• 제목/요약/키워드: Social media security

검색결과 171건 처리시간 0.024초

토픽모델링을 이용한 교육정책 키워드 기반 소셜미디어 분석 (Social Media Analysis Based on Keyword Related to Educational Policy Using Topic Modeling)

  • 정진명;박영호;김우주
    • 인터넷정보학회논문지
    • /
    • 제19권4호
    • /
    • pp.53-63
    • /
    • 2018
  • 정보를 전달하고 여론을 형성하는 전통적인 매스미디어의 기능이 ICT 기술의 발전으로 소셜미디어를 통해 정보와 의견을 공유하는 환경으로 급격하게 변해 왔으며, 그 영향력을 더욱 강화시키고 있다. 즉, 일반 대중들이 소셜미디어를 통해 정치 사회 경제 변화에 대한 여론을 생산하고 공유하는 여론의 영향력이 갈수록 커지고 있는 것이 확인되고 있으며, 그 변화는 선거활동과 같은 정치 분야에서 활용되고 있다. 소셜미디어를 활용해서 대중들의 의사를 파악하고, 반영하기 위한 노력은 정치 영역뿐만 아니라 공공 영역에서도 활발하게 이루어지고 있다. 본 논문은 교육분야 정책과정에서 소셜미디어 기반 여론을 활용하기 위한 가능성을 탐색하는 것을 목적으로 한다. 이를 위해 교육정책 중 소프트웨어교육에 관한 키워드를 중심으로 데이터를 수집하고, 문서의 주요 토픽과 토픽별 출현 확률, 토픽 트렌드를 분석하였다. 그 결과 '국내 컴퓨터 교육 시간'토픽이 전체의 43.99%를 차지하였으며, '프라임 사업 선정' 토픽이 36.81%, '인공지능 프로그램'토픽이 7.94%의 출현 확률을 나타내어, 대중의 소프트웨어교육 정책에 대한 주요 관심도를 파악할 수 있었다. 또한, 시기별 토픽 추세 및 연관성 있는 토픽간의 트렌드 비교 분석을 통하여 동일한 주제의 정책이라도 교육과정의 시기와 정책의 대상에 따라 유연한 정책수립이 필요하다는 시사점을 도출할 수 있었다.

A Sentiment Classification Approach of Sentences Clustering in Webcast Barrages

  • Li, Jun;Huang, Guimin;Zhou, Ya
    • Journal of Information Processing Systems
    • /
    • 제16권3호
    • /
    • pp.718-732
    • /
    • 2020
  • Conducting sentiment analysis and opinion mining are challenging tasks in natural language processing. Many of the sentiment analysis and opinion mining applications focus on product reviews, social media reviews, forums and microblogs whose reviews are topic-similar and opinion-rich. In this paper, we try to analyze the sentiments of sentences from online webcast reviews that scroll across the screen, which we call live barrages. Contrary to social media comments or product reviews, the topics in live barrages are more fragmented, and there are plenty of invalid comments that we must remove in the preprocessing phase. To extract evaluative sentiment sentences, we proposed a novel approach that clusters the barrages from the same commenter to solve the problem of scattering the information for each barrage. The method developed in this paper contains two subtasks: in the data preprocessing phase, we cluster the sentences from the same commenter and remove unavailable sentences; and we use a semi-supervised machine learning approach, the naïve Bayes algorithm, to analyze the sentiment of the barrage. According to our experimental results, this method shows that it performs well in analyzing the sentiment of online webcast barrages.

Less than Attractiveness of e-Sports Games for Female Audience - Journalism

  • Oleksandr, Petryk;Natalia, Sydorenko;Anastasia, Volobuieva
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.57-62
    • /
    • 2022
  • The attractiveness of e-sports games1 and the way it is spread has changed in recent years. Instead of conventional approaches, such as advertising campaigns or televised events, spectators are increasingly drawn to online platforms, which offer more opportunities for communication. Besides live streaming services like Twitch. tv, where spectators can watch matches in real-time or via recorded videos, social media platforms like Facebook and Twitter are now adding e-sports related content to their networks [1]. Especially the combination of live streams on Twitch, Twitter, and Facebook opens many possibilities regarding how information is shared. This might be an efficient way of spreading attractiveness among female audiences. This paper focuses on the attractiveness of e-sports events in general for females. It has been hypothesized that there are certain factors that influence this attractiveness. Studying past research papers and online resources, three factors were identified: The players' behavior and charisma, the impact of social media as well as videogames themselves. It is found that females are attracted to e-sport games because they allow them to engage more in the game compared to other videogames. This is because there are no time constraints that require players to accomplish certain tasks within a specific time frame. As such, female gamers can choose how much effort they want to put into the game depending on their personal preferences.

FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention

  • Alwi M Bamhdi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.179-192
    • /
    • 2023
  • The widespread use of Cloud Computing, Internet of Things (IoT), and social media in the Information Communication Technology (ICT) field has resulted in continuous and unavoidable cyber-attacks on users and critical infrastructures worldwide. Traditional security measures such as firewalls and encryption systems are not effective in countering these sophisticated cyber-attacks. Therefore, Intrusion Detection and Prevention Systems (IDPS) are necessary to reduce the risk to an absolute minimum. Although IDPSs can detect various types of cyber-attacks with high accuracy, their performance is limited by a high false alarm rate. This study proposes a new technique called Fuzzy Logic - Objective Risk Analysis (FLORA) that can significantly reduce false positive alarm rates and maintain a high level of security against serious cyber-attacks. The FLORA model has a high fuzzy accuracy rate of 90.11% and can predict vulnerabilities with a high level of certainty. It also has a mechanism for monitoring and recording digital forensic evidence which can be used in legal prosecution proceedings in different jurisdictions.

Formation of Anti-Corruption Consciousness of Citizens as a Direction of Interaction of Public Authorities and Institutions of Civil Society

  • Shpak, Yurii;Bandura, Ivan;Primush, Roman;Dokalenko, Varvara;Abdullayev, Vagif
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.17-22
    • /
    • 2022
  • This article defines the process of formation of anti-corruption consciousness as one of the areas of interaction between public authorities and civil society institutions. It is concluded that the implementation of the state anti-corruption policy in Ukraine may be more promising if the institutions of civil society are actively involved. The degree of citizen engagement can be increased by increasing social trust, as well as by increasing the level of political and legal education and culture. Particular attention should be paid to the organization of public control and monitoring of the activities of public authorities, impartial coverage of information on the fight against corruption in the media, as well as the joint conduct of an information and educational campaign and the promotion of the formation of anti-corruption consciousness among a large number of citizens.

The Features of Ukrainian Media Art in a Global Context

  • Hridyayeva, Tamara O.;Kohut, Volodymyr O.;Tokar, Maryna I.;Stanychnov, Oleg O.;Helytovych, Andrii A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.229-240
    • /
    • 2021
  • The article seeks to explore Ukrainian media art and its features in a global context. In particular, it performs an in-depth analysis of the stages of its development from video art of the 1990s, media installations of the 2000s, and to various digital and VR technologies today. Due to historical circumstances, the development of media art was quite rapid, as young artists sought to gain new experience in media art. Most often, their experience was broadened through international cooperation and studying abroad. The paper analyzes the presentation of Ukrainian media art outside the country during 1993-2020 and distinguishes the main thematic areas of the artists' work. It examines how artists present and reveal the peculiarities of the Ukrainian worldview, aesthetics, and culture through the problematization of certain aspects and themes in their work. Specifically, among the principal topics which are problematized in the work of media artists are a sensory experience, limited sensory capabilities, gender issues, the Chernobyl tragedy, the development of utopian models of the city, and global communication. The leading themes of Ukrainian artists also include revolution and war. Notably, political and social sentiments determine the unique energy and vitality of contemporary Ukrainian art, create a revolutionary creative environment, and unite media artists in group art projects. It is concluded that by showing, exhibiting, and presenting them outside the country, artists shape the image of Ukrainian art in a global context.

