Search results

1 – 10 of over 106000
Click here to view access options
Book part
Publication date: 10 July 2019

Jingjing Wang, Zhiqiang Li, Huanhuan Feng, Yuanjing Guo, Zhengbo Liang, Luyao Wang, Xing Wan and Yalin Wang

Recently, sharing economy is gradually accepted by people, and it has expanded from life to knowledge. It is important to encourage people to produce high quality content…

Abstract

Recently, sharing economy is gradually accepted by people, and it has expanded from life to knowledge. It is important to encourage people to produce high quality content in knowledge sharing area, and knowledge payment is one of the most effective ways to achieve it. Therefore, the knowledge payment has been regarded as a huge business opportunity, and it is of great meaning to study the development trend and feasibility of knowledge payment. This chapter, through big data methods, analyzes the business model of Zhihu (a Chinese platform of knowledge sharing) after it introduced knowledge payment projects, such as Zhihu Live and Pay Consultation. According to data of Zhihu users’ Q&A, concerned fields and others, this chapter tries to outline its user profile to find out the target groups of different topics, the proper form of knowledge payment and the hot topics of Zhihu Live. Through the analysis of knowledge graph, this chapter finds that Zhihu Live is expected to be the mainstream knowledge payment form in the future, and the most potential topics are mainly focused on science, law, and business. Meanwhile, it establishes a pricing model for Zhihu Live, and provides suggestions for the development of knowledge payment.

Details

The New Silk Road Leads through the Arab Peninsula: Mastering Global Business and Innovation
Type: Book
ISBN: 978-1-78756-680-4

Keywords

Click here to view access options
Article
Publication date: 3 September 2019

Ciaran B. Trace and Yan Zhang

The purpose of this article is to examine the ways in which self-tracking data have meaning and value in and after the life of the creator, including how such data could…

Abstract

Purpose

The purpose of this article is to examine the ways in which self-tracking data have meaning and value in and after the life of the creator, including how such data could become part of the larger historical record, curated in an institutional archive. In doing so, the article expands upon existing shared interests among researchers working in the areas of self-tracking, human–computer interaction and archival science.

Design/methodology/approach

A total of 18 people who had self-tracked for six months or more were recruited for the study. Participants completed a survey which gathered demographic data and characteristics vis-à-vis their self-tracking behavior. In-person semi-structured interviews were then conducted to ascertain the beliefs of the participants regarding the long-term use and value of personal quantified-self data.

Findings

The findings reveal the value that people place on self-tracking data, their thoughts on proper modes for accessing their archive once it moves from the private to the public space, and how to provide fidelity within the system such that their experiences are represented while also enabling meaning making on the part of subsequent users of the archive.

Originality/value

Today’s quantified-self data are generally embedded in systems that create a pipeline from the individual source to that of the corporate warehouse, bent on absorbing and extracting insight from a totality of big data. This article posits that new opportunities for knowing and for design can be revealed when a public interest rationale is appended to rich personalized collections of small data.

Details

Journal of Documentation, vol. 76 no. 1
Type: Research Article
ISSN: 0022-0418

Keywords

Click here to view access options
Article
Publication date: 1 December 1996

Maximiliane Szinovacz

This study, based on data from the National Survey of Families and Households, confirms normative preference for nuclear households across all cohorts and racial/ethnic…

Abstract

This study, based on data from the National Survey of Families and Households, confirms normative preference for nuclear households across all cohorts and racial/ethnic groups throughout this century. However, a noteworthy minority (about 30%) did live with grandparents at some time during their childhood. Living with grandparents as well as having a grandparent live in one's parental household were somewhat more prevalent during the 30's and 40's, indicating that extended households may have been formed in response to the Depression and especially World War II. There also is a significant effect of nuclear family structure: living arrangements with grandparents predominate among those who did not live with both parents at some time during their childhood. The data also suggest that it is important to differentiate between grandparental living arrangements that are oriented toward the care of the grandchildren and those arrangements that imply care for the grandparent: the former arrangement predominates among Blacks, whereas the latter is more common among Whites. During the past decade there has been increased interest in extended family living arrangements and particularly in households including grandparents and/or grandchildren. This interest reflects several demographic trends during the latter part of this century, especially increases in divorce and in parental problems (drugs, AIDS) that preclude parents from taking care of their own children as well as increases in longevity and in the survival of frail elderly, many of whom come to live with their adult children. Census data offer information on the prevalence of extended family arrangements at any one point in time, but they are insufficient to estimate a person's lifetime “risk” of living with grandparents and provide only limited information on the duration of such living arrangements. Data from the National Survey of Families and Households (NSFH) include information not only on whether individuals ever lived with their grandparents but also on the type and the duration of such arrangements. Based on this data set, this article assesses trends in living arrangements with grandparents, and variations in these trends by race and childhood family structure.

