- Table View
- List View
Social Customer Relationship Management: Grundlagen, Anwendungen und Technologien
by Rainer Alt Olaf ReinholdDieses Buch zeigt wie die Verbindung von Social Media mit Customer Relationship Management (CRM) Perspektiven für Marketing, Verkauf und Service schafft. Es kombiniert dazu Grundlagenwissen und Fallbeispiele. Für das Social CRM identifizieren die Autoren vier Verwendungszwecke sowie drei Umsetzungsstufen und thematisieren auch Fragen der Datenerschließung und der Datenqualität. Es richtet sich sowohl an Praktiker als auch an Lehrende und Studierende.
Social Data Analytics
by Amin Beheshti Samira Ghodratnama Mehdi Elahi Helia FarhoodThis book is an introduction to social data analytics along with its challenges and opportunities in the age of Big Data and Artificial Intelligence. It focuses primarily on concepts, techniques and methods for organizing, curating, processing, analyzing, and visualizing big social data: from text to image and video analytics. It provides novel techniques in storytelling with social data to facilitate the knowledge and fact discovery. The book covers a large body of knowledge that will help practitioners and researchers in understanding the underlying concepts, problems, methods, tools and techniques involved in modern social data analytics. It also provides real-world applications of social data analytics, including: Sales and Marketing, Influence Maximization, Situational Awareness, customer success and Segmentation, and performance analysis of the industry. It provides a deep knowledge in social data analytics by comprehensively classifying the current state of research, by describing in-depth techniques and methods, and by highlighting future research directions. Lecturers will find a wealth of material to choose from for a variety of courses, ranging from undergraduate courses in data science to graduate courses in data analytics.
Social Data Visualization with HTML5 and JavaScript
by Simon TimmsThis book is a fast-paced guide full of step-by-step instructions that teach you how to visualize social data using HTML5 and JavaScript.This book is for developers who are excited about data and who want to share that excitement with others. Developers who are interested in the data which can be extracted from social networks will also find this book hugely beneficial.Readers should have a working knowledge of both JavaScript and HTML.
Social eCommerce: Increasing Sales and Extending Brand Reach
by Stephan Spencer Jimmy Harding Jennifer SheahanWant to make money online? Then ignore social media at your own risk. Social media is vital if you want to your business to thrive, and though you can’t control the conversations, you can influence them. This book will teach you how.If mismanaged, social media can create more noise than signal. It can be a time and energy suck—for you and your audience. Or worse still, it can become an echo chamber for negative PR.If done well, guerrilla social media marketing can help you persuade, command attention, establish dialogue, differentiate yourself, capture new markets, and outmaneuver the competition—all on a shoestring budget. Whether you’re selling digital goods and services, physical goods, or local services, this book has the answers.Strategize and optimize your social presence in ways you didn’t know were possibleDrive more clicks and sales with better-performing Facebook adsDevelop remarkable content with viral potentialManage your online reputation, instead of letting it manage youIntegrate social media into your SEO strategy, and vice versaLeverage online influencers to promote your brand, and become an influencer yourself
Social eCommerce
by Stephan Spencer Jennifer Sheahan Jimmy HardingWant to make money online? Then ignore social media at your own risk. Social media is vital if you want to your business to thrive, and though you can't control the conversations, you can influence them. This book will teach you how.If mismanaged, social media can create more noise than signal. It can be a time and energy suck--for you and your audience. Or worse still, it can become an echo chamber for negative PR.If done well, guerrilla social media marketing can help you persuade, command attention, establish dialogue, differentiate yourself, capture new markets, and outmaneuver the competition--all on a shoestring budget. Whether you're selling digital goods and services, physical goods, or local services, this book has the answers.Strategize and optimize your social presence in ways you didn't know were possibleDrive more clicks and sales with better-performing Facebook adsDevelop remarkable content with viral potentialManage your online reputation, instead of letting it manage youIntegrate social media into your SEO strategy, and vice versaLeverage online influencers to promote your brand, and become an influencer yourself
Social Edge Computing: Empowering Human-Centric Edge Computing, Learning and Intelligence
