Notes:
Persona management software is a type of software that is used to create, manage, and maintain virtual personas, which are digital identities or avatars that represent individuals or organizations online. Persona management software allows users to create and customize their own virtual personas, including their appearance, personality, and other characteristics. The software typically includes a range of tools and features that make it easy to create and customize virtual personas, including templates, pre-defined characteristics, and customization options.
Persona management software is often used in social media and online communities, where it can help users to create and maintain consistent, believable, and engaging online identities. It can also be used in marketing and customer service applications, where it can help businesses to create virtual representatives or avatars that can interact with customers and provide information or assistance.
Resources:
References:
See also:
Agent Persona Instrument | Automated Personality 2018 | Computational Propaganda 2020
User Involvement in Software Development Processes.
I Alvertis, S Koussouris, D Papaspyros… – Cloud …, 2016 – cyberleninka.org
… Customer Platform API Persona Information System–used Peronas Persona Management … Users are able to browse ongoing projects, read project news in the project blog, and find running campaigns, which software developers have published to the customer platform …
Using crowdsourced and anonymized personas in the requirements elicitation and software development phases of software engineering
I Alvertis, D Papaspyros, S Koussouris… – … and Security (ARES), 2016 – ieeexplore.ieee.org
… This way the Builder intends to be a complete system providing Persona management tools to software development teams. Figure 4. After performing a Persona Builder query, the software team is aware of the customers who contributed into the generated Persona …
Persona studies: an introduction
PD Marshall, C Moore, K Barbour – 2019 – books.google.com
Page 1. Persona studies An Introduction P. David Marshall Christopher Moore Kim Barbour WILEY Blackwell Page 2. & Nº. w N Nº Persona studies An Introduction P. David Marshall Christopher Moore Kim Barbour WILEY Blackwell Page 3. Page 4. Persona Studies Page 5 …
Research on the Application of Persona in Book Recommendation System
B Gao, S Du, X Li, F Liu – Journal of Physics: Conference Series, 2017 – iopscience.iop.org
… 3.6 Persona Management Using K-means clustering method to carry out persona management, combining with the statistical methods of … Application Implementation Function The recommendation system is a collection of software tools and technologies that provides project …
Actor or ambassador? The star persona of Jackie Chan in social media
DWS Lau – Continuum, 2016 – Taylor & Francis
… texts and images of stars on the Web, stars and their personnel also join the cyber fan circuit to exercise persona management and manipulation … It’s social software, but the interface never gets in the way of what you’re trying to do’ (Terdiman 2004 Terdiman, D. December 9, 2004 …
Performing the networks of domestic and public persona
C Moore, K Barbour – Persona Studies, 2016 – ojs.deakin.edu.au
… One of his official websites, Schwarzenegger.com, presents a specifically nuanced and individualised persona management strategy that is less … The authors introduce a methodology for designing, testing, and evaluating effective personas for use in software design, and this …
Donnie Yen’s star persona in amateur-produced videos on YouTube
D Lau – Transformative Works and Cultures, 2018 – journal.transformativeworks.org
… Furthermore, since the mid-2000s, the maturation of broadband infrastructure and open-source image-making software has mobilized the … philanthropist presence engineered on the user-oriented sites that have become part of the industrial machinery of persona management …
Who are you now? Fading to multiple personas
S Dietrich, M Brenner, K Krombholz – Twelfth Symposium on Usable …, 2016 – usenix.org
… The exception is that there are commercial mobile data management (MDM) software and services to facilitate the management and pro- tection of enterprise apps and data … Management of non-business personas typically re- main unorganized and unmanaged …
Astroturfing as a Controversial Media Relations Tool
D Mendelová – European Journal of Science and Theology, 2016 – ejst.tuiasi.ro
… As reported by the Guardian, some big companies now use sophisticated “persona management software” to create armies of virtual astroturfers, complete with fake IP addresses, non-political interests and online histories. Authentic …
The hardware and software of Trumpism: A figure/ground analysis
A Miroshnichenko – Explorations in Media Ecology, 2020 – ingentaconnect.com
… t]he US military is developing software that will let it secretly manipulate social media sites by using fake online personas to influence internet conversations and spread pro-American propaganda’ (Fielding and Cobain 2011). An ‘online persona management service’ would …
The communicative work of organizations in shaping argumentative realities
M Aakhus – Philosophy & Technology, 2017 – Springer
