• Title/Summary/Keyword: Inappropriate Information

Search Result 378, Processing Time 0.037 seconds

Detection of inappropriate advertising content on SNS using k-means clustering technique (k-평균 군집화 기법을 활용한 SNS의 부적절한 광고성 콘텐츠 탐지)

  • Lee, Dong-Hwan;Lim, Heui-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.570-573
    • /
    • 2021
  • 오늘날 SNS를 사용하는 사람들이 증가함에 따라, 생성되는 데이터도 많아지고 종류도 매우 다양해졌다. 하지만 유익한 정보만 존재하는 것이 아니라, 부정적, 반사회적, 사행성 등의 부적절한 콘텐츠가 공존한다. 때문에 사용자에 따라 적절한 콘텐츠를 필터링 할 필요성이 증가하고 있다. 따라서 본 연구에서는 SNS Instagram을 대상으로 콘텐츠의 해시태그를 수집하여 데이터화 했다. 또한 k-평균 군집화 기법을 적용하여, 유사한 특성의 콘텐츠들을 군집화하고, 각 군집은 실루엣 계수(Silhouette Coefficient)와 키워드 다양성(Keyword Diversity)을 계산하여 콘텐츠의 적절성을 판단하였다.

Graphs Used in ASEAN Trading Link's Annual Reports: Evidence from Thailand, Malaysia, and Singapore

  • Kurusakdapong, Jitsama;Tanlamai, Uthai
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.3
    • /
    • pp.65-81
    • /
    • 2015
  • This study reports a preliminary finding of the types and numbers of graphs being presented in the annual reports of about thirty top listed companies trading publicly in the stock markets of three countries-Thailand (SET), Malaysia (BM), and Singapore (SGX)-that were chosen based on their inclusion in the ASEAN Stars Index under the ASEAN Trading Link project. A total of 6,753 graphs from nineteen sectors were extracted and examined. Banking, real estate, and telecommunications are ranked the three most condense sectors, accounting for 50.2% of the total number of graphs observed. The three most used graphs are the Conservative Bar, Donut graph and Stack Bar. Less than one percent of Infographic type graphs were used. The five most depicted graphed variables are Asset, Revenue, Net profit, Liability, and Dividend. Using rudimentary framework to detect distorted or misleading statistical graphs, the study found 60.6% of the graphs distorted across the three markets, SET, BM, and SGX. BM ranked first in percentages of graphs being distortedly presented (73%). The other two markets, SET and SGX, have about the same proportions, 53.88% and 53.03%, respectively. Likewise, the proportions of Well-designed versus Inappropriate-designed graphs of the latter two markets are a little over one time (SET = 1 : 1.17; SGX = 1 : 1.13), whereas the proportion is almost triple for the BM market (BM = 1 : 2.70). In addition, the trend of distorted graphs found is slightly increasing as the longevity of the ASEAN Stars Index increases. One possible explanation for the relatively equal proportion of inappropriate graphs found is that SET is the smallest market and SGX, though the largest, is the most regulated market. BM, on the other hand, may want to present their financial data in the most attractive manner to prospective investors, thus, regulatory constraints and governance structure are still lenient.

A Method for Short Text Classification using SNS Feature Information based on Markov Logic Networks (SNS 특징정보를 활용한 마르코프 논리 네트워크 기반의 단문 텍스트 분류 방법)

  • Lee, Eunji;Kim, Pankoo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.7
    • /
    • pp.1065-1072
    • /
    • 2017
  • As smart devices and social network services (SNSs) become increasingly pervasive, individuals produce large amounts of data in real time. Accordingly, studies on unstructured data analysis are actively being conducted to solve the resultant problem of information overload and to facilitate effective data processing. Many such studies are conducted for filtering inappropriate information. In this paper, a feature-weighting method considering SNS-message features is proposed for the classification of short text messages generated on SNSs, using Markov logic networks for category inference. The performance of the proposed method is verified through a comparison with an existing frequency-based classification methods.

