Pub Date : 2021-01-01DOI: 10.4018/IJSKD.2021010101
Sangeeta Gupta, Dr Rajanikanth Aluvalu
Huge crowds heading towards smart investment options need a secure and trustworthy environment to earn good profits. Twitter, a social networking platform, is a major source generating huge information on share market consortium. People get excited when they come across the tweets that specify the shares yielding huge profits within a short time. Due to this, they end up tweeting about their credentials and amount they are willing to invest. It paves a path for the intruders to access confidential data and leave the common man in danger by gaining access and misusing the information. Towards this end, the goal of this work is to address the challenge of providing better inputs to the customers interested to invest in the share market in a secure way to earn better returns on investment. In this work, as a first module, pre-processing techniques are used to remove the unwanted characters from tweets. In the second part, to enhance the security, encryption module is developed, and the data is then stored in Cassandra. It is observed from results that the time taken to encrypt 100,000 tweets after pre-processing is 500 msec, and the time taken to decrypt the same set of 100,000 tweets is 50 msec, respectively. This shows the effectiveness of the proposed work in terms of attaining better and fast outcomes for a huge set of tweets after filling the voids by pre-processing techniques.
{"title":"Pre-Processed Tweets for Secure Capital Market Analysis Using Cloud","authors":"Sangeeta Gupta, Dr Rajanikanth Aluvalu","doi":"10.4018/IJSKD.2021010101","DOIUrl":"https://doi.org/10.4018/IJSKD.2021010101","url":null,"abstract":"Huge crowds heading towards smart investment options need a secure and trustworthy environment to earn good profits. Twitter, a social networking platform, is a major source generating huge information on share market consortium. People get excited when they come across the tweets that specify the shares yielding huge profits within a short time. Due to this, they end up tweeting about their credentials and amount they are willing to invest. It paves a path for the intruders to access confidential data and leave the common man in danger by gaining access and misusing the information. Towards this end, the goal of this work is to address the challenge of providing better inputs to the customers interested to invest in the share market in a secure way to earn better returns on investment. In this work, as a first module, pre-processing techniques are used to remove the unwanted characters from tweets. In the second part, to enhance the security, encryption module is developed, and the data is then stored in Cassandra. It is observed from results that the time taken to encrypt 100,000 tweets after pre-processing is 500 msec, and the time taken to decrypt the same set of 100,000 tweets is 50 msec, respectively. This shows the effectiveness of the proposed work in terms of attaining better and fast outcomes for a huge set of tweets after filling the voids by pre-processing techniques.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88367415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.4018/ijskd.2020100104
K. Gunawardana
This research article investigates the adoption of mobile data services with utilitarian and hedonic value propositions in Sri Lanka. This study attempts to develop a conceptually model and related hypotheses and its behavior within the Sri Lankan user context. The findings related to the perceived usefulness has reported that a strong relationship between the attitudes and adoption intension even in the context of products with predominantly hedonic values propositions. Further, it was noted that the utilitarian motives of usefulness, ease of use, and comparative advantage were more strongly present than hedonic motives even in mobile ringtone users. The utilitarian motives had strong correlations with the attitude towards attitudes and adoption intension.
{"title":"Hedonic and Utilitarian Propositions of Mobile Data Services in Sri Lanka: Development of a Consumer Technology Adoption Model","authors":"K. Gunawardana","doi":"10.4018/ijskd.2020100104","DOIUrl":"https://doi.org/10.4018/ijskd.2020100104","url":null,"abstract":"This research article investigates the adoption of mobile data services with utilitarian and hedonic value propositions in Sri Lanka. This study attempts to develop a conceptually model and related hypotheses and its behavior within the Sri Lankan user context. The findings related to the perceived usefulness has reported that a strong relationship between the attitudes and adoption intension even in the context of products with predominantly hedonic values propositions. Further, it was noted that the utilitarian motives of usefulness, ease of use, and comparative advantage were more strongly present than hedonic motives even in mobile ringtone users. The utilitarian motives had strong correlations with the attitude towards attitudes and adoption intension.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"9 1","pages":"55-69"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84278622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.4018/ijskd.2020100103
R. Yusuf
This article aims to move knowledge beyond the first response, by outlining a framework for interpreting and evaluating the experiences of carers regarding their involvement in R&D work. The study adopted a descriptive and explorative qualitative design. The inclusion criterion to enroll in the study was being a career and having participated in an FGI in the ICS consultation phase. The sample of twelve participants ranged in age from 35 to 77 years (mean value 60 years). Data collection consisted of individual interviews, via the “Zoom” videoconference system, telephone or face-to-face, depending on the preferences of the participants. Face-to-face interviews were conducted at the university or a cafe. The result is participants emphasized the significance of lived experience and practical knowledge. There is a limited amount of systematic research carried out that also actively takes into account possible negative experiences, barriers, and issues.