… 2.2.3 Persona Management. Persona management software makes it possible for one person to manage dozens of fake identities in online discussions and social media sites as though each identity is a unique person (Wang et al. 2012) …
Cyber conflicts as a new global threat
A Kosenkov – Future Internet, 2016 – mdpi.com
… Between February–March 2011, mass media published information that the United States Department of The Air Force in June 2010 placed an order for “persona management software” for 50 users, each of which will manage 10 personas …
The automated detection of trolling bots and cyborgs and the analysis of their impact in the social media
J Paavola, T Helo, HJM Sartonen… – … -Proceedings fo the …, 2016 – books.google.com
… them. Acting through fake identities and using sophisticated persona management software, fakeholders aim to violate their targets. Our goal is to investigate trolling phenomenon from social and psychological point-of-view …
Research Methods Used In Studies On Management And International Affairs
LF POPESCUL, L JITARU – … of Public Administration, Finance and Law, 2017 – ceeol.com
… Another challenge resides in the access to tools and software for storing and rearranging the data, which, in mixed methods … 6. Gummesson, E. (2006), Qualitative research in management: Addressing complexity, context and persona, Management Decision, Vol 44 No.2, pp.167 …
The brand persona: operationalizing a synthesis of brand equity and social capital
BK Chicotsky – 2017 – ir.ua.edu
… Brand Perceptions Among Athletes …..45 Brand Persona Management in Sports …..47 Media and Athlete Brands …..48 …
Computational Propaganda and the Rise of the Fake Audience
A Delwiche – The SAGE Handbook of Propaganda, 2019 – books.google.com
… For example, software developers patented persona management software capable of converting a single mes- sage into one or more writing styles ran- domly selected from a ‘persona repository’ (Chen et al., 2009). Individuals …
Facts & Findings
S Hegelich – 2016 – d-nb.info
… There have been reports since 2011 about the US Air Force having developed something called “persona management”.15 This involves software that allows social bots to be generated rap- idly en masse, disguised in a way to enable them to infiltrate terror cells on social …
The unlikely encounter between von Foerster and Snowden: When second-order cybernetics sheds light on societal impacts of Big Data
D Chavalarias – Big Data & Society, 2016 – journals.sagepub.com
… Cite. Citation Tools. How to cite this article. If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click on download. How to cite this article …
Understanding blockchain opportunities and challenges
C Holotescu – … of» eLearning and Software for Education «(eLSE), 2018 – ceeol.com
… Also, that blockchain is decentralized on two of the three possible axes in software decentralization: • politically … Decentralized Asset Management, Economic and Social Structures, Financial Products and Services, Identity and Persona Management, Governance and Law …
Understanding the trolling phenomenon: the automated detection of bots and cyborgs in the social media
J Paavola, T Helo, H Jalonen, M Sartonen… – Journal of Information …, 2016 – JSTOR
… Fakeholders, in turn, act in the shadows. Although their behaviour can also be harsh, hurtful, and offensive, it is difficult to get hands on them. Acting through fake identities and using sophisticated persona- management software, fakeholders aim to violate their targets …
Constructing the platform-specific self-brand: The labor of social media promotion
L Scolere, U Pruchniewska… – Social Media+ …, 2018 – journals.sagepub.com
… Cite. Citation Tools. How to cite this article. If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click on download. How to cite this article …
Three Important Words: Corporate Social Responsibility—How and Where to Say Them
KS Jahdi – Responsibility and Governance, 2019 – Springer
… The same newspaper also reports that a number of large organisations now employ sophisticated ‘persona management software’ to create armies of virtual astrotufers, complete with fake IP (Internet Protocol) addresses, no-political interests and online histories …
Over the mask of innovation management in the world of Big Data
F Caputo, A Mazzoleni, AC Pellicelli, J Muller – Journal of Business …, 2019 – Elsevier
JavaScript is disabled on your browser. Please enable JavaScript to use all the features on this page. Skip to main content Skip to article …
People searched by people: Context-based selectiveness in online search
A Kuzminykh, E Lank – Proceedings of the 2016 ACM Conference on …, 2016 – dl.acm.org
… But I think it dangerous to even look at this stuff.” [P21, 12 years of hiring experience in software engineering industry] … As we began to explore this area of online content, online persona management, and online reputation, one characteristic we observed of much of the past …
Location Privacy and Utility in Geo-social Networks: Survey and Research Challenges
Z Riaz, F Dürr, K Rothermel – 2018 16th Annual Conference on …, 2018 – ieeexplore.ieee.org
… SCs I U2 enable purpose-driven sharing I/M U3 have interpretable representation Users & SCs I/M U4 allow persona management (implicit ser … Thus, the privacy algorithm executes on the device as a trusted software component and forms a gateway to location information for all …
