Applying Cyber-Archaeology

نویسنده

  • Quentin Jones
چکیده

Online spaces that enable public shared inter-personal communications are of significant social and economic importance. This paper outlines a theoretical model and methodology, labeled cyber-archaeology, for researching the relationship between such spaces and the behaviors they contain. The methodology utilizes large-scale field studies into user behavior in online spaces to identify technology-associated user constraints to sustainable patterns of online large-scale shared social interactions. Empirical research was conducted to assess the validity of both the theoretical model and methodology. It was based on the analysis of 2.65 million messages posted to 600 Usenet newsgroups over a six month period, and 478,240 email messages sent to 487 email lists managed by Listserv software over a 5-month period. Overall, our findings support a key aspect of the model, namely that individual ‘information overload’ coping strategies have an observable impact on mass-interaction discourse dynamics. Further, that it is possible to demonstrate a link between technology type and information overload impacts through field studies of online behavior. Cyber-archaeology is discussed in terms of its ability to offer insight into aspects of CMC-tool usability, technology design, and to guide future empirical research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application of Stochastic Optimal Control, Game Theory and Information Fusion for Cyber Defense Modelling

The present paper addresses an effective cyber defense model by applying information fusion based game theoretical approaches‎. ‎In the present paper, we are trying to improve previous models by applying stochastic optimal control and robust optimization techniques‎. ‎Jump processes are applied to model different and complex situations in cyber games‎. ‎Applying jump processes we propose some m...

متن کامل

A Cyber-archaeology Approach to Social Movement Research: Framework and Case Study

This paper presents a cyber-archaeology approach to social movement research. The approach overcomes many of the issues of scale and complexity facing social research in the Internet, enabling broad and longitudinal study of the virtual communities supporting social movements. Cultural cyber-artifacts of significance to the social movement are collected and classified using automated techniques...

متن کامل

Use of luminescence dating in archaeology

With improvements in methodology and instrumentation, luminescence dating is becoming a much more useful chronometric tool in archaeology. Procedures for dating ceramics are relatively routine and their accuracy has been demonstrated in a number of studies. Research is aimed at applying ceramic dating in situations where other methods lack the direct dating ability of luminescence to resolve ch...

متن کامل

Using Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media

Social media allows people interact to express their thoughts or feelings about different subjects. However, some of users may write offensive twits to other via social media which known as cyber bullying. Successful prevention depends on automatically detecting malicious messages. Automatic detection of bullying in the text of social media by analyzing the text "twits" via one of the machine l...

متن کامل

Bridging the Classical D&D and Cyber Security Domains

This chapter uses a traditional framework called the D&D methods matrix as a foundation for describing the basics of D&D in the physical world, extends the D&D matrix to cyber security, and then outlines a set of techniques for applying D&D in the cyber security context. These descriptions can be combined with the cyber-D&D TTP taxonomy in Appendix A to guide understanding of how D&D is used in...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003