{"title":"Exploring Carers' Views and Experiences of Being Involved in Research and Development Work","authors":"R. Yusuf","doi":"10.4018/ijskd.2020100103","DOIUrl":"https://doi.org/10.4018/ijskd.2020100103","url":null,"abstract":"This article aims to move knowledge beyond the first response, by outlining a framework for interpreting and evaluating the experiences of carers regarding their involvement in R&D work. The study adopted a descriptive and explorative qualitative design. The inclusion criterion to enroll in the study was being a career and having participated in an FGI in the ICS consultation phase. The sample of twelve participants ranged in age from 35 to 77 years (mean value 60 years). Data collection consisted of individual interviews, via the “Zoom” videoconference system, telephone or face-to-face, depending on the preferences of the participants. Face-to-face interviews were conducted at the university or a cafe. The result is participants emphasized the significance of lived experience and practical knowledge. There is a limited amount of systematic research carried out that also actively takes into account possible negative experiences, barriers, and issues.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"1 1","pages":"41-54"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82093281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.4018/ijskd.2020100106
K. Gunawardana
There are number of challenges which are faced in implementing crowdfunding in Sri Lanka. Crowdfunding platforms in Sri Lanka are being used to gather funds, mainly for charities and to find seed money for startups. This study focuses on finding success factors affecting the implementation of the crowdfunding projects which are hosted to gather capital for startups. The study contains a proposed conceptual framework developed by reading recent literature with the facts contributing to the success of startups through crowdfunding and analyzing information gathered from experts in Sri Lanka. Variables namely web presence, investors, crowdfunding team, goal and rewards were analyzed together with the success of funding startups via crowdfunding Finally, all the variables except web presence indicated significant towards the success of funding startups via crowdfunding.
{"title":"Success Factors of the Implementation of Crowdfunding for Start-Ups","authors":"K. Gunawardana","doi":"10.4018/ijskd.2020100106","DOIUrl":"https://doi.org/10.4018/ijskd.2020100106","url":null,"abstract":"There are number of challenges which are faced in implementing crowdfunding in Sri Lanka. Crowdfunding platforms in Sri Lanka are being used to gather funds, mainly for charities and to find seed money for startups. This study focuses on finding success factors affecting the implementation of the crowdfunding projects which are hosted to gather capital for startups. The study contains a proposed conceptual framework developed by reading recent literature with the facts contributing to the success of startups through crowdfunding and analyzing information gathered from experts in Sri Lanka. Variables namely web presence, investors, crowdfunding team, goal and rewards were analyzed together with the success of funding startups via crowdfunding Finally, all the variables except web presence indicated significant towards the success of funding startups via crowdfunding.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"45 1","pages":"89-105"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73060769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.4018/ijskd.2020100105
N. Baporikar
Knowledge that is not well managed and shared disintegrates easily, especially, tacit knowledge that resides in the mind and is accumulated over time. In the realm of knowledge management processes, knowledge sharing is vital yet probably the most difficult one. Knowledge sharing refers to the transference of knowledge among individuals, groups, teams, departments, and organizations. It is also the building block for the success of the organization as it provides a competitive edge. However, many factors that affect knowledge-sharing behaviors include personal characteristics, characteristics of groups, organizations, trust, culture, etc. Different researchers have identified and explained various antecedents to knowledge-sharing behavior. However, the purpose of this conceptual article is to uncover the issues in knowledge sharing and transfer, particularly investigate the learning link in organizational tacit knowledge creation and dissemination.
{"title":"Learning Link in Organizational Tacit Knowledge Creation and Dissemination","authors":"N. Baporikar","doi":"10.4018/ijskd.2020100105","DOIUrl":"https://doi.org/10.4018/ijskd.2020100105","url":null,"abstract":"Knowledge that is not well managed and shared disintegrates easily, especially, tacit knowledge that resides in the mind and is accumulated over time. In the realm of knowledge management processes, knowledge sharing is vital yet probably the most difficult one. Knowledge sharing refers to the transference of knowledge among individuals, groups, teams, departments, and organizations. It is also the building block for the success of the organization as it provides a competitive edge. However, many factors that affect knowledge-sharing behaviors include personal characteristics, characteristics of groups, organizations, trust, culture, etc. Different researchers have identified and explained various antecedents to knowledge-sharing behavior. However, the purpose of this conceptual article is to uncover the issues in knowledge sharing and transfer, particularly investigate the learning link in organizational tacit knowledge creation and dissemination.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"32 1","pages":"70-88"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78519021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.4018/ijskd.2020100102
V. Mkrttchian, L. Rozhkova, V. Belashov, S. Vlazneva, O. Salnikova
To analyze data sets, sociologists use various methods of mathematical and statistical data processing, which allows comprehensive analysis of the collected social information. A specialized software application is used in sociology. However, there are not many tools for carrying out a sociological research through all its stages. Sociologists often use different software or several software products. However, these programs are quite complex, and therefore their application is possible with special knowledge after a thorough study of the software product or with the involvement of the relevant specialists. Analysis of the possibilities of various programs for creating and processing sociological data shows that their choice is made by researchers on the basis of the ease of learning the program, the convenience of data management, the speed of computation, and graphic capabilities. In 2014, Belashov developed the Russian program for the input and processing of sociological research data “Sociology,” which allows for complete automation of the process of creating sociological data.
