross-cultural ...
For example, Malaysia unsuccessfully tried to filter the content of Internet service providers (Abbott, 2001) . ...
doi:10.1108/13527600710718804
fatcat:m5nqfa73wfdqrnsahnha7jc2ie
Review: A Cognitive-Affective Model of Organizational Communication for Designing IT
2001
MIS Quarterly
For more details see communication to a view that assesses the balance between medium and message form. ...
of the message itself? ...
I'm indebted to Rick Watson for his insightful guidance and continued encouragement. ...
doi:10.2307/3250931
fatcat:mxm5pcngdzd3jfwh5ebd7alfhq
Experience marketing as a modern promotion strategy for hotels chains
Маркетинг опыта как современная стратегия продвижения гостиничных сетей
2019
Маркетинг и маркетинговые исследования
Маркетинг опыта как современная стратегия продвижения гостиничных сетей
Acknowledgements We are fortunate to have shared our journey of understanding how best to use digital marketing with thousands of students and many marketing professionals and we thank you for sharing ...
We will start by reviewing the moves to e-business and social business that are needed to transform organizations to enable them to make wider use of digital and social technologies. ...
Then we have e-nasties such as cyber stalkers, hate mail, fake mail, mail bombs, cults and paedophiles lurking in children's chat rooms. Many of these fears are based on reality. ...
doi:10.36627/2074-5095-2019-3-3-186-196
fatcat:35jotkp3zrhmza7e5t4vqgiglq
Ideological Dimension of the Network Society and the Ideology of Global Humanism
2015
Mediterranean Journal of Social Sciences
An example can be the "artificial intelligence", a variety of intelligent, self-learning search engines in the Internet space, the bot-programs designed for both sending messages and for two-way communication ...
Network society challenges stereotypes of the economic and political system. ...
In a network society, group activity is not based on institutional ties, but on self-organization. Groups are formed spontaneously through social networks, e-mail, online donations, and flash mobs. ...
doi:10.5901/mjss.2015.v6n3s3p39
fatcat:mlrucejsuvcjnapswzelmygz4e
D4.1 Interface Mockups (I, II, III, IV, V)
2019
Zenodo
The process towards each release combines different methods including design workshops, solutions prototyping and field studies. ...
This report provides a detailed description of these methods as activities with their inputs, objectives, participants and outputs, and how they informed the releases iteratively and incrementally. ...
What is wrong with social theory?. American sociological review, 19(1), 3-10. • Create real content for the mockups based on D2.1. Examples of these mockups are shown below in Figure 6 . ...
doi:10.5281/zenodo.3442448
fatcat:v6vanynbkzfvpdrs2lx4wpxham
Evaluation of Web Pages as a Tool in Public Relations
2004
Issues in Informing Science and Information Technology
The newly developed model CUT (Content, Usability, Technology) for evaluation of web pages is presented. The model includes evaluation of web pages from different perspectives. ...
The paper deals with the question, how the efficiency and successfulness of web pages in information dissemination can be measured. ...
This content (e. g. user opinions) can be seen by other users as more trustworthy. ...
doi:10.28945/777
fatcat:2gnk2yyo2rgp5mesja5qcqrw7u
Mate Selection in Cyberspace: The Intersection of Race, Gender, and Education
2013
American Journal of Sociology
White men and white women with a college degree are more likely to contact and to respond to white daters without a college degree than they are to black daters with a college degree. ...
They find that racial homophily dominates mate-searching behavior for both men and women. A racial hierarchy emerges in the reciprocating process. ...
Direct correspondence to Ken-Hou Lin, Department of Sociology, University of Texas, Austin, Texas 78712. E-mail: lin@austin.utexas.edu ...
doi:10.1086/673129
fatcat:tg2ag7k3lfbqpnwlhgoydhikce
Habermas@Discourse. Net: Toward a Critical Theory of Cyberspace
2003
Harvard Law Review
Slashdot is a leading example of a community-based (and community-creating) discussion forum with collaborative filtering. ...
Indeed, the process of ignoring people can be automated with mail filtering software (sometimes called a "bozo filter") that prevents mail from which they would all agree both to enact as autonomous legislators ...
Board of Directors, half of whom would be selected for their expertise by corporatist-style elections among defined groups of designers and users of the DNS. ...
doi:10.2307/1342583
fatcat:7r5574mkvzfebgzadyd5ctogly
« Previous
Showing results 1 — 15 out of 1,773 results