by Dong Wang Daniel 'Yue' ZhangThe rise of the Internet of Things (IoT) and Artificial Intelligence (AI) leads to the emergence of edge computing systems that push the training and deployment of AI models to the edge of networks for reduced bandwidth cost, improved responsiveness, and better privacy protection, allowing for the ubiquitous AI that can happen anywhere and anytime. Motivated by the above trend, this book introduces a new computing paradigm, the Social Edge Computing (SEC), that empowers human-centric edge intelligent applications by revolutionizing the computing, intelligence, and the training of the AI models at the edge. The SEC paradigm introduces a set of critical human-centric challenges such as the rational nature of edge device owners, pronounced heterogeneity of the edge devices, real-time AI at the edge, human and AI interaction, and the privacy of the edge users. The book addresses these challenges by presenting a series of principled models and systems that enable the confluence of the computing capabilities of devices and the domain knowledge of the people, while explicitly addressing the unique concerns and constraints from humans. Compared to existing books in the field of edge computing, the vision of this book is unique: we focus on the social edge computing (SEC), an emerging paradigm at the intersection of edge computing, AI, and social computing. This book discusses the unique vision, challenges and applications in SEC. To our knowledge, keeping humans in the loop of edge intelligence has not been systematically reviewed and studied in an existing book. The SEC vision generalizes the current machine-to-machine interactions in edge computing (e.g., mobile edge computing literature), and machine-to-AI interactions (e.g., edge intelligence literature) into a holistic human-machine-AI ecosystem.
The Social-Emotional Learning Upgrade: Merging SEL and Technology Curricula to Support Young Learners
by Christopher J. KazanjianThe Social-Emotional Learning Upgrade explores how today’s educators can connect two previously separated but important curricula in their schools: social-emotional learning (SEL) and educational technology. With schools’ SEL efforts pressed for time and resources and digital engagements often limited to skill development, K-12 students risk being unprepared to sustain their well-being and personal opportunities in a rapidly changing, technology-dependent world. Driven by a paradigm that synthesizes multicultural education and humanistic psychology, this book readies educators to implement SEL curricula that will support young learners as they navigate constant social and technological flux and that will nurture their unique perceptions of reality, their aspirations, and their mental and physical health. Each chapter’s novel insights will help to mitigate both student disengagement and teacher demoralization, enabling classroom pedagogies and the process of schooling to better align with the ways in which learners explore, express, and create meaning. Guiding pre-service teachers, leaders, and curriculum developers beyond common goals such as digital skills development, content mastery, or standardized testing, this volume focuses instead on complex digital literacies, collaborative experiences, problem- and project-based learning, culturally relevant pedagogies, and overall holistic growth.
Social Engineering: Hacking Systems, Nations, and Societies
by Michael ErbschloeThis book analyzes of the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how social engineering techniques are employed well beyond what hackers do to penetrate computer systems. And it explains how organizations and individuals can socially engineer their culture to help minimize the impact of the activities of those who lie, cheat, deceive, and defraud. After reading this book, you’ll be able to analyze how organizations work and the need for security to maintain operations and sustainability, and be able to identify, respond to and counter socially engineered threats to security.
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulativ e Communication
by Robert W. Gehl Sean T. LawsonManipulative communication—from early twentieth-century propaganda to today&’s online con artistry—examined through the lens of social engineering. The United States is awash in manipulated information about everything from election results to the effectiveness of medical treatments. Corporate social media is an especially good channel for manipulative communication, with Facebook a particularly willing vehicle for it. In Social Engineering, Robert Gehl and Sean Lawson show that online misinformation has its roots in earlier techniques: mass social engineering of the early twentieth century and interpersonal hacker social engineering of the 1970s, converging today into what they call &“masspersonal social engineering.&” As Gehl and Lawson trace contemporary manipulative communication back to earlier forms of social engineering, possibilities for amelioration become clearer. The authors show how specific manipulative communication practices are a mixture of information gathering, deception, and truth-indifferent statements, all with the instrumental goal of getting people to take actions the social engineer wants them to. Yet the term &“fake news,&” they claim, reduces everything to a true/false binary that fails to encompass the complexity of manipulative communication or to map onto many of its practices. They pay special attention to concepts and terms used by hacker social engineers, including the hacker concept of &“bullshitting,&” which the authors describe as a truth-indifferent mix of deception, accuracy, and sociability. They conclude with recommendations for how society can undermine masspersonal social engineering and move toward healthier democratic deliberation.
