Showing 1,101 - 1,120 results of 1,364 for search '"social networks"', query time: 0.08s Refine Results
  1. 1101

    Designing community-based strategies to reach non-household contacts of people with tuberculosis in Lusaka, Zambia: a rapid qualitative study among key stakeholders by Andrew D. Kerkhoff, Marksman Foloko, Evelyn Kundu-Ng’andu, Herbert Nyirenda, Zainab Jabbie, Mainza Syulikwa, Chanda Mwamba, Mary Kagujje, Monde Muyoyeta, Anjali Sharma

    Published 2025-01-01
    “…Interviews explored TB attitudes and beliefs, and perceptions toward two ACF strategies targeting non-household contacts: (1) “social-network strategy”—persons with newly diagnosed TB reach out to their close non-household contacts and (2) “venue-based strategy”—HCWs conduct screening at community venues frequented by persons with newly diagnosed TB. …”
    Get full text
    Article
  2. 1102

    Analysis of Academic Cooperation Network for Returnee Faculty Members to Realize Value from the Perspective of Economics by Yanchun Zhu, Fuze Li, Chunlei Qin, Wei Zhang, Jianbo Wen

    Published 2021-01-01
    “…Drawing on theories of social network and knowledge absorption, this paper examines the direct influence of returnee faculty members (RFMs) over college research performance (CRP) from three aspects, namely, the intensity of cooperative relationship (ICR), research influence (RI), and acquisition capability of heterogeneous knowledge (ACHK). …”
    Get full text
    Article
  3. 1103

    Impact of Educational Technology on Teaching and Learning of Biology in Secondary Schools of Kabale Municipality. by Tweheyo, Ishameil

    Published 2025
    “…In recent years, this growth has been evident in innovations such as laptops, smartphones, mobile applications, websites, text messaging, and social networking platforms. These advancements highlight the significant impact of technology across various sectors, including education. …”
    Get full text
    Thesis
  4. 1104

    (Bio)porodi rekk ? Structuration des savoirs paysans de protection des cultures et dépendance aux pesticides en maraîchage – Cas d’une commune maraîchère de la zone des Niayes (Sén... by Baptiste Gaillard

    Published 2022-09-01
    “…To this end, this paper analyses how this knowledge is structured by the material and social network with which it is associated, and how this knowledge in turn structures the practices of vegetable producers. …”
    Get full text
    Article
  5. 1105

    Converting the sociotechnical convergence hazards into the risks of digitalisation by V. V. Zotov, I. A. Aseeva, V. G. Budanov, V. A. Belkina

    Published 2022-07-01
    “…Weakly expressed explicit risks are typical for the conversion of the hazard of excessive digital surveillance and the hazard of virtualization of social contacts. The hazard of social network segmentation and the hazard of digital outsider are converted into implicit risks.…”
    Get full text
    Article
  6. 1106

    THE ROLE OF PEER INFLUENCE IN SPORT SELECTION DECISIONS AMONG STUDENT-ATHLETES OF THE UNIVERSITY OF BENIN by RAPHAEL F. ANI, SHALLOM OZIOMA UKEJE

    Published 2024-10-01
    “…When it comes to social network influence, there was no statistical significance, suggesting that social network influence on sports choice does not differ significantly between the groups. …”
    Get full text
    Article
  7. 1107

    Engagement in HIV Medical Care and Technology Use among Stimulant-Using and Nonstimulant-Using Men who have Sex with Men by Keith J. Horvath, Adam W. Carrico, Jane Simoni, Edward W. Boyer, K. Rivet Amico, Andy E. Petroll

    Published 2013-01-01
    “…Few significant differences were found in online social networking or mobile phone use between stimulant-using and non-stimulant-using MSM, even when stratified by engagement in HIV care. …”
    Get full text
    Article
  8. 1108

    Teen Safety in Cyberspace by Kate Fogarty

    Published 2011-04-01
    “…If you believe e-mail, blogs, text messaging, instant messaging, social networking sites, and 3-D virtual worlds (with avatars) are a completely harmless way for teens to communicate, think again! …”
    Get full text
    Article
  9. 1109

    Teen Safety in Cyberspace by Kate Fogarty

    Published 2011-04-01
    “…If you believe e-mail, blogs, text messaging, instant messaging, social networking sites, and 3-D virtual worlds (with avatars) are a completely harmless way for teens to communicate, think again! …”
    Get full text
    Article
  10. 1110

    Node characteristic and propagation model in microblog forwarding network by Jin LI, Zilong YANG

    Published 2016-01-01
    “…Microblog is an important social network with rapid propagation speed and great influence.The network influence is determined by users' node characteristic.Nodes' degree and propagation model in microblog forwarding network were investgated.Firstly,microblog forwarding network was constructed through distinguishing information flow direction.Secondly,the mean and variance of out-degree and in-degree were discussed.The difference between out-degree and in-degree was clarified.Finally,the simulation shows that the direction characteristic of edge has significantly influence on information propagation.The propagation becomes harder and propagation range diminishes while percolation threshold rises in directed graph under the same probability.…”
    Get full text
    Article
  11. 1111