The Limitations of Risk-based Auditing using Fuzzy Methods

  • Mohammadi, Shaban
    • The Journal of Industrial Distribution & Business
    • /
    • v.6 no.1
    • /
    • pp.37-40
    • /
    • 2015
  • Purpose - Investors, creditors, governments, and others make decisions using reasonable information provided by others. In many cases, the users of this information have goals and objectives conflicting with those of the information's producers, indicating the need for external auditors. Research design, data, and methodology - Competition in auditing has noticeably intensified globally, especially in developed countries. This means that auditors are striving to increase the efficiency of their methods. In recent years, risk-based auditing has become prominent among these efforts. In risk-assessment auditing, the auditor may directly affect the effectiveness and efficiency of the audit. Results - As a central framework, the risk assessment process improves audit quality and effectiveness such that the audit will lead to necessary changes. Previous studies have shown that risk assessment affects the nature, timing, and content of audit procedures. Conclusions - In the planning stage of an audit, audit risk assessment may identify any inappropriate or inefficient distribution of resources or determine whether the results of an audit will be ineffective or incorrect. Thus, assessing audit risk is a critical task.

Mining Spatio-Temporal Patterns in Trajectory Data

  • Kang, Ju-Young;Yong, Hwan-Seung
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.521-536
    • /
    • 2010
  • Spatio-temporal patterns extracted from historical trajectories of moving objects reveal important knowledge about movement behavior for high quality LBS services. Existing approaches transform trajectories into sequences of location symbols and derive frequent subsequences by applying conventional sequential pattern mining algorithms. However, spatio-temporal correlations may be lost due to the inappropriate approximations of spatial and temporal properties. In this paper, we address the problem of mining spatio-temporal patterns from trajectory data. The inefficient description of temporal information decreases the mining efficiency and the interpretability of the patterns. We provide a formal statement of efficient representation of spatio-temporal movements and propose a new approach to discover spatio-temporal patterns in trajectory data. The proposed method first finds meaningful spatio-temporal regions and extracts frequent spatio-temporal patterns based on a prefix-projection approach from the sequences of these regions. We experimentally analyze that the proposed method improves mining performance and derives more intuitive patterns.

Contingent valuation method implemented by R: Case study - measuring value of information (R을 활용한 조건부 가치 측정법: 정보 가치 측정 사례 연구)

  • Jung, Byung-Joon;Pak, Ro-Jin
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.6
    • /
    • pp.1041-1051
    • /
    • 2011
  • The development of information technology provides us with more useful information but it arose to protect such information from inappropriate users. In the course of analyzing and managing the risks associated with information, it should be needed to accurately measure the value of information. We try to consider the contingent valuation method for this purpose. The contingent valuation method which is used to assess the value of public goods or nonmarket goods makes an statistical estimation for the willingness-to-pay. We show with an example how we can estimate the value of information by calculating the amount we are willing to pay the value of information that exists on the information system. Calculation is carried out by using R.

ANALYZING EFFECTIVE FACTOR OF THE CHANGE MANAGEMENT BASED ON URBAN REGENERATION PROJECT IN REPUBLIC OF KOREA

  • Jae-Pil Seo;Yoon-Ki Choi;Bo-Sik Son;Han-Guk Ryu
    • International conference on construction engineering and project management
    • /
    • 2011.02a
    • /
    • pp.591-596
    • /
    • 2011
  • There are quite a number of business processes in the urban regeneration project. Managers and participants who involved in the project make and use information for the best way to perform in the particular business process. The information can be also reused and produced for data at the next stage. Accordingly, the information sometimes goes out of existence and work data up into new information when the urban regeneration project has been accomplished. But in that case some of changes happen occasionally, the business for urban regeneration has suffered a loss of profit and time as result of confusions about decisions and inappropriate action. For that reason, the information should be analyzed to achieve its aim at the business process under the influence of changes. Then, even though detail processes and management method change, the Core Information, which are important factors for accomplishing the project, help that the project can be operated to solve the problem about confusion and loss of the business. In conclusion, the Core Information is main effective factors for successful urban regeneration projects on the change management. The purpose of this study is to research the information according to the Information-flow and changes, and to find out the influence factors and the Core Information to manage efficiently at the process of urban regeneration projects.

  • PDF

Analysis of Dietary Informations in Newspapers and Magazine for Children (2002) (어린이신문 및 잡지에 게재된 식생활 관련 정보 현황조사(2002년))