You’re only as good as your last tweet…’: Academic Self-Branding and Knowledge Dissemination
G Balirano, M Rasulo – 2019 – unora.unior.it
… logics have increasingly infiltrated nearly all realms of social and professional life, information sharing and online persona management have become … Our multimodal analysis was aided by the ATLAS/ti software (Version 7.1.8), which offers quantitative tools to manage, extract …
Black Hat Trolling, White Hat Trolling, and Hacking the Attention Landscape
M Goerzen, J Matthews – 2019 – people.clarkson.edu
… Persona Management / Botherding The co-ordination of multiple sockpuppet accounts or their algorithmic automation as a botnet … In computer security, vulnerabilities are most often discussed in relation to technical systems like software code, hardware design, or network …
The Customer Engagement Approaches Of Influential Entrepreneurship
Y Zhou, DSV Kaartemo – 2018 – utupub.fi
Page 1. Turun kauppakorkeakoulu • Turku School of Economics THE CUSTOMER ENGAGEMENT APPROACHES OF INFLUENTIAL ENTREPRENEURSHIP Based on business related Customer Engagement approaches emerged on Weibo Master’s Thesis …
Social media and counterterrorism strategy
T Aistrope – Australian Journal of International Affairs, 2016 – Taylor & Francis
… Of particular concern was the revelation that the JPSY had contracted a Californian corporation to produce ‘persona management’ software that would allow a single psychological oper- ations operative to control up to 10 online identities with convincing backgrounds and …
Black Hat Trolling, White Hat Trolling, and Hacking the Attention Landscape
J Matthews, M Goerzen – Companion Proceedings of The 2019 World …, 2019 – dl.acm.org
… of social media accounts designed to appear as authentic individuals, typically using “data craft.”c Persona Management / Botherding The co … Landscape In computer security, vulnerabilities are most often discussed in relation to technical systems like software code, hardware …
Understanding “expert” scientists: Implications for management and organization research
V Dörfler, C Eden – Management Learning, 2019 – journals.sagepub.com
… Cite. Citation Tools. How to cite this article. If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click on download. How to cite this article …
Adoption and success of e-HRM in a cloud computing environment: a field study
RC Ziebell, J Albors-Garrigos… – International Journal of …, 2019 – igi-global.com
… notbeenappliedextensivelysofarandare usedlessforcontrollingandoptimizingHRprocesses. Newmetricswouldincreasetheacceptance ofthenewtechnologyandthusthesuccessoftheoverall HRtransformation.Themaincontribution isrelatedtothefieldofHRsoftwareadoptionof …
Entrepreneurship in marketing: Socializing partners for brand governance in EM firms
M Renton, JE Richard – Journal of Business Research, 2019 – Elsevier
… C1: Marketing Manager). With brand fans, opportunity co-creation arises primarily from information exchange, in particular, information gained through the company’s use of software to analyse engagement impact. For example …
Customer-centric service innovation in health care: findings from a case study
MV Ciasullo, S Cosimato, A Douglas – Sinergie Italian Journal of …, 2017 – ojs.sijm.it
… Software engineers updated the management software of the haemodiafiltration machines. This new software release connected patients to the digital platform through touch screen monitors and tablets, enabling real-time medical and non-medical data recording …
The role of technology support in knowledge management evolution in innovative companies
A Shpakova, V Dörfler… – EURAM 2018: 18th …, 2018 – strathprints.strath.ac.uk
… The analysis was conducted with the help of a specialised software, Decision Explorer1, and the example of a map for one company is presented on the Figure 4 … Abdallah, 2011). The codification of all interviews’ transcripts was conducted in NVivo software …
Brand Hijacked: Why Campaigns and Hashtags are Taken over by Audiences
V Luoma-aho, M Virolainen, M Lievonen… – Social, Mobile, and …, 2018 – jyx.jyu.fi
… Increasingly also non-human brandjacking is occurring including astroturf via boots and persona management software. Most often brandjacking is aimed at corporations or campaigns, but also NGOs and governmental entities in the public sector can face brandjacking …
Challenging truth and trust: A global inventory of organized social media manipulation
S Bradshaw, PN Howard – The Computational Propaganda …, 2018 – comprop.oii.ox.ac.uk
… Page 8. 8 persona management; pro-government; propaganda; psychological operations; psyops; social media; sock puppet*; troll*; Twitter … Automated accounts—also known as “political bots”—are pieces of software or code designed to mimic human behavior online …
Knowledge Management Paradigms, Philosophical Assumptions: An Outlook on Future Research
I Rechberg – American Journal of Management, 2018 – search.proquest.com
… Gummesson, E. (2006), Qualitative research in management: addressing complexity, context and persona. Management Decision 44(2), 167-179 … Oxford, UK: Oxford University Press. Pentland, BT (1992) Organizing moves in software support hot lines …
The Other Question
DJ Gunkel – Socialbots and Their Friends: Digital Media and the …, 2016 – books.google.com