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • 제24권6호
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

Factors affecting social commerce acceptance - Perceived risks and social networking sites (SNS) use -

  • Park, Hansil;Babicheva, Eva;Lee, Kyu-Hye
    • 복식문화연구
    • /
    • 제26권4호
    • /
    • pp.547-562
    • /
    • 2018
  • As social media penetrates more deeply into people's everyday lives, social commerce (a type of commerce that combines SNS features and possibility for commercial transactions) has enjoyed unprecedented growth. Shopping on Facebook is a representative example of social commerce platform that allows consumers to interact with other users, exchange information and purchase products without leaving a Facebook page. Social commerce presents great opportunities for marketers in terms of leveraging social aspects of shopping experience. It also offers a large potential for Korean companies to reach various target markets, as well as establish their presence abroad. Yet, acceptance of social commerce as a legitimate shopping channel has been slow, and consumers are still hesitant to shop via Facebook. This study draws on uses and gratification theory and the concept of perceived risk to examine how different motives for SNS use and the associated types of perceived risks can affect the purchase intention on the platform. Empirical data from 288 young users of Facebook were analyzed. Findings identified two main motives for SNS use: information-related motive and communication-related motive. Information-related motive significantly affected the intention to shop on Facebook, whereas communication-related motive did not have any significant influence. Risks associated with shopping via Facebook included delivery risk, security risk, social risk and economic risk. Overall, consumers perceived a higher level of security and social risk associated with shopping on Facebook. However, only social risk had a significant negative influence on the purchase intention. Awareness and previous experience of buying via social commerce platform positively affected consumers' purchase intention.

Profane or Not: Improving Korean Profane Detection using Deep Learning

  • Woo, Jiyoung;Park, Sung Hee;Kim, Huy Kang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권1호
    • /
    • pp.305-318
    • /
    • 2022
  • Abusive behaviors have become a common issue in many online social media platforms. Profanity is common form of abusive behavior in online. Social media platforms operate the filtering system using popular profanity words lists, but this method has drawbacks that it can be bypassed using an altered form and it can detect normal sentences as profanity. Especially in Korean language, the syllable is composed of graphemes and words are composed of multiple syllables, it can be decomposed into graphemes without impairing the transmission of meaning, and the form of a profane word can be seen as a different meaning in a sentence. This work focuses on the problem of filtering system mis-detecting normal phrases with profane phrases. For that, we proposed the deep learning-based framework including grapheme and syllable separation-based word embedding and appropriate CNN structure. The proposed model was evaluated on the chatting contents from the one of the famous online games in South Korea and generated 90.4% accuracy.

기업의 개인정보 보호에 대한 사용자 인식 연구: 다차원 접근법(Analytic Hierarch Process)을 활용한 정보보안 속성 평가 및 업종별 비교 (User Perception of Personal Information Security: An Analytic Hierarch Process (AHP) Approach and Cross-Industry Analysis)

  • 박종화;한승민;정윤혁
    • 경영정보학연구
    • /
    • 제25권4호
    • /
    • pp.233-248
    • /
    • 2023
  • 최근 지능정보기술의 활용이 확산되면서 개인정보 침해에 대한 위험이 더욱 증가하고 있다. 특히, 기업이 디지털 환경에서 개인정보의 수집과 활용에 중점을 두면서, 기업의 고객정보 보호에 대한 사회적 관심이 증가하고 있다. 비록 인터넷 사용자들의 개인정보 보호에 대한 인식은 광범위하게 연구되어 왔으나, 특정 업종의 문맥, 더 나아가 업종별 개인정보 보호에 대한 비교 연구는 아직 부족한 실정이다. 본 연구는 기업의 개인정보 보안 특성에 대한 사용자 인식을 바탕으로, 업종별 개인정보 보호 수준을 비교 분석하고자 한다. 이를 위해 인터넷 사용자 498명을 대상으로 국내 포털사이트, 해외 포털사이트, 소셜미디어, 온라인 쇼핑몰, 은행, 정부기관, 온라인 사행성 게임 등 다양한 업종에 대한 개인정보 보안 특성에 대한 분석을 실시하였다. 설문을 통해 수집된 데이터를 분석적 계층과정(Analytic Hierarch Process, AHP)을 이용하여 각 보안 특성의 상대적 중요도를 도출하였다. 연구결과, 사용자들은 기업의 개인정보 보호를 평가할 때 기술적 보안과 투명성을 가장 중요한 요소로 간주하였다. 기술적 보안면에서는 은행과 국내 포털사이트가, 투명성 면에서는 은행과 정부기관이 우수한 성과를 보였다. 반면, 소셜미디어는 기술적 보안과 투명성 모두에서 가장 부진한 성과를 보였다. 본 연구는 개인정보 보안에 대한 다차원적 접근법을 제시하고, 사용자 관점에서 각 보안 특성에 대한 업종별 차이를 조명함으로써 연구적 의의를 가진다.