• Title/Summary/Keyword: Social Security Network

Search Result 535, Processing Time 0.027 seconds

Anti-crisis Communications in Legal Discourse in Terms of Ensuring Information Security

  • Gorai, Oleg;Ohar, Emiliya;Snitsarchuk, Lidiya;Polulyah, Ruslan;Druzhynin, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.103-108
    • /
    • 2022
  • Mass media in the digital age are not only one of the most important elements of the information society but also a strategic resource for its development. Effectively implemented communication makes it possible to build connections not only between individuals, but also between social institutions and representatives of various generational groups of the mass audience, as well as ensure information security in a crisis period. At the same time, in the context of a constantly increasing amount of information flows, more and more often "a person loses the ability to independently think, analyze, and critically perceive information." At the same time, "imposing" on the representatives of this or that society, through the content of multi-format mass media or active authors of social networks, a certain point of view on the problem becomes a completely realizable task. Thus, the main task of the study is to analyze the anti-crisis communications in legal discourse in terms of ensuring information security. As a result of the study, current trends and prerequisites of anti-crisis communications in legal discourse in terms of ensuring information security were revealed.

Profile Management System for Contact Information Privacy in Social Network Service (소셜 네트워크 서비스에서 사용자 연락정보 프라이버시 강화를 위한 개인 프로필 관리 시스템 연구)

  • Youn, Taek-Young;Hong, Do-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.141-148
    • /
    • 2011
  • Recently, various social network services have been grown. Among them, personal relationships based social network services such as Facebook and Twitter make a remarkable growth of industry. In such services, users' profiles are very important for establishing the relationship between two users. However some information in a user's profile causes the leakage of the user's privacy, and thus we have to deal with the information in the profile. Especially, we have to treat contact information, such as the phone number and the e-mail address, very carefully since an adversary can use the information to violate the user's privacy in real life. In this paper, we propose two profile management systems that can enhance the privacy of users in social network services. We compare our systems with existing profile management techniques in well-known social network services such as Facebook and Twitter, and show that our systems provide enhanced privacy.

Social Networks As A Tool Of Marketing Communications

  • Nataliia Liashuk
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.137-144
    • /
    • 2023
  • The relevance of the research topic lies in the necessity to use social networks as innovative tools of marketing communications. A wide audience and the ability to segment the market for a specific consumer determine the construction of a corporate strategy, which will be based on using the social networking approach. The spread of the global coronavirus pandemic has led to the rapid development of remote communication channels between the company and the customer. The issue of using marketing tools in social networks acquires the most urgent importance in the modern world of the introduction and implementation of the company's marketing strategies. The purpose of the academic paper is to study the use of social networks as features of implementing the marketing campaign. Social networks are the result of the development of digital technologies and the processes of creating an information society involved in the digital space. The objectives of the research are to analyse the opportunity of using social networks as a tool for marketing communications and their implementation at the level of its widespread use by enterprises and establishments. It is significant to create an advertising campaign by defining the target audience and outlining the key aspects, on which the company is focused. The research methodology consists in determining the theoretical and methodological approaches to the essence of introducing social networks and their practical importance in the implementation of marketing activities of companies. The obtained results can significantly improve the quality of functioning of modern enterprises and organizations that plan to master a new market segment or gain competitive advantages in the existing one. The academic paper examines the essence of social networks as a tool of marketing communications. The key principles of the development of digital social platforms were revealed. The quality of implementing the advertising campaign in the social network was studied, and further prospects for the development of using social networks as a component of the marketing strategy were outlined. Therefore, the academic paper analyses the problems of using social networks as a marketing tool.

Detecting Malicious Social Robots with Generative Adversarial Networks

  • Wu, Bin;Liu, Le;Dai, Zhengge;Wang, Xiujuan;Zheng, Kangfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5594-5615
    • /
    • 2019
  • Malicious social robots, which are disseminators of malicious information on social networks, seriously affect information security and network environments. The detection of malicious social robots is a hot topic and a significant concern for researchers. A method based on classification has been widely used for social robot detection. However, this method of classification is limited by an unbalanced data set in which legitimate, negative samples outnumber malicious robots (positive samples), which leads to unsatisfactory detection results. This paper proposes the use of generative adversarial networks (GANs) to extend the unbalanced data sets before training classifiers to improve the detection of social robots. Five popular oversampling algorithms were compared in the experiments, and the effects of imbalance degree and the expansion ratio of the original data on oversampling were studied. The experimental results showed that the proposed method achieved better detection performance compared with other algorithms in terms of the F1 measure. The GAN method also performed well when the imbalance degree was smaller than 15%.

Content Modeling Based on Social Network Community Activity

  • Kim, Kyung-Rog;Moon, Nammee
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.271-282
    • /
    • 2014
  • The advancement of knowledge society has enabled the social network community (SNC) to be perceived as another space for learning where individuals produce, share, and apply content in self-directed ways. The content generated within social networks provides information of value for the participants in real time. Thus, this study proposes the social network community activity-based content model (SoACo Model), which takes SNC-based activities and embodies them within learning objects. The SoACo Model consists of content objects, aggregation levels, and information models. Content objects are composed of relationship-building elements, including real-time, changeable activities such as making friends, and participation-activity elements such as "Liking" specific content. Aggregation levels apply one of three granularity levels considering the reusability of elements: activity assets, real-time, changeable learning objects, and content. The SoACo Model is meaningful because it transforms SNC-based activities into learning objects for learning and teaching activities and applies to learning management systems since they organize activities -- such as tweets from Twitter -- depending on the teacher's intention.