  • Moon Hyun-Kyung;Cho Yeon-Jin
    • Journal of Nutrition and Health
    • /
    • v.38 no.2
    • /
    • pp.161-172
    • /
    • 2005
  • Children regard newspapers and magazines as the important source of information. Because informations about diet in the newspaper and magazines are regarded as good, it is necessary to find out whether informations provided to children are correct. Thus, this study shows the present situation of informations on diet by monitoring 3 newspapers (Kids. Chosun, Kids. Donga, Kids. Hankook) and 2 magazines (Earinee - Dongsan, Sae-But) for children. This study focused on the quantitative and the qualitative analysis for articles and advertisements. For the quantity, rate and number were calculated. For the quality, the accuracy was analyzed. Result of this study were as follow; Analyzed the number of articles and advertisements on diet, there are 2 times more number of advertisements (339 cases) than that of articles (180 cases) in the newspaper. There are slightly more number of advertisements (24 cases) than that of articles (18 cases) in the magazine. Most of advertisements are about processed foods and children' favorite foods. Especially, the advertisement of processed foods are ranked first by the quantity with 245 cases (75%) in the newspaper. In the magazine, 10 cases (42%) are about processed foods. About source of advertisements on diet informations in the newspaper, there are 300 cases (86.7%) without evidence based data and 34 cases (9.8%) of interview with entertainers, from the total 346 cases. In the magazine, there are high rate of cases without evidence based data and interview with entertainers. For the evaluation of the information about diet in the newspaper, there are 148 cases (19.7%) with no clear guidance and position, some cases with advertisements for specific products and etc. Discordance between subjects and contents, and emphasis of specified field or some parts are found from the total 750 cases. About the accuracy of contents, from the total 180 cases in the newspaper, 99 cases (55%) are inappropriate and 19 cases (10.6%) are appropriate. In magazines from the total 18 cases, 7 cases (38.9%) are inappropriate and 11 cases (61.1 %) are appropriate. With these results, we can conclude that informations about diet in newspapers and magazine for children needs improvement. Therefore, for newspapers and magazines contents should be reported scienifically by inspecting contents and by taking professional advice, in order to spread the accurate information about diet. Also, there are need to manage the systematic monitoring, for children. (Korean J Nutrition 38(2): 161~172, 2005)

Diet-Right: A Smart Food Recommendation System

  • Rehman, Faisal;Khalid, Osman;Haq, Nuhman ul;Khan, Atta ur Rehman;Bilal, Kashif;Madani, Sajjad A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2910-2925
    • /
    • 2017
  • Inadequate and inappropriate intake of food is known to cause various health issues and diseases. Due to lack of concise information about healthy diet, people have to rely on medicines instead of taking preventive measures in food intake. Due to diversity in food components and large number of dietary sources, it is challenging to perform real-time selection of diet patterns that must fulfill one's nutrition needs. Particularly, selection of proper diet is critical for patients suffering from various diseases. In this article, we highlight the issue of selection of proper diet that must fulfill patients' nutrition requirements. To address this issue, we present a cloud based food recommendation system, called Diet-Right, for dietary recommendations based on users' pathological reports. The model uses ant colony algorithm to generate optimal food list and recommends suitable foods according to the values of pathological reports. Diet-Right can play a vital role in controlling various diseases. The experimental results show that compared to single node execution, the convergence time of parallel execution on cloud is approximately 12 times lower. Moreover, adequate accuracy is attainable by increasing the number of ants.

Investigating the Privacy Paradox in Facebook Based on Dual Factor Theory (페이스북에서의 프라이버시 패러독스 현상 연구 : 듀얼팩터이론을 중심으로)

  • Yu, Jae Ho;Lee, Ae Ri;Kim, Kyung Kyu
    • Knowledge Management Research
    • /
    • v.17 no.1
    • /
    • pp.17-47
    • /
    • 2016
  • People use social network services (SNSs) for various purposes, for example, to share information, to express themselves, and to strengthen social relationships with others. Meanwhile, problems of personal information leakage and privacy infringement become a social issue and thus information privacy concerns about inappropriate collection and use of personal information increase in SNSs (e.g., Facebook). Although people have privacy concerns in SNSs, they behave in a contradictory way, voluntarily presenting themselves and disclosing personal information. This phenomenon is called 'privacy paradox'. Using dual factor theory, this study investigates the phenomenon of privacy paradox by looking into enablers (e.g., self-presentation) and inhibitors (e.g., information privacy concern) for continuous use of Facebook that can co-exist independently of each other. It also includes antecedents of self-presentation (i.e., narcissism, need for affiliation, involvement, and self-efficacy) and those of information privacy concern (i.e., previous experience of privacy infringement, privacy awareness, and privacy control). The results show that most hypothesized relationships were supported. These findings provide strategic implications for SNS providers who want to promote continuous use of SNS. Under the current circumstances in which enhanced privacy policies are required, this study would be a useful reference for future research on information privacy issues in SNSs.

  • PDF