Details

International Journal of Sociology and Social Policy, vol. 16 no. 12
Type: Research Article
ISSN: 0144-333X

Click here to view access options
Article
Publication date: 1 March 2013

Ren Liyong, Lei Ming and Zhao Di

The purpose of this paper is to improve data transmission efficiency in a P2P system.

Downloads
851

Abstract

Purpose

The purpose of this paper is to improve data transmission efficiency in a P2P system.

Design/methodology/approach

This mechanism does not require changing existing mesh topology, and only necessary peers' evaluation mechanisms need to be introduced.

Findings

This paper presents a data reservation mechanism so that it can transmit data via the push and pull model on the P2P live stream system with the mesh topology. The experiment result of establishing a simulation environment reveals that the above mentioned is an effective way of reducing the data transmission delay by 40 per cent.

Originality/value

To improve data transmission efficiency in a P2P system, this paper presents a data reservation mechanism so that it can transmit data via the push and pull model on the P2P live stream system with the mesh topology.

Details

COMPEL - The international journal for computation and mathematics in electrical and electronic engineering, vol. 32 no. 2
Type: Research Article
ISSN: 0332-1649

Keywords

Click here to view access options
Article
Publication date: 9 November 2015

Himanshu Srivastava and Shashikala Tapaswi

The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device…

Downloads
1281

Abstract

Purpose

The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information like emails, images, contacts etc., on Phones/Tablets as their data would be readily accessible and thus convenient for them.

Design/methodology/approach

Android Operating System is built on the Linux Kernel and scripts to extract data from Android Mobile Device with the use of Android Debugging Bridge have been written. The approach is more focused on the logical acquisition of data from devices rather than acquisition using physical methods.

Findings

Live data of the Facebook application running on the device can be extracted. Also, the password of the LuksManager application (used to create an encrypted volume on the device), which is stored in the internal memory, is also extracted and identified.

Research limitations/implications

The study has been conducted in an academic environment, thereby limiting external validity. Another limitation is the limited edition of some of the software forensics tools that are used. The full access to these software tools are restricted by Law enforcement and Investigation policies. The research provides a different approach which could aid in criminal investigation activities on mobile devices.

Practical implications

The devices which have the latest versions of Android not only store messages and mails, but a lot of information about GPS, as well as information about popular applications like Facebook, WhatsApp, etc. This could practically help a lot in criminal investigation.

Originality/value

This study is important because very few works have been done on recent versions (Jellybean and Kitkat) of Android. The proposed approach could extract large amounts of information as compared to earlier approaches with the newer versions of Android having larger memory and new features.

Details

Information & Computer Security, vol. 23 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Click here to view access options
Book part
Publication date: 15 December 2004

James P. Cover and Hoseong Kim

This study presents estimates of the effect of changes in the real minimum wage on the employment ratio of three groups believed to be most vulnerable to changes in the…

Abstract

This study presents estimates of the effect of changes in the real minimum wage on the employment ratio of three groups believed to be most vulnerable to changes in the minimum wage: teenagers, young adults, and adult high-school dropouts. It also examines the effect of the minimum wage on three sub-groups within each of these larger groups: males, females, and nonwhites. The data set was obtained from the monthly outgoing rotation groups of the Current Population Survey (CPS), Three Budgets for Urban Families, and the CPI-W for various urban areas. The sample period is 1979–1999.

Details

Studies on Economic Well-Being: Essays in the Honor of John P. Formby
Type: Book
ISBN: 978-0-76231-136-1

Click here to view access options
Article
Publication date: 9 October 2017

Jacqueline Cope, Francois Siewe, Feng Chen, Leandros Maglaras and Helge Janicke

This study is an exploration of areas pertaining to the use of production data in non-production environments. During the software development life cycle, non-production…

Abstract

Purpose

This study is an exploration of areas pertaining to the use of production data in non-production environments. During the software development life cycle, non-production environments are used to serve various purposes to include unit, component, integration, system, user acceptance, performance and configuration testing. Organisations and third parties have been and are continuing to use copies of production data in non-production environments. This can lead to personal and sensitive data being accidentally leaked if appropriate and rigorous security guidelines are not implemented. This paper aims to propose a comprehensive framework for minimising data leakage from non-production environments. The framework was evaluated using guided interviews and was proven effective in helping organisation manage sensitive data in non-production environments.

Design/methodology/approach

Authors conducted a thorough literature review on areas related to data leakage from non-production systems. By doing an analysis of advice, guidelines and frameworks that aims at finding a practical solution for selecting and implementing a de-identification solution of sensitive data, the authors managed to highlight the importance of all areas related to sensitive data protection. Based on these areas, a framework was proposed which was evaluated by conducting set of guided interviews.

Findings

This paper has researched the background information and produced a framework for an organisation to manage sensitive data in its non-production environments. This paper presents a proposed framework that describes a process flow from the legal and regulatory requirements to data treatment and protection, gained through understanding the organisation’s business, the production system, the purpose and the requirements of the non-production environment. The paper shows that there is some conflict between security and perceived usability, which may be addressed by challenging the perceptions of usability or identifying the compromise required. Non-production environments need not be the sole responsibility of the IT section, they should be of interest to the business area that is responsible for the data held.

