作者归档:darren

Local culture affecting the social network service

A case study of the usage of social network service between college students from USA and China.

Abstract

The rapid development in momentum of social network service provides research directions both on technology and social research. In order to find out the reason of the inequality in the popularity of social network services across cultures, this report used Geert Hofstede’s culture dimension model (power distance, individualism, masculinity, uncertainty avoidance and long term orientation) to analyse how the cultural factors affect users’ behaviours, attitudes and usage on social network service between US and Chinese college students. The results of quantitative method showed the different cultural factors of two countries in power distance, individualism and long term orientation respectively which influenced the college students in the validity, privacy and trust concerns, social issues concerns, personal reputation, the usage requirement, the relationship between individual and group and the attitude towards social network services.

Table of Contents

1. Introduction …………………………………3

1.1. Background ………………………………………………………………….3

1.2. Research Question ………………………………………………………..4

1.3. Purpose ………………………………………………………………………5

2. Literature review …………………………..6

2.1. Choosing literatures ……………………………………………………..6

2.2. History and status quo of SNS ………………………………………..6

2.3. Cultural influences ………………………………………………………7

3. Research Method …………………………..9

3.1. Data collection ……………………………………………………………9

3.2. Cultural factors …………………………………………………………..9

3.3. Questionnaire …………………………………………………………….12

4. Results and Analysis ……………………..14

4.1. Overview …………………………………………………………………..14

4.2. Results ……………………………………………………………………..14

4.3. Analysis ……………………………………………………………………15

5. Conclusions and Future research …….20

5.1. Conclusions ……………………………………………………………….20

5.2.    Suggestions for future research …………………………………..21

6. Literature references …………………….22

7. Appendix A Questionnaire ……………..23

Click here to download (NB: You should register first)

[download id=”2″]

E-Passport System

Index  
Chapter 1 Introduction……………………………………………………………… 3
Chapter 2 Benefits……………………………………………………………………… 5
2.1   Problem with Paper Passport……………………………………………. 5
2.2   Benefits of ePassport…………………………………………………………. 5
Chapter 3 Mechanism……………………………………………………………….. 6
3.1   Characteristics of ePassport System………………………………… 7
Chapter 4 Issues………………………………………………………………………… 8
4.1   Performance issues……………………………………………………………. 8
4.2   Security issues………………………………………………………………….. 8
4.3   Privacy Issues…………………………………………………………………… 9
4.4   Cultural issues………………………………………………………………….. 9
Chapter 5 Applying System Theory……………………………………….. 10
5.1   ePassport under Churchman’s model……………………………… 10
        5.1.1 Objective…………………………………………………………………. 10
        5.1.2 Environment…………………………………………………………… 10
5.1.3 Resource………………………………………………………………………… 11
5.1.4 Component……………………………………………………………………. 11
5.1.5 Management…………………………………………………………………. 11
5.2   The Systemic Holistic Model…………………………………………….. 11
5.2.2 Content subject areas……………………………………………………. 12
5.2.2 Levels of abstraction……………………………………………………. 12
5.2.2 Context orientation………………………………………………………. 12
5.3   Cost and benefits of e-passport………………………………………… 13
5.4 Boulding’s classification……………………………………………………… 14
5.5   Shannon Weaver Model…………………………………………………. 15
Chapter 6 Security……………………………………………………………………. 16
6.1   Main attacks to ePassport…………………………………………….. 16
6.2   Main Solutions for ePassport……………………………………………. 17
6.3   Attacks and Solutions reciprocal diagram……………………… 18
6.4   security scheme for ePassport in different countries…….. 19
Chapter 7 Conclusion…………………………………………………………… 20
Chapter 8 References…………………………………………………………… 21

Abstract

In this era of Information Technology, we try to maintain information technically. The attempt which is made to maintain is not always efficient or effective. Information is always prone to some risk. Person’s identity, passwords, secrets are very tedious to maintain. Personal identity indicates a set of attributes which are related with a person e.g. Family name, Personal number, Birth Date etc… Now a day, one of the toughest tasks is to manage the identity of a human being because most of the time it needs person authentication, where the main purpose is to either verify or identify person’s identity claim. From the very beginning of the human history, we have seen many evidences where human tried to develop many techniques to serve the above purpose.

Click here to download (NB: You should register first)

[download id=”1″]