Filters








1,773 Hits in 5.5 sec

The Shadows of Reading: Reasons for the Bad Results of Bulgarians in PISA studies

2016 European Journal of Contemporary Education  
and video-citing, for e-mail correspondence and electronic exchange of documents. 1.3.  ...  users.  ... 
doi:10.13187/ejced.2016.17.368 fatcat:lgrdrxqwdvhf3ehj6eova3b4fu

Text Mining in Big Data Analytics

Hossein Hassani, Christina Beneki, Stephan Unger, Maedeh Taj Mazinani, Mohammad Reza Yeganegi
2020 Big Data and Cognitive Computing  
In accordance with this, more than 200 academic journal articles on the subject are included and discussed in this review; the state-of-the-art text mining approaches and techniques used for analyzing  ...  Text mining in big data analytics is emerging as a powerful tool for harnessing the power of unstructured textual data by analyzing it to extract new knowledge and to identify significant patterns and  ...  Two general approaches are adopted for mail filtering: knowledge engineering (KE) and machine learning (ML) [127] .  ... 
doi:10.3390/bdcc4010001 fatcat:6fvmne7f2fbovjp4na5hl2tmv4

Some Reflections on Manuel Castells' Book "Communication Power"

Christian Fuchs
1970 tripleC: Communication, Capitalism & Critique  
Manuel Castells deals in his book Communication Power with the question where power lies in the network society.  ...  In this paper, I discuss important issues that this book addresses, and connect them, where possible, to my own works and reflections.  ...  on YouTube, a blog with RSS links to a number of web sources, or a message to a massive e-mail list.  ... 
doi:10.31269/triplec.v7i1.136 fatcat:53kzcfg7nfhu7ixh7pdpgquvpy

Some Reflections on Manuel Castells' Book "Communication Power"

Christian Fuchs
1970 tripleC: Communication, Capitalism & Critique  
Manuel Castells deals in his book Communication Power with the question where power lies in the network society.  ...  In this paper, I discuss important issues that this book addresses, and connect them, where possible, to my own works and reflections.  ...  on YouTube, a blog with RSS links to a number of web sources, or a message to a massive e-mail list.  ... 
doi:10.31269/vol7iss1pp94-108 fatcat:3vblipnxjrah3pdgmjt7cmtbma

Psychosocial Features for Hate Speech Detection in Code-switched Texts

Edward Ombui, School of Science and Technology, Africa Nazarene University, Nairobi, Kenya, Lawrence Muchemi, Peter Wagacha
2021 International Journal of Information Technology and Computer Science  
Results obtained from frequency-based models using the PDC feature on the dataset comprising of tweets generated during the 2012 and 2017 presidential elections in Kenya indicate an f-score of 83% (precision  ...  The study is significant in that it publicly shares a unique codeswitched dataset for hate speech that is valuable for comparative studies.  ...  Besides, a pipeline was used to seamlessly combine these parameters with the vectorizer parameters each time the algorithm was run. E.  ... 
doi:10.5815/ijitcs.2021.06.03 fatcat:zfpl6tc3ardzxambqazyqo2z3i

Application-Centered Internet Analysis

Timothy Wu
1999 Virginia law review  
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive.  ...  We need, I think, to focus on the user, not on the network, and that means legal analysis that begins with the application. What's the difference?  ...  For an individual user-by this I mean someone using the Internet for herself-the utility of filters is in selecting desired content and avoiding unwanted content.  ... 
doi:10.2307/1073968 fatcat:qnuzppr2k5fxbbnhf5zcpoj65i

TRUSTWORTHINESS AND TRUTH: THE EPISTEMIC PITFALLS OF INTERNET ACCOUNTABILITY

Karen Frost-Arnold
2013 Episteme: A journal of individual and social epistemology  
AbstractSince anonymous agents can spread misinformation with impunity, many people advocate for greater accountability for internet speech.  ...  Drawing on social psychology and behavioral economics, I suggest alternative mechanisms for increasing the trustworthiness of internet communication.  ...  Given the ease with which many can post permanent and widelyaccessible online messages with impunity, it is unsurprising that many argue for greater accountability for internet speech.  ... 
doi:10.1017/epi.2013.43 fatcat:4lqhdyl4urh2xkx3cn7sdww3k4

The global village: online cross‐cultural communication and HRM

Yuka Fujimoto, Nasya Bahfen, Jan Fermelis, Charmine E.J. Härtel
2007 Cross Cultural Management An International Journal  
Thus, we contend that the combined use of IC HRM practices would facilitate the most effective message, format and channels of communication that both cultures can understand in an objective manner, while  ...  A key tenet of this paper, therefore, is that diversity oriented HRM is crucial for culturally diverse employees to perceive that their values and norms are supported and appreciated within the cross-cultural  ...  For example, Malaysia unsuccessfully tried to filter the content of Internet service providers (Abbott, 2001) .  ... 
doi:10.1108/13527600710718804 fatcat:m5nqfa73wfdqrnsahnha7jc2ie