… technology. Machines, even sophisticated information- processing devices like computers, smart phones, software algorithms, robots, etc., are technologies, and technologies, we have been told, are mere tools created and Page 250 …
Brand Hijacked
VL Luoma-aho, M Virolainen… – Social, Mobile, and …, 2018 – books.google.com
… Increasing- ly also non-human brandjacking is occurring including astroturf via boots and persona management software. Most often brandjacking is aimed at cor- porations or campaigns, but also NGOs and governmental entities in the public sector can face brandjacking …
Developing a system of systems management framework for the Fukushima Daiichi Nuclear disaster recovery
I Gunawan, A Gorod, L Hallo… – … Conference on System …, 2017 – ieeexplore.ieee.org
… The SD approach utilises user- friendly software, which produces both the conceptual model and the mathematical model … 1199-1213,2016. E. Gummesson, “Qualitative research in management: Addressing complexity, context and persona,” Management Decision, vol. 44, pp …
Integrating embeddedness with dynamic capabilities in the internationalisation of fashion retailers
M Frasquet, J Dawson, H Calderón, T Fayos – International Business …, 2018 – Elsevier
Skip to main content Skip to article …
Building trust in cross-cultural integration: A study of Chinese mergers and acquisitions in Germany
S Sachsenmaier, Y Guo – International Journal of Cross …, 2019 – journals.sagepub.com
… Cite. Citation Tools. How to cite this article. If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click on download. How to cite this article …
Usage of academic social networking sites by Karachi social science faculty: Implications for academic libraries
MY Ali, J Richardson – IFLA journal, 2018 – journals.sagepub.com
… Cite. Citation Tools. How to cite this article. If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click on download. How to cite this article …
3. Manipulated:“Which Ice Cube Is the Best?”
J Reagle – Reading the Comments, 2019 – readingthecomments.mitpress.mit …
… The US military uses sophisticated “persona management software” (that is, sockpuppets) to support “classified social media activities outside the US, intended to counter violent extremist ideology and enemy propaganda.” Other nations have been documented using these …
A knowledge-based view of people and technology: directions for a value co-creation-based learning organisation
F Caputo, A Garcia-Perez, V Cillo… – Journal of Knowledge …, 2019 – emerald.com
This paper aims to investigate the potential of knowledge management (KM) as a discipline in helping understand and manage social and economic complexity. The paper highlights some of the potential relationships between KM in organisations and their economic performance …
Mastering VMware Horizon 7.8: master desktop virtualization to optimize your end user experience
P Von Oven, B Coombs – 2019 – books.google.com
… UEM UEM or Persona Management? Printing from a virtual desktop machine Managing USB devices Filtering supported USB devices Managing multi-function USB devices ThinApp application virtualization How does application virtualization work? Antivirus software for virtual …
Supporting location privacy in geo-social networks
Z Riaz – 2019 – elib.uni-stuttgart.de
… ix Page 10. List of Figures 3.1 Inside the mobile device, the trusted software agent (TSA) controls … SCMs Semantic Cloaking Mechanism SDR Selective Dead Reckoning SU Selective Update SVM Support-Vector Machine TSA Trusted Software Agent xviii Page 19. Abstract …
The Catalyzing Role of FinTechs for Innovation Sourcing in Financial Services
H Gewald, HT Wagner, B Wolff – 2019 – pacis2019.org
… Although the bank’s acute innovation need is often directly focused on explicit knowledge assets such as customer facing software products the positive spillover … “Qualitative Research in Management: Addressing Complexity, Context and Persona,” Management Decision (44:2 …
Profit Is Not a Dirty Word’: Social Entrepreneurship and Community Development
A Duarte Alonso, S Kok, S O’Brien – Journal of Social …, 2019 – Taylor & Francis
Skip to Main Content …
Sheryl Sandberg and Roxane Gay: The Limits and Possibilities of Contemporary Blockbuster Feminism
A Taylor – Celebrity and the Feminist Blockbuster, 2016 – Springer
Focusing on the heterogeneity of blockbuster celebrity feminism, its limits and its possibilities, this chapter uses Sheryl Sandberg’s Lean In and Roxane Gay’s Bad Feministto consider the politics…
Dynamic capabilities of media entrepreneurial firms: a case study of Chinese new media startups
Y Wu – 2018 – trepo.tuni.fi
Page 1. Dynamic Capabilities of Media Entrepreneurial Firms ——A Case Study of Chinese New Media Startups Yiying Wu University of Tampere Faculty of Communication Science Degree Program in Media Management M. Sc. thesis. Supervisor: Risto Kunelius …
Fast Cognitive And Task Oriented, Iterative Data Display (FACTOID)
J Poore – 2017 – apps.dtic.mil
… Draper developed the Software as a Sensor™ (SensSoft) capability, which turns analytics software applications themselves into measurement mediums for usability and adoptability … SUBJECT TERMS Usability Testing; Software as a Sensor; Software evaluation; User modeling …
Qualitative research in marketing: what can academics do better?