{"title":"About Technology-Based \"Sociology\" Software for Knowledge Development: From Questionnaire Creation to Data Processing","authors":"V. Mkrttchian, L. Rozhkova, V. Belashov, S. Vlazneva, O. Salnikova","doi":"10.4018/ijskd.2020100102","DOIUrl":"https://doi.org/10.4018/ijskd.2020100102","url":null,"abstract":"To analyze data sets, sociologists use various methods of mathematical and statistical data processing, which allows comprehensive analysis of the collected social information. A specialized software application is used in sociology. However, there are not many tools for carrying out a sociological research through all its stages. Sociologists often use different software or several software products. However, these programs are quite complex, and therefore their application is possible with special knowledge after a thorough study of the software product or with the involvement of the relevant specialists. Analysis of the possibilities of various programs for creating and processing sociological data shows that their choice is made by researchers on the basis of the ease of learning the program, the convenience of data management, the speed of computation, and graphic capabilities. In 2014, Belashov developed the Russian program for the input and processing of sociological research data “Sociology,” which allows for complete automation of the process of creating sociological data.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"15 1","pages":"24-40"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83517125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.4018/ijskd.2020070105
Alaa M. Momani
Recently, the unified theory of acceptance and use of technology has taken place as one of the most developed and intensive models to test technology adoption and acceptance. This research article reviews this model by presenting a description of its development and structure. Additionally, this article compares it with other former theories and models in this field. It studies the evolution stages of these theories and classifies them depending on their development method and the scientific field which they were developed in. Moreover, the model's determinants were classified depending on their influence on technology adoption. This model has been reported as robust and trusted for application on different technologies and viable after doing any modification operation over it. It also has the minimum amount of complexity according to its limited number of constructs and moderating variables that make it more applicable and understandable to study the acceptance behavior to any new technology.
{"title":"The Unified Theory of Acceptance and Use of Technology: A New Approach in Technology Acceptance","authors":"Alaa M. Momani","doi":"10.4018/ijskd.2020070105","DOIUrl":"https://doi.org/10.4018/ijskd.2020070105","url":null,"abstract":"Recently, the unified theory of acceptance and use of technology has taken place as one of the most developed and intensive models to test technology adoption and acceptance. This research article reviews this model by presenting a description of its development and structure. Additionally, this article compares it with other former theories and models in this field. It studies the evolution stages of these theories and classifies them depending on their development method and the scientific field which they were developed in. Moreover, the model's determinants were classified depending on their influence on technology adoption. This model has been reported as robust and trusted for application on different technologies and viable after doing any modification operation over it. It also has the minimum amount of complexity according to its limited number of constructs and moderating variables that make it more applicable and understandable to study the acceptance behavior to any new technology.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"18 1","pages":"79-98"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88417079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.4018/ijskd.2020070104
P. Chand, R. Dhiman, A. Mittal, Deepika Jhamb
This study is an attempt to understand the relationship between narcissism and job satisfaction in the context of teachers in a university set-up. Previous research has considered narcissism as a personality disorder and considers it unhealthy for organizations and individuals. In order to understand the construct of narcissism, and how it impacts on job satisfaction, 560 university teachers out of which187 females and 373 males were chosen from public and private higher educational institutions of India. The data was collected by administering a standardized questionnaire and the results were analyzed using structural equation modeling. The findings of the study suggest that extreme narcissism and healthy narcissism lead to a significant increase in job satisfaction.