Social Engineering: The Art of Human Hacking
by Christopher HadnagyThe first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick-one of the most famous social engineers in the world-popularized the term "social engineering. " He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. Examines social engineering, the science of influencing a target to perform a desired task or divulge information Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access Reveals vital steps for preventing social engineering threats Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers-now you can do your part by putting to good use the critical information within its pages.
Social Engineering: The Science of Human Hacking
by Christopher HadnagyHarden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker’s repertoire—why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the “system” in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer’s bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don’t work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer’s playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.
Social Engineering and Nonverbal Behavior Set
by Christopher HadnagySocial Engineering: The Art of Human HackingFrom elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.Examines social engineering, the science of influencing a target to perform a desired task or divulge informationArms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system accessReveals vital steps for preventing social engineering threatsUnmasking the Social Engineer: The Human Element of SecurityFocuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the connection of non-verbal behavior to social engineering and scamming.Clearly combines both the practical and technical aspects of social engineering securityReveals the various dirty tricks that scammers usePinpoints what to look for on the nonverbal side to detect the social engineer
Social Engineering in Cybersecurity: Threats and Defenses
by Dr Gururaj H L Dr Janhavi V Ambika VIn today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. Social engineering attacks have emerged as a formidable and often underestimated threat to information security. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks. The book seeks to equip cybersecurity professionals, IT practitioners, students, and anyone concerned with information security with the knowledge and tools needed to recognize, prevent, and mitigate the risks posed by social engineering. The scope of this textbook is broad and multifaceted. It covers a wide range of social engineering attack vectors, including phishing, vishing, pretexting, baiting, tailgating, impersonation, and more. Each attack vector is dissected, with detailed explanations of how they work, real-world examples, and countermeasures. Key Features • Comprehensive Coverage: Thorough exploration of various social engineering attack vectors, including phishing, vishing, pretexting, baiting, quid pro quo, tailgating, impersonation, and more. • Psychological Insights: In-depth examination of the psychological principles and cognitive biases that underlie social engineering tactics. • Real-World Case Studies: Analysis of real-world examples and high-profile social engineering incidents to illustrate concepts and techniques.• Prevention and Mitigation: Practical guidance on how to recognize, prevent, and mitigate social engineering attacks, including security best practices. • Ethical Considerations: Discussion of ethical dilemmas and legal aspects related to social engineering that emphasizes responsible use of knowledge. This comprehensive textbook on social engineering attacks provides a deep and practical exploration of this increasingly prevalent threat in cybersecurity. It covers a wide array of attack vectors, including phishing, vishing, pretexting, and more, offering readers an in-depth understanding of how these attacks work. The book delves into the psychology behind social engineering and examines the cognitive biases and emotional triggers that make individuals susceptible. Real-world case studies illustrate concepts and techniques while practical guidance equips readers with the knowledge to recognize, prevent, and mitigate social engineering threats.
Social Engineering und Human Hacking: Strategien zur Prävention und Abwehr von Manipulationstechniken in der IT
by Erfan Koza Asiye Öztürk Michael WillerEntdecken Sie die psychologischen Tricks und Techniken, mit denen Human Hacker Ihre persönlichen Gefühle, Eigenschaften und digitale Verhaltensmuster ausnutzen, um die Informationssicherheit gezielt zu kompromittieren. Dieses Lehrbuch bietet Ihnen einen spielerischen Ansatz, um die Funktionsweise von Social Engineering zu verstehen und sich erfolgreich dagegen zu verteidigen. Erfahren Sie zudem, wie Sie Ihre Wahrnehmung schärfen, Ihre Emotionen kontrollieren und effektive Abwehrstrategien entwickeln können, um Ihre Daten und Ihr Unternehmen vor den Taktiken der Angreifer zu schützen. Ausgestattet mit psychologischen Denkmodellen sowie Abwehrstrategien, werden Sie bereit sein, sich den Herausforderungen des modernen Sicherheitsumfelds zu stellen.