JM Crick – Journal of Strategic Marketing, 2020 – Taylor & Francis
ABSTRACTQualitative research is designed to generate in-depth and subjective findings to build theory. Combined with the quantitative bias of top-tier journals, many qualitative researchers do not …
Inside-out and outside-in mental models: a top executive perspective
M Yrjölä, H Kuusela, K Neilimo… – European Business …, 2018 – emerald.com
The purpose of this paper is to identify and characterise executives’ inside-out (firm-oriented) and outside-in (market-oriented) mental models. As these two orientations are vital for strategic decision-making, yet potentially contradictory, it is important to understand the role of inside …
Empirical Issues and Challenges for Multilevel Governance: The Case of the 2010 Vancouver Olympic Winter Games
M Parent, C Rouillard, JL Chappelet – Revue Gouvernance, 2018 – erudit.org
… Degree (number of ties), betweenness (ability to control information), and eigenvector (degree of importance) normalized centrality measures and were computed using the UCINET 6.0 network analysis software (Borgatti, Everett, & Freeman, 2002), as was density and in- and …
Information exchange within horizontal relationships: A fuzzy-set approach to companies’ characteristics role
JN Santos, CS Baptista – Journal of Business Research, 2016 – Elsevier
… Employees average, emp_ave, Direct calibration — breakpoints: 658, 370.5, 83. 4. Results and discussion. Using the fsQCA software package (version 2.5), the first phase of the analysis addresses the conditions necessary for the outcome and the negation of the outcome …
Action Research as a Viable Methodology in Entrepreneurship Research
C Schultz, D Mietzner, F Hartmann – Complexity in Entrepreneurship …, 2016 – Springer
… of quantitative methodologies, the acceptance of the positivistic paradigm in general, the scarcity of well-researched non-quantitative research studies or just the easy availability of processing power and statistical software, are ongoing … Management Decision, 44(2), 167–179.
Patient perspectives on transitions of surgical care: examining the complexities and interdependencies of care
MG González, KN Kelly, AM Dozier… – Qualitative health …, 2017 – journals.sagepub.com
… Cite. Citation Tools. How to cite this article. If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click on download. How to cite this article …
Professional staff in universities: Career needs, values, attitudes and behaviours
M Gander – Australian Journal of Career Development, 2018 – journals.sagepub.com
… Cite. Citation Tools. How to cite this article. If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click on download. How to cite this article …
User Model Interoperability In Education
K Karoudis, GD Magoulas – … and Data Mining in Education: Global …, 2018 – books.google.com
… User Model Interoperability In one of the early definitions of the term, interoperability is described as the ability of two or more software components to exchange data and cooperate … xAPI supports persona management for allowing selective access to one’s personal data …
Conspiracy, misinformation and public diplomacy
T Aistrope – Conspiracy theory and American foreign policy, 2016 – manchesterhive.com
Jump to Content Jump to Main Navigation …
Broadening the business model construct: Exploring how family-owned SMEs co-create value with external stakeholders
JR Gamble, E Clinton, V Díaz-Moriana – Journal of Business Research, 2020 – Elsevier
… 1997). We inputted our data sources into NVivo (version 11) as it is considered the benchmark analysis software for qualitative analysis of both interview data (Bazeley & Jackson, 2013) and archival data (Di Gregorio, 2000) …
Subversion practices: From coercion to attraction
SA Samoilenko – Experiencing Public Relations: International voices …, 2018 – academia.edu
… For example, the United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, has awarded contracts to companies to develop persona management software that will allow its military personnel to secretly propagate pro …
Oral Presentaton Abstracts
M PATTERN, OF ANALGESICS… – Indian Journal of …, 2018 – pdfs.semanticscholar.org
… Dual assessments were done, one at admission and another at discharge. The data was analysed using SPSS software version17 … The study was approved by Institutional Ethics Committee. Frequencies of variables were obtained by using Epi Info software (Version 7.2.1.0) …