Originality/value

This paper proposes a simplified business model and framework. The proposed model diagrammatically describes the interactions of elements affecting the organisation. It highlights how non-production environments may be perceived as separate from the business systems, but despite the perceptions, these are still subject to the same legal requirements and constraints. It shows the interdependency of data, software, technical infrastructure and human interaction and how the change of one element may affect the others. The proposed framework describes the process flow and forms a practical solution in assisting the decision-making process and providing documentary evidence for assurance and audit purposes. It looks at the requirements of the non-production system in relation to the legal and regulatory constraints, as well as the organisational requirements and business systems. The impact of human factors on the data is also considered to bring a holistic approach to the protection of non-production environments.

Details

Information & Computer Security, vol. 25 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Click here to view access options

Abstract

Details

Malleable, Digital, and Posthuman
Type: Book
ISBN: 978-1-80117-621-7

Click here to view access options
Article
Publication date: 7 January 2020

Max Sjöblom, Joseph Macey and Juho Hamari

Esports (electronic sports) are watched by hundreds of millions of people every year and many esports have overtaken large traditional sports in spectator numbers. The…

Abstract

Purpose

Esports (electronic sports) are watched by hundreds of millions of people every year and many esports have overtaken large traditional sports in spectator numbers. The purpose of this paper is to investigate spectating differences between online spectating of esports and live attendance of esports events. This is done in order to further understand attendance behaviour for a cultural phenomenon that is primarily mediated through internet technologies, and to be able to predict behavioural patterns.

Design/methodology/approach

This study employs the Motivation Scale for Sports Consumption to investigate the gratifications spectators derive from esports, both from attending tournaments physically and spectating online, in order to explore which factors may explain the esports spectating behaviour. The authors investigate how these gratifications lead into continued spectatorship online and offline, as well as the likelihood of recommending esports to others. The authors employ two data sets, one collected from online spectators (n=888), the other from live attendees (n=221).

Findings

The results indicate that online spectators rate drama, acquisition of knowledge, appreciation of skill, novelty, aesthetics and enjoyment of aggression higher than live attendees. Correspondingly, social interaction and physical attractiveness were rated higher by live attendees. Vicarious achievement and physical attractiveness positively predicted intention to attend live sports events while vicarious achievement and novelty positively predicted future online consumption of esports. Finally, vicarious achievement and novelty positively predicted recommending esports to others.

Originality/value

During the past years, esports has emerged as a new form of culture and entertainment, that is unique in comparison to other forms of entertainment, as it is almost fully reliant on computer-human interaction and the internet. This study offers one of the first attempts to compare online spectating and live attendance, in order to better understand the phenomenon and the consumers involved. As the growth of esports is predicted to continue in the coming years, further understanding of this phenomenon is pivotal for multiple stakeholder groups.

Details

Internet Research, vol. 30 no. 3
Type: Research Article
ISSN: 1066-2243

Keywords

Click here to view access options
Article
Publication date: 26 March 2018

Bukola Salami and Salima Meherali

Many families in the developed world hire live-in caregivers to meet their childcare and elder care needs. Given the spatial arrangements – i.e., that the caregiver lives

Abstract

Purpose

Many families in the developed world hire live-in caregivers to meet their childcare and elder care needs. Given the spatial arrangements – i.e., that the caregiver lives with her employer – relationships between employers and live-in caregivers can develop into family-like relationships. The purpose of this paper is to draw on data from two Canadian studies to examine the relationships between migrant live-in caregivers and their employers.

Design/methodology/approach

The first study focused on the live-in caregivers in Canada. Semi-structured interviews were conducted with 15 Filipina nurses who migrated to Canada through the Live-in Caregiver Program. The second study was a pilot descriptive study that included interviews of recruiter groups and employers of live-in caregivers. Data were thematically analyzed, aided by NVivo software.

Findings

The studies indicate that some live-in caregivers prefer to be treated as one of the family, while others prefer to have a strictly professional employer/employee relationship. Their employers are similarly divided. The authors identify reciprocity and respect as important ingredients for healthy relationships between live-in caregivers and their employers. Without these key ingredients, relationships between employers and live-in caregivers can be exploitative, especially given the unequal power inherent in the relationship.

Research limitations/implications

Further studies are needed to better understand how these relationships evolve over time and in space.

Practical implications

There is a need to create policies to further prevent exploitation of live-in caregivers within an unfavorable employee or familial relationship.

Originality/value

This study provides useful insight into the development of knowledge on relationships between live-in caregivers and employers.

Details

International Journal of Migration, Health and Social Care, vol. 14 no. 2
Type: Research Article
ISSN: 1747-9894

Keywords

1 – 10 of over 106000