An Analysis of Industrial Security Curriculums in Colleges (국내 산업보안학과의 교과과정 분석: 교육 영역과 과목별 분류를 중심으로)

  • Jung, Jinhyo;Lee, Chang-Moo
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.29-53
    • /
    • 2019
  • Of all the 55 security departments in colleges, the information security departments occupies the majority of 45. Though existing security focused too much on information security, a new research stream on industrial security from a perspective of convergence has emerged. Since the first department of industrial security was established in a college in 2014, the total of four departments have been established until 2018. A new discipline to solve the existing problems and an opportunity to cultivate industrial security professionals have been greatly appreciated; however, the definition of industrial security is not yet specific, and more discussions on education categories and subjects with a focus on the characteristics of convergence are needed. The demand for industrial security professionals has gradually increasing and the departments of industrial security have been established to meet the demand. It is necessary, in this circumstance, to find out how the industrial security departments are teaching students. To this end, the purpose of this article is to deliver an overview of the educational curriculums of the four industrial security departments. This study analyzed 127 subjects in the curriculums, categorized educational areas, and employed Social Network Analysis to understand the relationships between subjects of each departments.

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.

Regional Level of Inclusive Development

  • Shashyna, Maryna V.;Butko, Mykola P.;Tulchynska, Svitlana O.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.133-138
    • /
    • 2021
  • The concept of inclusive development provides equal opportunities for all participants in access to the labor market and resource allocation. This concept emphasizes the equality of human capital, the ecological state of the environment, social protection and food security. This concept is fundamentally different from the standard perception of economic growth, because it has broader goals than simply increasing incomes and GDP. It rejects the position that positive results are an automatic consequence of growth; here the basic condition is human development and increase of its well-being, reduction of poverty. Therefore, it is not the result of distribution that becomes primary, but the involvement in the process of social reproduction. An alternative system of characterization of the country's position according to the resulting indicator of the Inclusive Development Index was presented at the World Economic Forum in Davos. In this research the methodical development of the system of estimation of the index of inclusive development for regions of the NUTS 4 level of the European classification is resulted.

A Functional Matrix Approach to Pedagogical Enrichment of the Dispositional Core of Future Specialists' Experience of Social Interaction

  • Kovalenko, E.V.;Gubarenko, I.V.;Kovalenko, V.I.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.255-259
    • /
    • 2022
  • The new social reality emerging amid the global rise of communication links and integration processes acutely emphasizes the problems of communication in large and small social systems. The method of their communication becomes one of the keys to ensuring global security. It has become the mission of humanitarian education to prepare the younger generations for life in a changing world with no image of the future and increasing uncertainty. In psychological and pedagogical research, there is a growing scientific interest in the problems of interaction of the individual with the social environment. The mental trace of a person's practice in society shapes the experience of social interaction, which constitutes simultaneously the source, tool, and condition for the emergence and development of personality. The study outlines the methodological foundations for the study of individual experiences of social interaction. A hypothesis about the productivity of the functional matrix method is tested. Materials for the training of specialists in the humanities include interdisciplinary approaches to the study and transformation of the experience of social interaction and systematic methodology for the study of complex objects. Fundamental to the study is the systematic-dialectical method, and the matrix method is employed as the instrumental-technological method. The paper presents the results of a multidisciplinary overview of scientific literature concerning the essential characteristics and functions of social interaction and the respective experience. The overview points to the fragmented nature of scientific understanding of the elements of experience outside its integrity and systemic properties. Based on the formula "personality interacts with the social environment", the study presents an algorithm for the application of a systematic methodology for the study of complex objects, which made it possible to identify the system parameters of experience at three levels of cognition and develop the reference structural and functional matrices for the didactic system of its pedagogical enrichment.

Text Mining in Online Social Networks: A Systematic Review

  • Alhazmi, Huda N
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.396-404
    • /
    • 2022
  • Online social networks contain a large amount of data that can be converted into valuable and insightful information. Text mining approaches allow exploring large-scale data efficiently. Therefore, this study reviews the recent literature on text mining in online social networks in a way that produces valid and valuable knowledge for further research. The review identifies text mining techniques used in social networking, the data used, tools, and the challenges. Research questions were formulated, then search strategy and selection criteria were defined, followed by the analysis of each paper to extract the data relevant to the research questions. The result shows that the most social media platforms used as a source of the data are Twitter and Facebook. The most common text mining technique were sentiment analysis and topic modeling. Classification and clustering were the most common approaches applied by the studies. The challenges include the need for processing with huge volumes of data, the noise, and the dynamic of the data. The study explores the recent development in text mining approaches in social networking by providing state and general view of work done in this research area.