Revolution in Egypt: Political Movements and Mobilisation of Resources
FH Abdullah – Insight on Africa, 2020 – journals.sagepub.com
… Cite. Citation Tools. How to cite this article. If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click on download. How to cite this article …
Human resource metrics: Action Research in an Indian firm
K Mukherjee – ALAR: Action Learning and Action …, 2016 – search.informit.com.au
… ALAR Journal Vol 22 No 1 December 2016 Page 41 Planning (ERP) software had been introduced in the recent past and employees were expected to update the system (the middle- of–the–way solution adopted was to have a set of clerical staff keying in data) …
Institutional networks for supporting the internationalisation of SMEs: the case of industrial business associations
E Costa, AL Soares, JP de Sousa – Journal of Business & Industrial …, 2017 – emerald.com
… These transcriptions were made using the qualitative data analysis software MAXQDA. After the transcriptions, the interviews were coded, using again the MAXQDA software, allowing an extraction of the relevant results and insights from the interviewees …
Characteristics and performance of SA most empowered companies
PK Ndlangamandla – 2017 – wiredspace.wits.ac.za
Page 1. MASTER OF MANAGEMENT IN FINANCE AND INVESTMENT WITS BUSINESS SCHOOL UNIVERSITY OF WITWATERSRAND PHIWOKWAKHE KENNETH NDLANGAMANDLA STUDENT NUMBER: 1276989 TITLE …
Creating social value through entrepreneurship: the social business model of La Paranza
R Canestrino, M ?wiklicki, P Di Nauta, P Magliocca – Kybernetes, 2019 – emerald.com
… the detail of the answers and the order of the questions. Because of the small volume of data, no text analysis software was used (Zalan and Lewis, 2004). Despite this, coding of themes was inductively carried out (Saldana, 2009 …
Consensus on the Effective Employment of Hybrid Airships in Future Disaster Logistics
SR Lynch – 2018 – search.proquest.com
Page 1. CONSENSUS ON THE EFFECTIVE EMPLOYMENT OF HYBRID AIRSHIPS IN FUTURE DISASTER LOGISTICS by Sarah R. Lynch ASHRAF ESMAIL, PhD, Faculty Mentor and Chair KATHY MCCOY, PhD, Committee Member …
The future of free speech, trolls, anonymity and fake news online
H Rainie, JQ Anderson, J Albright – 2017 – pdfs.semanticscholar.org
… libel campaigns against ‘enemies of the state,’ paranoid war-on-terror rhetoric—has become the playbook of all states, to some extent (see, eg, the HB Gary leak that revealed US Air Force was putting out procurement tenders for ‘persona management’ software that allowed …
Empirical Issues and Challenges for Multilevel Governance: The Case of the 2010 Vancouver Olympic
W Games – Revue Gouvernance Volume, 2018 – pdfs.semanticscholar.org
… Degree (number of ties), betweenness (ability to control information), and eigenvector (degree of importance) normalized centrality measures and were computed using the UCINET 6.0 network analysis software (Borgatti, Everett, & Freeman, 2002), as was density and in- and …
Perceptions of smart object/services: a qualitative inquiry
A Saarelainen – 2017 – trepo.tuni.fi
… Traditional firms selling industrial products are selling services and firms selling modern products such as software, are also doing the same thing. (Iansiti & … provided by the Internet and related technologies, such as embedded sensors, processors, software, and connectivity …
Safe Social Spaces
AE Waldman – Wash. UL Rev., 2018 – HeinOnline
… With respect to online spaces, I follow Woodrow Hartzog in his book, Privacy’s Blueprint, which defines design as the “processes that create consumer technologies and the results of their creative processes instantiated in hardware and software.” WOODROW HARTZOG …
Language Variation and Social Identity in Beijing
H Zhao – 2018 – qmro.qmul.ac.uk
… or contain any confidential material. I accept that the College has the right to use plagiarism detection software to check the electronic version of the thesis. I confirm that this thesis has not been previously submitted for the award of a degree by this or any other university …
Predicting Episodes of Non-Conformant Mobility in Indoor Environments
K Jayarajah, A Misra – Proceedings of the ACM on Interactive, Mobile …, 2018 – dl.acm.org
Page 1. 172 Predicting Episodes of Non-Conformant Mobility in Indoor Environments KASTHURI JAYARAJAH, Singapore Management University ARCHAN MISRA, Singapore Management University Traditional mobility prediction …
Social network sites for scientists: a quantitative survey
JL Ortega – 2016 – books.google.com
