Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Information technology 2
- Law and legislation 2
- Legal ethics 2
- Moral and ethical aspects 2
- Online social networks 2
- Social media 2
- Social networks 2
- Communication 1
- Cultural policy 1
- Ethnicity 1
- European cooperation 1
- Immigrants 1
- Intercultural communication 1
- Mass media 1
- Multiculturalism 1
- Political aspects 1
- Politics and government 1
- Social aspects 1
- Social conditions 1
- Social movements 1
- Sociology 1
- Technological innovations 1
-
1101
Designing community-based strategies to reach non-household contacts of people with tuberculosis in Lusaka, Zambia: a rapid qualitative study among key stakeholders
Published 2025-01-01“…Interviews explored TB attitudes and beliefs, and perceptions toward two ACF strategies targeting non-household contacts: (1) “social-network strategy”—persons with newly diagnosed TB reach out to their close non-household contacts and (2) “venue-based strategy”—HCWs conduct screening at community venues frequented by persons with newly diagnosed TB. …”
Get full text
Article -
1102
Analysis of Academic Cooperation Network for Returnee Faculty Members to Realize Value from the Perspective of Economics
Published 2021-01-01“…Drawing on theories of social network and knowledge absorption, this paper examines the direct influence of returnee faculty members (RFMs) over college research performance (CRP) from three aspects, namely, the intensity of cooperative relationship (ICR), research influence (RI), and acquisition capability of heterogeneous knowledge (ACHK). …”
Get full text
Article -
1103
Impact of Educational Technology on Teaching and Learning of Biology in Secondary Schools of Kabale Municipality.
Published 2025“…In recent years, this growth has been evident in innovations such as laptops, smartphones, mobile applications, websites, text messaging, and social networking platforms. These advancements highlight the significant impact of technology across various sectors, including education. …”
Get full text
Thesis -
1104
(Bio)porodi rekk ? Structuration des savoirs paysans de protection des cultures et dépendance aux pesticides en maraîchage – Cas d’une commune maraîchère de la zone des Niayes (Sén...
Published 2022-09-01“…To this end, this paper analyses how this knowledge is structured by the material and social network with which it is associated, and how this knowledge in turn structures the practices of vegetable producers. …”
Get full text
Article -
1105
Converting the sociotechnical convergence hazards into the risks of digitalisation
Published 2022-07-01“…Weakly expressed explicit risks are typical for the conversion of the hazard of excessive digital surveillance and the hazard of virtualization of social contacts. The hazard of social network segmentation and the hazard of digital outsider are converted into implicit risks.…”
Get full text
Article -
1106
THE ROLE OF PEER INFLUENCE IN SPORT SELECTION DECISIONS AMONG STUDENT-ATHLETES OF THE UNIVERSITY OF BENIN
Published 2024-10-01“…When it comes to social network influence, there was no statistical significance, suggesting that social network influence on sports choice does not differ significantly between the groups. …”
Get full text
Article -
1107
Engagement in HIV Medical Care and Technology Use among Stimulant-Using and Nonstimulant-Using Men who have Sex with Men
Published 2013-01-01“…Few significant differences were found in online social networking or mobile phone use between stimulant-using and non-stimulant-using MSM, even when stratified by engagement in HIV care. …”
Get full text
Article -
1108
Teen Safety in Cyberspace
Published 2011-04-01“…If you believe e-mail, blogs, text messaging, instant messaging, social networking sites, and 3-D virtual worlds (with avatars) are a completely harmless way for teens to communicate, think again! …”
Get full text
Article -
1109
Teen Safety in Cyberspace
Published 2011-04-01“…If you believe e-mail, blogs, text messaging, instant messaging, social networking sites, and 3-D virtual worlds (with avatars) are a completely harmless way for teens to communicate, think again! …”
Get full text
Article -
1110
Node characteristic and propagation model in microblog forwarding network
Published 2016-01-01“…Microblog is an important social network with rapid propagation speed and great influence.The network influence is determined by users' node characteristic.Nodes' degree and propagation model in microblog forwarding network were investgated.Firstly,microblog forwarding network was constructed through distinguishing information flow direction.Secondly,the mean and variance of out-degree and in-degree were discussed.The difference between out-degree and in-degree was clarified.Finally,the simulation shows that the direction characteristic of edge has significantly influence on information propagation.The propagation becomes harder and propagation range diminishes while percolation threshold rises in directed graph under the same probability.…”