{"title":"Narcissism as a Determinant of Job Satisfaction Among University Teaching Staff in India","authors":"P. Chand, R. Dhiman, A. Mittal, Deepika Jhamb","doi":"10.4018/ijskd.2020070104","DOIUrl":"https://doi.org/10.4018/ijskd.2020070104","url":null,"abstract":"This study is an attempt to understand the relationship between narcissism and job satisfaction in the context of teachers in a university set-up. Previous research has considered narcissism as a personality disorder and considers it unhealthy for organizations and individuals. In order to understand the construct of narcissism, and how it impacts on job satisfaction, 560 university teachers out of which187 females and 373 males were chosen from public and private higher educational institutions of India. The data was collected by administering a standardized questionnaire and the results were analyzed using structural equation modeling. The findings of the study suggest that extreme narcissism and healthy narcissism lead to a significant increase in job satisfaction.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"94 1","pages":"60-78"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85659575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.4018/ijskd.2020070103
Gremil Alessandro Alcazar Naz
The literature on interpersonal conflict management is already extensive and theories have been forwarded since the 1960s. However, these theories were created with proximal couples in mind. They do not address the situation of partners in long-distance relationships (LDRs). Thus, a grounded theory study was done among 10 Filipinos in LDRs. They were individually interviewed for about an hour per session and the interviews were transcribed. The transcriptions were then subjected to open coding, which yielded 18 open codes. During the selective coding, these were pared down to five categories. Their relationships were identified during the theoretical coding, which resulted in a grounded theory on conflict management in LDRs. This theory posits that the reason for the LDR; long-term relationship plans; communication practices; and the values, behaviors, and other attributes of the couple all shape long-distance conflicts. The computer-mediated communication technologies used by the long-distance couples were factors in relational maintenance.
{"title":"A Grounded Theory on Conflict Management in Long-Distance Relationships: A Sociotechnical Perspective","authors":"Gremil Alessandro Alcazar Naz","doi":"10.4018/ijskd.2020070103","DOIUrl":"https://doi.org/10.4018/ijskd.2020070103","url":null,"abstract":"The literature on interpersonal conflict management is already extensive and theories have been forwarded since the 1960s. However, these theories were created with proximal couples in mind. They do not address the situation of partners in long-distance relationships (LDRs). Thus, a grounded theory study was done among 10 Filipinos in LDRs. They were individually interviewed for about an hour per session and the interviews were transcribed. The transcriptions were then subjected to open coding, which yielded 18 open codes. During the selective coding, these were pared down to five categories. Their relationships were identified during the theoretical coding, which resulted in a grounded theory on conflict management in LDRs. This theory posits that the reason for the LDR; long-term relationship plans; communication practices; and the values, behaviors, and other attributes of the couple all shape long-distance conflicts. The computer-mediated communication technologies used by the long-distance couples were factors in relational maintenance.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"100 1","pages":"41-59"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85801184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.4018/ijskd.2020070101
Celbert M. Himang, Harrold U. Beltran, L. Ocampo, Jose Maria S. Garcia, Rosein A. Ancheta, M. Himang, Egberto F. Selerio, Ella Luzano
A novel thermal infrared device was developed to measure wire temperature in application to fire risk management. Findings show that the device is as effective as the conventional thermocouple thermometer. The technology adoption of the device was also assessed using the unified theory of acceptance and use of technology (UTAUT) model. From the assessment, it was found out that user age has a negative effect on the UTAUT constructs on performance expectancy (PE), the effort expectancy (EE), and facilitating condition (FC). Moreover, the user gender was found to have an adverse effect on PE. Furthermore, the construct which has the highest positive effect on the user behavioral intention (BI) is social influence (SI) with a value of 0.552. All the factors have values greater than or equal to 0.7 thresholds for Cronbach's alpha, 0.5 for composite reliability, and 0.5 for average variances.
{"title":"Acceptability Evaluation of a Developed Thermal Infrared Device for Fire Risk Management: Using the Unified Theory of Acceptance and Use of Technology (UTAUT) Model","authors":"Celbert M. Himang, Harrold U. Beltran, L. Ocampo, Jose Maria S. Garcia, Rosein A. Ancheta, M. Himang, Egberto F. Selerio, Ella Luzano","doi":"10.4018/ijskd.2020070101","DOIUrl":"https://doi.org/10.4018/ijskd.2020070101","url":null,"abstract":"A novel thermal infrared device was developed to measure wire temperature in application to fire risk management. Findings show that the device is as effective as the conventional thermocouple thermometer. The technology adoption of the device was also assessed using the unified theory of acceptance and use of technology (UTAUT) model. From the assessment, it was found out that user age has a negative effect on the UTAUT constructs on performance expectancy (PE), the effort expectancy (EE), and facilitating condition (FC). Moreover, the user gender was found to have an adverse effect on PE. Furthermore, the construct which has the highest positive effect on the user behavioral intention (BI) is social influence (SI) with a value of 0.552. All the factors have values greater than or equal to 0.7 thresholds for Cronbach's alpha, 0.5 for composite reliability, and 0.5 for average variances.","PeriodicalId":13656,"journal":{"name":"Int. J. Sociotechnology Knowl. Dev.","volume":"74 1","pages":"1-25"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83741782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}