Page 1. Chandos Information Professional Series CP CH AND cºs PUBLISHING Social Network Sites for Scientists A Quantitative Survey José Luis Ortega Page 2. SOCIAL NETWORK SITES FOR SCIENTISTS Page 3. Chandos …
The daily drucker
P Drucker – 2018 – books.google.com
… Inertia Abandonment Practice of Abandonment Knowledge Workers: Asset Not Cost Autonomy in Knowledge Work The New Corporation’s Persona Management as the … a sick patient, teaching a student, building a bridge, designing and selling a “user-friendly” software program …
Fake Politics: How Corporate and Government Groups Create and Maintain a Monopoly on Truth
J Bisnoff – 2019 – books.google.com
… The Daily Kos reported on the HBGary leak and that it showed companies using “persona management software” aimed at increasing the effectivity of astroturfing operatives as they work their magic of making a single blade of astroturf appear as though it is a field of grassroots …
An Investigation of Social and Economic Aspects of Structural Embeddedness in an ICT Research Network Based in the European Union
Z Dooly – 2018 – repository.wit.ie
Page 1. An Investigation of Social and Economic Aspects of Structural Embeddedness in an ICT Research Network Based in the European Union By Ms. Zeta Dooly BBS, MBS Submitted in Fulfilment of the Doctorate in Business Administration School of Business …
Threat vectors
J Butterworth – Handbook of SCADA/Control Systems …, 2016 – content.taylorfrancis.com
… Pirate Pad, TOR, VPS, Proxy, Trac phones (amateur) ham radio, persona management all have an inherent flaw … Software exists today that allows forensically sterile reach into your end points; to preserve and analyze data far faster than a response team can physically deploy …
Co-Creation Of Value Model For E-Service System Of Malaysian E-Government Context Using Hermeneutic Phenomenology …
A SUBBIAH – 2017 – eprints.utm.my
… various levels and the recorded results. Later, cross case analysis will be conducted and the results from the studies were analyzed using qualitative analysis software. Chapter 6 includes the process of structuring the analysis towards useful …
Investment Risks: An Analytical Study Of The Risk Reduction Strategies Used In Deciding Investments In Start-Ups.
SO Shokunbi – 2019 – go.griffith.ie
Page 1. INVESTMENT RISKS: AN ANALYTICAL STUDY OF THE RISK REDUCTION STRATEGIES USED IN DECIDING INVESTMENTS IN START-UPS. Research dissertation presented in partial fulfilment of the requirements for the degree of MSc in Accounting and Finance …
Perspectives on e-HRM in the Multinational Setting
JP Heikkilä – 2016 – osuva.uwasa.fi
… discussions from the enterprise resource planning (ERP) field of studies. ERP applications are software suites that help organizations integrate their information flow and business processes and typically support the di?erent …
Chinese Stardom in Participatory Cyberculture
DWS Lau – 2018 – library.oapen.org
… It is, hence, de-substantialised – present with or without any historical, cultural, or signifying coordinates. It becomes an open signifier in which various interests with regard to persona management, discursive power, and cinephilia may converge and interact …
Manufacturing Consensus: Computational Propaganda and the 2016 US Presidential Election
SC Woolley – 2018 – digital.lib.washington.edu
… These automated software actors are also useful in understanding novel relationships between technology and society. Page 5. 5 Table of Contents … Political bots are best defined as software programs used to automate social media profiles in attempts to …
Keeping up with the times: Technological change at work-the perspectives of Swedish workers aged 55-64
N Jokela – 2020 – diva-portal.org
… new technology. “When you have new software or equipment upgrades or new online tools to deploy in the workplace, it may mean a bit of extra effort to get your older workers up to speed (Leopold, 2016, p. 275)”. These findings …
Style-shifting and accommodative competence in Late Middle English written correspondence: Putting Audience Design to the test of time
JM Hernández-Campoy, T García-Vidal – Folia Linguistica, 2018 – degruyter.com
AbstractStyle constitutes an essential component for the non-referential indexicality of speakers’ sociolinguistic behaviour in interpersonal communication. Historical Sociolinguistics applies tenets and findings of present-day research to the interpretation of linguistic material from …