Social Group Utility Maximization
by Xiaowen Gong Xu Chen Lei Yang Junshan ZhangThis SpringerBrief explains how to leverage mobile users' social relationships to improve the interactions of mobile devices in mobile networks. It develops a social group utility maximization (SGUM) framework that captures diverse social ties of mobile users and diverse physical coupling of mobile devices. Key topics include random access control, power control, spectrum access, and location privacy. This brief also investigates SGUM-based power control game and random access control game, for which it establishes the socially-aware Nash equilibrium (SNE). It then examines the critical SGUM-based spectrum access game, and pseudonym change game for personalized location privacy. The authors propose future work on extending the SGUM framework to negative social ties, to demonstrate relevance to security applications and span the continuum between zero-sum game (ZSG) and non-cooperative game (NCG). Social Group Utility Maximization targets researchers and professionals working on mobile networks and social networks. Advanced-level students in electrical engineering and computer science will also find this material useful for their related courses.
A Social History of Contemporary Democratic Media (Routledge Research in Cultural and Media Studies)
by Jesse DrewThe last few decades have helped dispel the myth that media should remain driven by high-end professionals and market share. This book puts forward the concept of "communications from below" in contrast to the "globalization from above" that characterizes many new developments in international organization and media practices. By examining the social and technological roots that influence current media evolution, Drew allows readers to understand not only the Youtubes and Facebooks of today, but to anticipate the trajectory of the technologies to come. Beginning with a look at the inherent weaknesses of the U.S. broadcasting model of mass media, Drew outlines the early 1960s and 1970s experiments in grassroots media, where artists and activists began to re-engineer electronic technologies to target local communities and underserved audiences. From these local projects emerged national and international communications projects, creating production models, social networks and citizen expectations that would challenge traditional means of electronic media and cultural production. Drew’s perspective puts the social and cultural use of the user at the center, not the particular media form. Thus the structure of the book focuses on the local, the national, and the global desire for communications, regardless of the means.
Social Influence on Digital Content Contribution and Consumption: Theories, Empirical Analyses, and Practices (Management for Professionals)
by Xuejing MaThis book examines users’ digital content contribution and consumption behavior from a social perspective. Digital content is everywhere—from search results on search engines to posts on social media. Incentivizing users to contribute abundant content and motivating users to engage in and pay for digital content are vital for online platforms, especially those relying on digital content generated by users. This book develops a theoretical framework to incorporate social influence, including social presence, social interaction, social comparison, social loafing, and social relationships, in users’ digital content contribution and consumption decisions. Further, using a large volume of data from online platforms, the author empirically studies the role of social interaction in digital content provision and monetization from the supply side. Also, regarding the digital content demand side, this book explores how to boost content consumption via social motives and social norms. The book enriches the understanding of social influence in digital content contribution and consumption and provides practical suggestions for digital platforms’ mechanism design.
Social Informatics: 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part I (Lecture Notes in Computer Science #10046)
by Emma Spiro and Yong-Yeol AhnThe two-volume set LNCS 10046 and 10047 constitutes the proceedings of the 8th International Conference on Social Informatics, SocInfo 2016, held in Bellevue, WA, USA, in November 2016. The 36 full papers and 39 poster papers presented in this volume were carefully reviewed and selected from 120 submissions. They are organized in topical sections named: networks, communities, and groups; politics, news, and events; markets, crowds, and consumers; and privacy, health, and well-being.
Social Informatics: 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part II (Lecture Notes in Computer Science #10047)
by Emma Spiro and Yong-Yeol AhnThe two-volume set LNCS 10046 and 10047 constitutes the proceedings of the 8th International Conference on Social Informatics, SocInfo 2016, held in Bellevue, WA, USA, in November 2016. The 33 full papers and 34 poster papers presented in this volume were carefully reviewed and selected from 120 submissions. They are organized in topical sections named: networks, communities, and groups; politics, news, and events; markets, crowds, and consumers; and privacy, health, and well-being.
