Applying Cyber-Archaeology
نویسنده
چکیده
Online spaces that enable public shared inter-personal communications are of significant social and economic importance. This paper outlines a theoretical model and methodology, labeled cyber-archaeology, for researching the relationship between such spaces and the behaviors they contain. The methodology utilizes large-scale field studies into user behavior in online spaces to identify technology-associated user constraints to sustainable patterns of online large-scale shared social interactions. Empirical research was conducted to assess the validity of both the theoretical model and methodology. It was based on the analysis of 2.65 million messages posted to 600 Usenet newsgroups over a six month period, and 478,240 email messages sent to 487 email lists managed by Listserv software over a 5-month period. Overall, our findings support a key aspect of the model, namely that individual ‘information overload’ coping strategies have an observable impact on mass-interaction discourse dynamics. Further, that it is possible to demonstrate a link between technology type and information overload impacts through field studies of online behavior. Cyber-archaeology is discussed in terms of its ability to offer insight into aspects of CMC-tool usability, technology design, and to guide future empirical research.
منابع مشابه
Application of Stochastic Optimal Control, Game Theory and Information Fusion for Cyber Defense Modelling
The present paper addresses an effective cyber defense model by applying information fusion based game theoretical approaches. In the present paper, we are trying to improve previous models by applying stochastic optimal control and robust optimization techniques. Jump processes are applied to model different and complex situations in cyber games. Applying jump processes we propose some m...
متن کاملA Cyber-archaeology Approach to Social Movement Research: Framework and Case Study
This paper presents a cyber-archaeology approach to social movement research. The approach overcomes many of the issues of scale and complexity facing social research in the Internet, enabling broad and longitudinal study of the virtual communities supporting social movements. Cultural cyber-artifacts of significance to the social movement are collected and classified using automated techniques...
متن کاملUse of luminescence dating in archaeology
With improvements in methodology and instrumentation, luminescence dating is becoming a much more useful chronometric tool in archaeology. Procedures for dating ceramics are relatively routine and their accuracy has been demonstrated in a number of studies. Research is aimed at applying ceramic dating in situations where other methods lack the direct dating ability of luminescence to resolve ch...
متن کاملUsing Machine Learning Algorithms for Automatic Cyber Bullying Detection in Arabic Social Media
Social media allows people interact to express their thoughts or feelings about different subjects. However, some of users may write offensive twits to other via social media which known as cyber bullying. Successful prevention depends on automatically detecting malicious messages. Automatic detection of bullying in the text of social media by analyzing the text "twits" via one of the machine l...
متن کاملBridging the Classical D&D and Cyber Security Domains
This chapter uses a traditional framework called the D&D methods matrix as a foundation for describing the basics of D&D in the physical world, extends the D&D matrix to cyber security, and then outlines a set of techniques for applying D&D in the cyber security context. These descriptions can be combined with the cyber-D&D TTP taxonomy in Appendix A to guide understanding of how D&D is used in...
متن کامل