The Adoption Of Digital Marketing Among SMEs In Ghana: Increasing Profitability and Bridging the Digital Divide Using Social Media
B Zaglago – 2019 – doria.fi
… Social media can be said to be the composition of various internet-based applications and software that helps in augmenting … ICT and the use of software, expensive internet packages from telecommunications companies in …
Social Capital Online
KX Faucher – 2018 – uwestminsterpress.co.uk
… Beyond being merely a concern for network analysts and social software engineering, we may grasp this control of data in terms of power, and the trade-off being a user’s potential to accumulate social capital as one of the markers of status …
Communication: A post-discipline
S Waisbord – 2019 – books.google.com
Page 1. Communication A Post-Discipline Silvio Waisbord Page 2. CONTENTS Cover Front Matter Introduction 1 Fragmentation and Hyper-Specialization Why fragmentation? The meanings of communication Communication …
Enhancing the Impact of Research at Federal Research Organizations
JF Kane – 2019 – search.proquest.com
Page 1. Running head: ENHANCING FEDERAL RESEARCH IMPACT 1 ‘The author’s affiliation with The MITRE Corporation is provided for identification purposes only and is not intended to convey or imply MITRE’s concurrence …
Government Financing of SMEs: A case study of the Swedish business development check for internationalization
A Eriksson – 2017 – diva-portal.org
Page 1. Government Financing of SMEs A case study of the Swedish business development check for internationalization Author: Eriksson, Alexander Supervisor: Bonnedahl, Karl Johan Student Umeå School of Business and …
The impact of virtual literacy communities in an English language arts classroom: a case study using Goodreads
MD Duvall – 2017 – idea.library.drexel.edu
… literacy practices and events, by activating their skills in other literacy domains such as online persona management (the ability to create and manage an effective online identity) and network literacy (the ability to produce and consume information in meaningful and …
A Performance Comparison of VMware GPU Virtualization Techniques in Cloud Gaming
Z Zhuo – 2016 – pdfs.semanticscholar.org
… ating environments, using methodologies like hardware and software partitioning or aggregation, partial or … well-virtualized with performance guarantees by using software-based virtualization techniques such as full virtualization and para-virtualization [14] …
The Theories and Practice of Inter-agency Working Across the Public Sector: A Critical Overview of Implementing Collaboration Within Social Services in …
T Garthwaite – 2016 – search.proquest.com
… Details of how positive and negative statements were classified are in the report (pl0). NVivo was chosen as the preferred system of computer-assisted qualitative data-analysis software (CAQDAS) because of its ability to store, manage and analyse qualitative data …
New Technologies and Branding
P Sachetti, T Zuppinger – 2018 – Wiley Online Library
… 105 5.2.1. Astroturfing . . . . . 105 5.2.2. Persona management . . . . . 110 Page 7. viii New Technologies and Branding 5.2.3. Google bombing …
Covert action and cyber offensive operations: revisiting traditional approaches in light of new technology
W Carruthers – 2018 – usir.salford.ac.uk
… through the use of malware. Malware is software that is introduced into a computer … Information warfare, was defined as ‘either remotely or on-site, a computer, or data banks with the intent of altering or destroying the hardware, software, or information in the computer, is …
Lone Wolf and Autonomous Cell Terrorism
J Kaplan, H Lööw, L Malkki – 2017 – books.google.com
Page 1. Lone Wolf and Autonomous Cell Terrorism Edited by Jeffrey Kaplan, Heléne Lööw and Leend Molkki Page 2. Lone Wolf and Autonomous Cell Terrorism President Obama has declared that the greatest terrorist threat which America faces is attacks by lone wolf terrorists …
Politics and social media
D Gayo-Avello – Unpublished manuscript, 2016 – danigayo.info
Click in the button to see annotations by other readers and to add your own. Politics and social media. Daniel Gayo-Avello. Get it on PDF format …
Troll Factories: Russia’s Web Brigades
A Karpan – 2018 – books.google.com
… before Russian trolls began dominating our headlines, the United States Military Central Command began using an “online persona management service” to … “Software like this has the potential to destroy the internet as a forum for constructive debate,” warned the British activist …