Social Informatics (Global Perspectives on Library and Information Science)
by Noriko Hara Pnina FichmanSocial informatics examines how society is influenced by digital technologies and how digital technologies are shaped by political, economic, and socio-cultural forces. The chapters in this edited volume use social informatics approaches to analyze recent issues in our increasingly data-intensive society.Taking a social informatics perspective, this edited volume investigates the interaction between society and digital technologies and includes research that examines individuals, groups, organizations, and nations, as well as their complex relationships with pervasive mobile and wearable devices, social media platforms, artificial intelligence, and big data. This volume’s contributors range from seasoned and renowned researchers to upcoming researchers in social informatics. The readers of the book will understand theoretical frameworks of social informatics; gain insights into recent empirical studies of social informatics in specific areas such as big data and its effects on privacy, ethical issues related to digital technologies, and the implications of digital technologies for daily practices; and learn how the social informatics perspective informs research and practice.Social Informatics provides the first book-length overview of Social Informatic research in recent years and will be essential reading for academics and students engaged in the study of information science, internet studies, emerging technologies, digital media, new media studies, computer science, the sociology of communication, and data science.
Social Informatics: 13th International Conference, SocInfo 2022, Glasgow, UK, October 19–21, 2022, Proceedings (Lecture Notes in Computer Science #13618)
by Frank Hopfgartner Kokil Jaidka Philipp Mayr Joemon Jose Jan BreitsohlThis book constitutes the refereed proceedings of the 13th International Conference on Social Informatics, SocInfo 2022, which took place in Glasgow, UK, during October 19-21, 2022. The 22 full papers, 8 short papers, and 4 late breaking papers included in this book were carefully reviewed and selected from 102 submissions. The deal with topics ranging from information-system design on social concepts to analyzing complex social systems using computational methods or explore socio-technical techniques using social sciences methods.
Social Informatics: 12th International Conference, SocInfo 2020, Pisa, Italy, October 6–9, 2020, Proceedings (Lecture Notes in Computer Science #12467)
by Dino Pedreschi Frank Dignum Kalina Bontcheva Samin Aref Marco Braghieri Fosca Giannotti Francesco GrisoliaThis volume constitutes the proceedings of the 12th International Conference on Social Informatics, SocInfo 2020, held in Pisa, Italy, in October 2020. The 30 full and 3 short papers presented in these proceedings were carefully reviewed and selected from 99 submissions. The papers presented in this volume cover a broad range of topics, ranging from works that ground information-system design on social concepts, to papers that analyze complex social systems using computational methods, or explore socio-technical systems using social sciences methods.
Social Informatics
by Emma Spiro Yong-Yeol AhnThe two-volume set LNCS 10046 and 10047 constitutes the proceedings of the 8th International Conference on Social Informatics, SocInfo 2016, held in Bellevue, WA, USA, in November 2016. The 36 full papers and 39 poster papers presented in this volume were carefully reviewed and selected from 120 submissions. They are organized in topical sections named: networks, communities, and groups; politics, news, and events; markets, crowds, and consumers; and privacy, health, and well-being.
Social Informatics
by Emma Spiro Yong-Yeol AhnThe two-volume set LNCS 10046 and 10047 constitutes the proceedings of the 8th International Conference on Social Informatics, SocInfo 2016, held in Bellevue, WA, USA, in November 2016. The 36 full papers and 39 poster papers presented in this volume were carefully reviewed and selected from 120 submissions. They are organized in topical sections named: networks, communities, and groups; politics, news, and events; markets, crowds, and consumers; and privacy, health, and well-being.
Social Informatics: 10th International Conference, SocInfo 2018, St. Petersburg, Russia, September 25-28, 2018, Proceedings, Part I (Lecture Notes in Computer Science #11185)
by Steffen Staab Olessia Koltsova Dmitry I. IgnatovThe two-volume set LNCS 11185 + 11186 constitutes the proceedings of the 10th International Conference on Social Informatics, SocInfo 2018, held in Saint-Petersburg, Russia, in September 2018. The 30 full and 32 short papers presented in these proceedings were carefully reviewed and selected from 110 submissions. They deal with the applications of methods of the social sciences in the study of socio-technical systems, and computer science methods to analyze complex social processes, as well as those that make use of social concepts in the design of information systems.