期刊文献+

基于碎片模型的社会化网络商务价值创造机理 被引量:2

Business value creation mechanism of social network based on fragment model
下载PDF
导出
摘要 在线社交网络服务已成为个人或组织之间进行信息交换的主流方式。剖析了社交网络服务为企业用户创造商务价值的机理,借鉴"碎片—组织—再组织模型"对社交网络服务的服务过程进行刻画,将碎片分为普通碎片和商务类碎片,利用管道—过滤器模型分析两类碎片在传播过程中的相互影响,提出了商务碎片传播的四种机制。探讨了个人用户、企业用户、社交网络服务运营商三者之间协同进行价值创造的机理和典型的多层社交网络价值网模式,分析了影响价值实现程度的因素和决策手段。 Online Social Network Services (SNS) have become a dominate style facilitating the socially information exchange between people and organizations.The business value creation mechanism for enterprise users by Social Network Service (SNS) was analyzed.Through Fragment-Organization-Reorganization (FOR),the SNS service process was described.The fragment was divided into common and business fragments,and the interrelationship of these two fragments in propagation process was analyzed by Pipe-and-Filter model.Four propagation mechanisms of business fragment were proposed.The value creation mechanism based on collaborations between personal users,enterprise users and SNS operators were emphatically discussed,and the typical multi-layer value network for better value creation was studied.The influence factors and decision making measures for value realization were theoretically analyzed and summarized.
作者 王宇
出处 《计算机集成制造系统》 EI CSCD 北大核心 2013年第11期2900-2910,共11页 Computer Integrated Manufacturing Systems
关键词 社会化网络服务 碎片—组织—再组织 商务价值 管道—过滤器 价值创造 social network service fragment-organization-reorganization business value pipe-and-filter value creation
  • 相关文献

参考文献29

  • 1SCOTT J. Social network analysis[J]. Sociology, 1988, 22 (1) : 109-127.
  • 2STAAB S, DOMINGOS P, MIKE P, et al. Social networks applied[J]. IEEE Intelligent Systems, 2005, 20(1): 80-93.
  • 3JOO Y H, KIM Y, YANG S J. Valuing customers for social network services[J]. Journal of Business Research, 2011, 64 (11) : 1239-1244.
  • 4FALOUTSOS M, KARAGIANNIS T, MOON S. Online so- cial networks[J]. IEEE Network, 2010, 24(5): 4-5.
  • 5CHEN Qi. How to predict the future development potentials of Pinterest and Instagram[EB/OL]. (2012-04-14) [2012-06- 20]. http://www, zhihu, com/question/20169268/answer/ 14229241.
  • 6HSIEH W T, STU J, LIANG C M, et al. A multi-level mar- keting framework for advertising in social network services [C]/ Proceedings of International Conference on E-Business and Information System Security. Washington, D. C. , USA: IEEE, 2009.- 1-6.
  • 7CHEN Yan, LIU K J R. Understanding microeconomic be- haviors in social networking: an engineering view[J]. IEEE Signal Processing Magazine, 2012, 29(2): 53-64.
  • 8ALLEN R, GARLAND. A formal approach to software ar- chitectures[C]// Proceedings of IFIP' 92. Amsterdam, the Netherlands: Elsevier, 1992.
  • 9XIONG Zichuan. Business logic of path [EB/OL]. (2011-02- 08) [2012-06-18]. http://www, tuzeiS, com/2011/O2/paths- business-model.
  • 10VAN STEEN M. Graph theory and complex networks: an introduction[EB/OL]. (2010-01-03)[2012-05-30]. http://www. di. unipi, it/ ricci/book-watermarked, pdf.

二级参考文献17

  • 1Ishida K,Toriumi F,Ishii K.Proposal for a growth model of social network service[C] //Proc of the 2008 IEEE//WIC//ACM Int Conf on Web Intelligence and Intelligent Agent Technology.Los Alamitos,CA:IEEE Computer Society,2008.
  • 2Bimal V,Alan M,Cha M,et al.On the evolution of user interaction in facebook[C] //Proc of the 2nd ACM SIGCOMM Workshop on Social Networks (WOSN'09).New York:ACM,2009:37-42.
  • 3Squicciarini A C,Mohamed S,Federica P.Collective Privacy Management in Social Networks[C] //Proc of WWW 2009.New York:ACM,2009:521-530.
  • 4Jones H,Soltren J H.Facebook:Threats to privacy[OL].[2009-05-25].http://www.swiss.ai.mit.edu//6095//student-papers//fall05//papers//facebook.pdf.
  • 5Heymann P,Koutrika G,Garcia-Molina H.Fighting spam on social Web sites:A survey of approaches and future challenges[J].IEEE Internet Computing,2007,11(6):36-45.
  • 6Facebook.Facebook Web site[OL].[2009-05-25].http://www.facebook.com//.
  • 7Lenhart A,Madden M.Teens,privacy & online social networks[OL].[2009-05-25].http://www.pewinternet.org//Reports//2007//Teens-Privacy-and-Online-Social-Networks.aspx.
  • 8Rosenblum D.What anyone can know:The privacy risks of social networking sites[J].IEEE Security and Privacy,2007,5(3):40-49.
  • 9Brown G,Howe T,Ihbe M,et al.Social networks and context-aware spam[C] //Proc of the ACM 2008 Conf on Computer Supported Cooperative Work (CSCW'08).New York:ACM,2008:403-412.
  • 10Webb S,Caverlee J.Social honeypots:Making friends with a spammer near you[OL].(2008-08-22)[2009-05-25].http://www.ceas.cc//2008//papers//ceas2008-paper-50.pdf.

共引文献7

同被引文献9

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部