The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's competitive marketplace with increasing media clutter, the task of brand building has become more important and challenging than ever. Employing a Brand Community appears to be an effective approach to build and maintain such consumer-brand relationships. Also the advent of the Internet has made it possible to establish spontaneous, non-geographically bound brand communities in cyberspace...
The Health Care Network (HCN ) related information of a country is one of the most influential fields of data sharing and integrating with disparate data sources of physical world and compatible health care organizations on the exponentially growing World Wide Web (WWW ) for improving and maintaining health related services of mass people. Although these accessible HCN related unstructured or semi-structured...
We propose a novel approach to analyze how a popular video is propagated in the cyberspace, to identify if it originated from a certain sharing-site, and to identify how it reached the current popularity in its propagation. In addition, we also estimate their influences across different websites outside the major hosting website. Web video is gaining significance due to its rich and eye-ball grabbing...
While cyberspace knows no borders, there are commercial, regional, national and international interests that seek to assure the trust, availability and dependability of cyberspace for their specific needs. Cyber Security Operations is the term used to describe activities that span (a) securing a portion of cyberspace, (b) monitoring and analyzing threats and incidents, and (c) responsively and proactively...
In this paper we describe a model for evaluating and investigating holistic identities across both the cyber- and natural-worlds. The model is taxonomy-agnostic and helps guide analysts through the creation of a rich super identity whilst also being flexible enough for users to deploy their intuition and experience. Super identities are created by iterative stages of enrichment and relaxation, which...
As a major online interactive platform, microblogs have accumulated numerous data about people's interactive behaviors, which have attracted many researchers to study these data. However, the existing studies mainly focus on the community structure detection or information propagation from the conventional perspective of social network analysis. Few studies have investigated the relationships between...
We present here preliminary findings from our ongoing study of situation awareness in cybersecurity (cyber-SA). Analysis of data collected from the field has produced two preliminary findings. One, cyber-SA is distributed across individuals, technological agents, and functional domains. Two, an absence of effective boundary objects inhibit cross-boundary collaboration and reduce individual cyber-SA.
Differently from other studies that tend to take into consideration actual behaviors of online community users, this paper addresses the design problem of IT platforms for supporting these communities. At the basis of this design theory here introduced there is the so called kernel theory. The comparison between offline and online communities allowed to outline main factors of this theory that were...
The rapid development of the Internet provides researchers with the opportunity of collaborating and communicating by means of online tools. More and more Chinese scientists and researchers in Universities or research institutions begin to use online scholarly communication services. In the paper, Chinese researchers' needs and present condition of online scholarly communication are discussed. Questionnaire...
Enterprise should manage positively the new legal risk with the emergence of enterprise E-transaction. This paper discusses the procedures and tactics of legal risk management for enterprise as seller or service provider in the process of E-transaction. It recommends a method of reducing legal risk and of enhancing legal security in legal risk management for enterprise.
As a new community, the virtual community is rising along with the development of Internet. Netizens establish and develop new forms of power relation through online interaction. In the condition of body absence, reconstructing rules, argument of opinions and collectively resisting become the main ways of power relation. Cyberpower is a flowing power. Its body, object and ways become uncertain.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.