• Title/Summary/Keyword: Social media security

Search Result 171, Processing Time 0.023 seconds

Sentiment Analysis of COVID-19 Tweets: Impact of Pre-processing Step

  • Ayadi, Rami;Shahin, Osama R.;Ghorbel, Osama;Alanazi, Rayan;Saidi, Anouar
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.206-211
    • /
    • 2021
  • Internet users are increasingly invited to express their opinions on various subjects in social networks, e-commerce sites, news sites, forums, etc. Much of this information, which describes feelings, becomes the subject of study in several areas of research such as: "Sensing opinions and analyzing feelings". It is the process of identifying the polarity of the feelings held in the opinions found in the interactions of Internet users on the web and classifying them as positive, negative, or neutral. In this article, we suggest the implementation of a sentiment analysis tool that has the role of detecting the polarity of opinions from people about COVID-19 extracted from social media (tweeter) in the Arabic language and to know the impact of the pre-processing phase on the opinions classification. The results show gaps in this area of research, first of all, the lack of resources when collecting data. Second, Arabic language is more complexes in pre-processing step, especially the dialects in the pre-treatment phase. But ultimately the results obtained are promising.

Sorting Instagram Hashtags all the Way throw Mass Tagging using HITS Algorithm

  • D.Vishnu Vardhan;Dr.CH.Aparna
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.93-98
    • /
    • 2023
  • Instagram is one of the fastest-growing online photo social web services where users share their life images and videos with other users. Image tagging is an essential step for developing Automatic Image Annotation (AIA) methods that are based on the learning by example paradigm. Hashtags can be used on just about any social media platform, but they're most popular on Twitter and Instagram. Using hashtags is essentially a way to group together conversations or content around a certain topic, making it easy for people to find content that interests them. Practically on average, 20% of the Instagram hashtags are related to the actual visual content of the image they accompany, i.e., they are descriptive hashtags, while there are many irrelevant hashtags, i.e., stophashtags, that are used across totally different images just for gathering clicks and for search ability enhancement. Hence in this work, Sorting instagram hashtags all the way through mass tagging using HITS (Hyperlink-Induced Topic Search) algorithm is presented. The hashtags can sorted to several groups according to Jensen-Shannon divergence between any two hashtags. This approach provides an effective and consistent way for finding pairs of Instagram images and hashtags, which lead to representative and noise-free training sets for content-based image retrieval. The HITS algorithm is first used to rank the annotators in terms of their effectiveness in the crowd tagging task and then to identify the right hashtags per image.

An Ensemble Approach to Detect Fake News Spreaders on Twitter

  • Sarwar, Muhammad Nabeel;UlAmin, Riaz;Jabeen, Sidra
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.294-302
    • /
    • 2022
  • Detection of fake news is a complex and a challenging task. Generation of fake news is very hard to stop, only steps to control its circulation may help in minimizing its impacts. Humans tend to believe in misleading false information. Researcher started with social media sites to categorize in terms of real or fake news. False information misleads any individual or an organization that may cause of big failure and any financial loss. Automatic system for detection of false information circulating on social media is an emerging area of research. It is gaining attention of both industry and academia since US presidential elections 2016. Fake news has negative and severe effects on individuals and organizations elongating its hostile effects on the society. Prediction of fake news in timely manner is important. This research focuses on detection of fake news spreaders. In this context, overall, 6 models are developed during this research, trained and tested with dataset of PAN 2020. Four approaches N-gram based; user statistics-based models are trained with different values of hyper parameters. Extensive grid search with cross validation is applied in each machine learning model. In N-gram based models, out of numerous machine learning models this research focused on better results yielding algorithms, assessed by deep reading of state-of-the-art related work in the field. For better accuracy, author aimed at developing models using Random Forest, Logistic Regression, SVM, and XGBoost. All four machine learning algorithms were trained with cross validated grid search hyper parameters. Advantages of this research over previous work is user statistics-based model and then ensemble learning model. Which were designed in a way to help classifying Twitter users as fake news spreader or not with highest reliability. User statistical model used 17 features, on the basis of which it categorized a Twitter user as malicious. New dataset based on predictions of machine learning models was constructed. And then Three techniques of simple mean, logistic regression and random forest in combination with ensemble model is applied. Logistic regression combined in ensemble model gave best training and testing results, achieving an accuracy of 72%.

A Survey of Arabic Thematic Sentiment Analysis Based on Topic Modeling

  • Basabain, Seham
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.155-162
    • /
    • 2021
  • The expansion of the world wide web has led to a huge amount of user generated content over different forums and social media platforms, these rich data resources offer the opportunity to reflect, and track changing public sentiments and help to develop proactive reactions strategies for decision and policy makers. Analysis of public emotions and opinions towards events and sentimental trends can help to address unforeseen areas of public concerns. The need of developing systems to analyze these sentiments and the topics behind them has emerged tremendously. While most existing works reported in the literature have been carried out in English, this paper, in contrast, aims to review recent research works in Arabic language in the field of thematic sentiment analysis and which techniques they have utilized to accomplish this task. The findings show that the prevailing techniques in Arabic topic-based sentiment analysis are based on traditional approaches and machine learning methods. In addition, it has been found that considerably limited recent studies have utilized deep learning approaches to build high performance models.