    MEDIA CONVERGENCE AS A HALLMARK OF MODERN MARKETING COMMUNICATION by Ewa Badzińska

    Published 2013-12-01
    “…The special role of the development of "cultural convergence" and "culture of participation" in the creation of social networking and marketing communications has been emphasized. …”
    Get full text
    Article
  12. 1112

    Mapping Linkages between Actors in Cattle Marketing Innovation System of Northeastern Nigeria by Altine Madugu

    Published 2022-03-01
    “…Furthermore, the result of the social network analysis revealed a network density of 0.83, indicating that 83% of all direct linkages were present. …”
    Get full text
    Article
  13. 1113

    The impact of dental photography in social media platforms on patients’ selection of dentists and type of treatment by Yaser Nizar Alqabbani, Nawaf Khalid Alfhaed, Khaled Fawaz Almasaad, Rahaf Yahya Mahanshi, Faraz Farooqi, Khalifa S. Al-Khalifa, Balgis Osman Gaffar

    Published 2025-01-01
    “…Conclusion The presence of the dentist in social networking sites and sharing of their pre-post treatment cases can be an effective marketing tool especially among females and Instagram users.…”
    Get full text
    Article
  14. 1114

    Ressources communes by Giangiacomo Bravo, Beatrice Marelli

    Published 2008-09-01
    “…We show that that different social mechanisms, like the shared values e the social network existing inside the community of users, play a significant role in influencing the outcomes of the institutional schemes for the commons management.…”
    Get full text
    Article
  15. 1115

    Multifonctionnalité de l’agriculture urbaine à Montréal : étude des discours au sein du programme des jardins communautaires by Fabien Wegmuller, Éric Duchemin

    Published 2010-09-01
    “…Research show that urban agriculture could be a solution to meet modern urban issues, as food security, population health, environmental urban services, social network and popular education. However, is it the case for the cities community gardens program at Montréal (Québec, Canada) ? …”
    Get full text
    Article
  16. 1116

    Irrigation systems as common-pool resources by Giangiacomo Bravo, Beatrice Marelli

    Published 2008-09-01
    “…We show that that different social mechanisms, like the shared values e the social network existing inside the community of users, play a significant role in influencing the outcomes of the institutional schemes for the commons management.…”
    Get full text
    Article
  17. 1117

    Secure communication mechanism for VSN based on certificateless signcryption by Wenbo ZHANG, Wenhua HUANG, Jingyu FENG

    Published 2021-07-01
    “…To solve the communication security problems of vehicular social network (VSN), an efficient certificateless signcryption scheme was proposed.The proposed scheme was proven secure in the random oracle model based on the computational Diffie-Hellman problem and elliptic curve discrete logarithm problem, which provided confidentiality and unforgeability protection for VSN members.In addition, when the pseudonym mechanism was used to solve the privacy protection problem in VSN, without installing tamper-proof device, a self-generation mechanism for vehicle pseudonyms and their keys was proposed.The performance analysis shows that the proposed scheme can decrease communication cost, and significantly reduce the computation overhead of the key generation center.…”
    Get full text
    Article
  18. 1118

    The Effect of Social Media on Morality Among Youth in Kirigime Ward, Kabale Municipality, Kabale District. by Zakia, Lucky

    Published 2023
    “…Social networking sites have become a very important aspect in young people's life. …”
    Get full text
    Thesis
  19. 1119

    Achieving efficient location privacy protection based on cache by Lu-lu LI, Jia-feng HUA, Sheng WAN, Hui ZHU, Feng-hua LI

    Published 2017-06-01
    “…With the development of mobile Internet and the popularization of intelligent terminals,location based services(LBS) has been widespread in navigation,social network and other fields.Due to the sensitivity of personal location information,data privacy protection related to location of mobile objects has become the hotspots of research.Considering the openness of the background information,and based on the information cache mechanism,a dummy selection algorithm was proposed to reduce the number of interactions between the user and the untrusted server and combine the k-anonymity to achieve efficient location privacy.Without relying on trusted third party,the scheme can prevent the attackers owned background information from inference attack,and the detail simulation results indicate its effectiveness and efficiency.…”
    Get full text
    Article
  20. 1120

    Cloud computing based smartphone social authentication system by Yan-bing LIU, Fei-fei LIU

    Published 2012-09-01
    “…Cloud computation provided the capabilities to store and compute infinitely,which can filled the gap of resource constrain.So a cloud-computation based social authentication system for smartphones aimed at the problem that the present authentication methods require a long period of validity of the authentication tokens and make the terminals consume large resources was proposed.The system took three types of social networking features into considered,which were different certification authority between the friends,behavior differences between individual and trust level carried by each interactive event.The results of experiments show that the system can effectively solve the problem that system performance will sharply decline when the expiry date of authentication tokens is short.…”
    Get full text
    Article