Review: A Cognitive-Affective Model of Organizational Communication for Designing IT

Dov Te'eni
2001 MIS Quarterly  
For more details see communication to a view that assesses the balance between medium and message form.  ...  of the message itself?  ...  I'm indebted to Rick Watson for his insightful guidance and continued encouragement.  ... 
doi:10.2307/3250931 fatcat:mxm5pcngdzd3jfwh5ebd7alfhq

Experience marketing as a modern promotion strategy for hotels chains
Маркетинг опыта как современная стратегия продвижения гостиничных сетей

Анна Чуракова
2019 Маркетинг и маркетинговые исследования  
Acknowledgements We are fortunate to have shared our journey of understanding how best to use digital marketing with thousands of students and many marketing professionals and we thank you for sharing  ...  We will start by reviewing the moves to e-business and social business that are needed to transform organizations to enable them to make wider use of digital and social technologies.  ...  Then we have e-nasties such as cyber stalkers, hate mail, fake mail, mail bombs, cults and paedophiles lurking in children's chat rooms. Many of these fears are based on reality.  ... 
doi:10.36627/2074-5095-2019-3-3-186-196 fatcat:35jotkp3zrhmza7e5t4vqgiglq

Ideological Dimension of the Network Society and the Ideology of Global Humanism

Anna Sergeevna Frolova, Yury Grigorievich Volkov
2015 Mediterranean Journal of Social Sciences  
An example can be the "artificial intelligence", a variety of intelligent, self-learning search engines in the Internet space, the bot-programs designed for both sending messages and for two-way communication  ...  Network society challenges stereotypes of the economic and political system.  ...  In a network society, group activity is not based on institutional ties, but on self-organization. Groups are formed spontaneously through social networks, e-mail, online donations, and flash mobs.  ... 
doi:10.5901/mjss.2015.v6n3s3p39 fatcat:mlrucejsuvcjnapswzelmygz4e

D4.1 Interface Mockups (I, II, III, IV, V)

Chiara Bassetti, Antonella De Angeli, Mladjan Jovanovic, Peter Lyle, Gianluca Monaco, Daniel Rough, Maurizio Teli
2019 Zenodo  
The process towards each release combines different methods including design workshops, solutions prototyping and field studies.  ...  This report provides a detailed description of these methods as activities with their inputs, objectives, participants and outputs, and how they informed the releases iteratively and incrementally.  ...  What is wrong with social theory?. American sociological review, 19(1), 3-10. • Create real content for the mockups based on D2.1. Examples of these mockups are shown below in Figure 6 .  ... 
doi:10.5281/zenodo.3442448 fatcat:v6vanynbkzfvpdrs2lx4wpxham

Evaluation of Web Pages as a Tool in Public Relations

Peter Trkman, Jaka Lindic
2004 Issues in Informing Science and Information Technology  
The newly developed model CUT (Content, Usability, Technology) for evaluation of web pages is presented. The model includes evaluation of web pages from different perspectives.  ...  The paper deals with the question, how the efficiency and successfulness of web pages in information dissemination can be measured.  ...  This content (e. g. user opinions) can be seen by other users as more trustworthy.  ... 
doi:10.28945/777 fatcat:2gnk2yyo2rgp5mesja5qcqrw7u

Mate Selection in Cyberspace: The Intersection of Race, Gender, and Education

Ken-Hou Lin, Jennifer Lundquist
2013 American Journal of Sociology  
White men and white women with a college degree are more likely to contact and to respond to white daters without a college degree than they are to black daters with a college degree.  ...  They find that racial homophily dominates mate-searching behavior for both men and women. A racial hierarchy emerges in the reciprocating process.  ...  Direct correspondence to Ken-Hou Lin, Department of Sociology, University of Texas, Austin, Texas 78712. E-mail: lin@austin.utexas.edu  ... 
doi:10.1086/673129 fatcat:tg2ag7k3lfbqpnwlhgoydhikce

Habermas@Discourse. Net: Toward a Critical Theory of Cyberspace

A. Michael Froomkin
2003 Harvard Law Review  
Slashdot is a leading example of a community-based (and community-creating) discussion forum with collaborative filtering.  ...  Indeed, the process of ignoring people can be automated with mail filtering software (sometimes called a "bozo filter") that prevents mail from which they would all agree both to enact as autonomous legislators  ...  Board of Directors, half of whom would be selected for their expertise by corporatist-style elections among defined groups of designers and users of the DNS.  ... 
doi:10.2307/1342583 fatcat:7r5574mkvzfebgzadyd5ctogly
« Previous Showing results 1 — 15 out of 1,773 results