Identifying Barriers to Big Data Analytics: Design-Reality Gap Analysis in Saudi Higher Education

  • AlMobark, Bandar Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.261-266
    • /
    • 2021
  • The spread of cloud computing, digital computing, and the popular social media platforms have led to increased growth of data. That growth of data results in what is known as big data (BD), which seen as one of the most strategic resources. The analysis of these BD has allowed generating value from massive raw data that helps in making effective decisions and providing quality of service. With Vision 2030, Saudi Arabia seeks to invest in BD technologies, but many challenges and barriers have led to delays in adopting BD. This research paper aims to search in the state of Big Data Analytics (BDA) in Saudi higher education sector, identify the barriers by reviewing the literature, and then to apply the design-reality gap model to assess these barriers that prevent effective use of big data and highlights priority areas for action to accelerate the application of BD to comply with Vision 2030.

Cyberbullying Detection by Sentiment Analysis of Tweets' Contents Written in Arabic in Saudi Arabia Society

  • Almutairi, Amjad Rasmi;Al-Hagery, Muhammad Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.112-119
    • /
    • 2021
  • Social media has become a global means of communication in people's lives. Most people are using Twitter for communication purposes and its inappropriate use, which has negative effects on people's lives. One of the widely common misuses of Twitter is cyberbullying. As the resources of dialectal Arabic are rare, so for cyberbullying most people are using dialectal Arabic. For this reason, the ultimate goal of this study is to detect and classify cyberbullying on Twitter in the Arabic context in Saudi Arabia. To help in the detection and classification of tweets, Pointwise Mutual Information (PMI) to generate a lexicon, and Support Vector Machine (SVM) algorithms are used. The evaluation is performed on both methods in terms of the F1-score. However, the F1-score after applying the PMI is 50%, while after the SVM application on the resampling data it is 82%. The analysis of the results shows that the SVM algorithm outperforms better.

Frequency Matrix Based Summaries of Negative and Positive Reviews

  • Almuhannad Sulaiman Alorfi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.101-109
    • /
    • 2023
  • This paper discusses the use of sentiment analysis and text summarization techniques to extract valuable information from the large volume of user-generated content such as reviews, comments, and feedback on online platforms and social media. The paper highlights the effectiveness of sentiment analysis in identifying positive and negative reviews and the importance of summarizing such text to facilitate comprehension and convey essential findings to readers. The proposed work focuses on summarizing all positive and negative reviews to enhance product quality, and the performance of the generated summaries is measured using ROUGE scores. The results show promising outcomes for the developed methods in summarizing user-generated content.

Study on the effect of fear of crime on the selection of private security (범죄에 대한 두려움이 민간경비 선택에 미치는 영향에 관한 연구)

  • Kim, Sang-Woon;Shin, Jae-Hun
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.33-63
    • /
    • 2012
  • Humans are influenced by economic factors, physical environment factors, social and environmental factors, influenced by the media. In particular, the occurrence of the crime for fear of crime due to the human activities of the area has reduced. Fear of crime inflienced by direct victim of a crime, disorder of the surrounding environment, and indirect victims of crime. Therefore, in order to reduce their fears about crime in the private security through crime prevention and. About the factors affecting their fears about crime in the actual selection of the private security and private security activities in order to solve these problems through crime prevention, through this study will be described. In this study, we randomly select the survey was in August 2011, as detached house in Seoul and Daegu. As a result, the fear of crime fears about crime were influenced directly or indirectly by factors of private security selection.

  • PDF

Factors of the Acceptance Affecting the e-Payment System : Focusing on service quality and social influence (전자결제시스템의 수용에 미치는 영향요인 : 서비스품질.사회적 영향요인을 중심으로)

  • Jeon, Soo-Yong;Ha, Kyu-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3239-3248
    • /
    • 2010
  • A number of people using e-payment system has been increasing drastically during the recent period and the trend still continues. The purpose of this article was to investigate the effect of service quality and social factors on the e-payment system acceptance and the moderating effects of self-efficacy in the perspective of the interactional approach. In this research, data were collected from 2331 e-payment system users with structured questionnaires and analyzed using regression analysis method. This research found that security, responsiveness, mass media, word of mouth, security and self-efficacy of interaction effect have significant positive effects on acceptance intension. The result of this research showed that the social influence and self-efficacy interactional approach are more adequate than only service quality in accounting for the e-payment system acceptance.

The Analysis of Information Security Awareness Using A Text Mining Approach (텍스트 마이닝을 이용한 정보보호인식 분석 및 강화 방안 모색)

  • Lee, Tae-Heon;Youn, Young-Ju;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.76-94
    • /
    • 2016
  • Recently in Korea, the importance of information security awareness has been receiving a growing attention. Attacks such as social engineering and ransomware are hard to be prevented because it cannot be solved by information security technology. Also, the profitability of information security industry has been decreasing for years. Therefore, many companies try to find a new growth-engine and an entry to the foreign market. The main purpose of this paper is to draw out some information security issues and to analyze them. Finally, this study identifies issues and suggests how to improve the situation in Korea. For this, topic modeling analysis has been used to find information security issues of each country. Moreover, the score of sentiment analysis has been used to compare them. The study is exploring and explaining what critical issues are and how to improve the situation based on the identified issues of the Korean information security industry. Also, this study is also demonstrating how text mining can be applied to the context of information security awareness. From a pragmatic perspective, the study has the implications for information security enterprises. This study is expected to provide a new and realistic method for analyzing domestic and foreign issues using the analysis of real data of the Twitter API.