Get full text
Article -
1111
MEDIA CONVERGENCE AS A HALLMARK OF MODERN MARKETING COMMUNICATION
Published 2013-12-01“…The special role of the development of "cultural convergence" and "culture of participation" in the creation of social networking and marketing communications has been emphasized. …”
Get full text
Article -
1112
Mapping Linkages between Actors in Cattle Marketing Innovation System of Northeastern Nigeria
Published 2022-03-01“…Furthermore, the result of the social network analysis revealed a network density of 0.83, indicating that 83% of all direct linkages were present. …”
Get full text
Article -
1113
The impact of dental photography in social media platforms on patients’ selection of dentists and type of treatment
Published 2025-01-01“…Conclusion The presence of the dentist in social networking sites and sharing of their pre-post treatment cases can be an effective marketing tool especially among females and Instagram users.…”
Get full text
Article -
1114
Ressources communes
Published 2008-09-01“…We show that that different social mechanisms, like the shared values e the social network existing inside the community of users, play a significant role in influencing the outcomes of the institutional schemes for the commons management.…”
Get full text
Article -
1115
Multifonctionnalité de l’agriculture urbaine à Montréal : étude des discours au sein du programme des jardins communautaires
Published 2010-09-01“…Research show that urban agriculture could be a solution to meet modern urban issues, as food security, population health, environmental urban services, social network and popular education. However, is it the case for the cities community gardens program at Montréal (Québec, Canada) ? …”
Get full text
Article -
1116
Irrigation systems as common-pool resources
Published 2008-09-01“…We show that that different social mechanisms, like the shared values e the social network existing inside the community of users, play a significant role in influencing the outcomes of the institutional schemes for the commons management.…”
Get full text
Article -
1117
Secure communication mechanism for VSN based on certificateless signcryption
Published 2021-07-01“…To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman problem and elliptic curve discrete logarithm problem, which provided confidentiality and unforgeability protection for VSN members.In addition, when the pseudonym mechanism was used to solve the privacy protection problem in VSN, without installing tamper-proof device, a self-generation mechanism for vehicle pseudonyms and their keys was proposed.The performance analysis shows that the proposed scheme can decrease communication cost, and significantly reduce the computation overhead of the key generation center.…”
Get full text
Article -
1118
The Effect of Social Media on Morality Among Youth in Kirigime Ward, Kabale Municipality, Kabale District.
Published 2023“…Social networking sites have become a very important aspect in young people's life. …”
Get full text
Thesis -
1119
Achieving efficient location privacy protection based on cache
Published 2017-06-01“…With the development of mobile Internet and the popularization of intelligent terminals,location based services(LBS) has been widespread in navigation,social network and other fields.Due to the sensitivity of personal location information,data privacy protection related to location of mobile objects has become the hotspots of research.Considering the openness of the background information,and based on the information cache mechanism,a dummy selection algorithm was proposed to reduce the number of interactions between the user and the untrusted server and combine the k-anonymity to achieve efficient location privacy.Without relying on trusted third party,the scheme can prevent the attackers owned background information from inference attack,and the detail simulation results indicate its effectiveness and efficiency.…”
Get full text
Article -
1120
Cloud computing based smartphone social authentication system
Published 2012-09-01“…Cloud computation provided the capabilities to store and compute infinitely,which can filled the gap of resource constrain.So a cloud-computation based social authentication system for smartphones aimed at the problem that the present authentication methods require a long period of validity of the authentication tokens and make the terminals consume large resources was proposed.The system took three types of social networking features into considered,which were different certification authority between the friends,behavior differences between individual and trust level carried by each interactive event.The results of experiments show that the system can effectively solve the problem that system performance will sharply decline when the expiry date of authentication tokens is short.…”
Get full text
Article