• Title/Summary/Keyword: Social media security

Search Result 172, Processing Time 0.021 seconds

Smart Disaster Safety Management System for Social Security (사회안전을 위한 스마트 재난안전관리 시스템)

  • Kang, Heau-jo
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.225-229
    • /
    • 2017
  • In this paper, various units of industrial disaster safety threats as well as local and national facilities unit real-time detection and prevention refer to the corresponding system goes into disaster management preparedness, prevention, response recovery of phase I systematic ICT skills that can be managed more efficiently. In addition, the immediate disaster prevention and preparedness for early forecasting preemptive damage scale and high-tech information exchange technology to overcome the limitations of a human disaster in the field against the analysis and strategy of preemptive disaster safety management with smart risk management and prevention in response and recovery and the scene quickly and efficient mutual cooperation and effective collaboration and cooperation of the Community Center social security presented a smart disaster safety management system.

Social Media Analysis Based on Keyword Related to Educational Policy Using Topic Modeling (토픽모델링을 이용한 교육정책 키워드 기반 소셜미디어 분석)

  • Chung, Jin-myeong;Park, Young-ho;Kim, Woo-ju
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.53-63
    • /
    • 2018
  • The traditional mass media function of conveying information and forming public opinion has rapidly changed into an environment in which information and opinions are shared through social media with the development of ICT technology, and such social media further strengthens its influence. In other words, it has been confirmed that the influence of the public opinion through the production and sharing of public opinion on political, social and economic changes is increasing, and this change is already in use on the political campaign. In addition, efforts to grasp and reflect the opinions of the public by utilizing social media are being actively carried out not only in the political area but also in the public area. The purpose of this study is to explore the possibility of using social media based public opinion in educational policy. We collected media data, analyzed the main topic and probability of occurrence of each topic, and topic trends. As a result, we were able to catch the main interest of the public(the 'Domestic Computer Education Time' accounted for 43.99%, and 'Prime Project Selection' topics was 36.81% and 'Artificial Intelligence Program' topics was 7.94%). In addition, we could get a suggestion that flexible policies should be established according to the timing of the curriculum and the subject of the policy even if the category of the policy is same.

A Sentiment Classification Approach of Sentences Clustering in Webcast Barrages

  • Li, Jun;Huang, Guimin;Zhou, Ya
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.718-732
    • /
    • 2020
  • Conducting sentiment analysis and opinion mining are challenging tasks in natural language processing. Many of the sentiment analysis and opinion mining applications focus on product reviews, social media reviews, forums and microblogs whose reviews are topic-similar and opinion-rich. In this paper, we try to analyze the sentiments of sentences from online webcast reviews that scroll across the screen, which we call live barrages. Contrary to social media comments or product reviews, the topics in live barrages are more fragmented, and there are plenty of invalid comments that we must remove in the preprocessing phase. To extract evaluative sentiment sentences, we proposed a novel approach that clusters the barrages from the same commenter to solve the problem of scattering the information for each barrage. The method developed in this paper contains two subtasks: in the data preprocessing phase, we cluster the sentences from the same commenter and remove unavailable sentences; and we use a semi-supervised machine learning approach, the naïve Bayes algorithm, to analyze the sentiment of the barrage. According to our experimental results, this method shows that it performs well in analyzing the sentiment of online webcast barrages.

Less than Attractiveness of e-Sports Games for Female Audience - Journalism

  • Oleksandr, Petryk;Natalia, Sydorenko;Anastasia, Volobuieva
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.57-62
    • /
    • 2022
  • The attractiveness of e-sports games1 and the way it is spread has changed in recent years. Instead of conventional approaches, such as advertising campaigns or televised events, spectators are increasingly drawn to online platforms, which offer more opportunities for communication. Besides live streaming services like Twitch. tv, where spectators can watch matches in real-time or via recorded videos, social media platforms like Facebook and Twitter are now adding e-sports related content to their networks [1]. Especially the combination of live streams on Twitch, Twitter, and Facebook opens many possibilities regarding how information is shared. This might be an efficient way of spreading attractiveness among female audiences. This paper focuses on the attractiveness of e-sports events in general for females. It has been hypothesized that there are certain factors that influence this attractiveness. Studying past research papers and online resources, three factors were identified: The players' behavior and charisma, the impact of social media as well as videogames themselves. It is found that females are attracted to e-sport games because they allow them to engage more in the game compared to other videogames. This is because there are no time constraints that require players to accomplish certain tasks within a specific time frame. As such, female gamers can choose how much effort they want to put into the game depending on their personal preferences.

FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention

  • Alwi M Bamhdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.179-192
    • /
    • 2023
  • The widespread use of Cloud Computing, Internet of Things (IoT), and social media in the Information Communication Technology (ICT) field has resulted in continuous and unavoidable cyber-attacks on users and critical infrastructures worldwide. Traditional security measures such as firewalls and encryption systems are not effective in countering these sophisticated cyber-attacks. Therefore, Intrusion Detection and Prevention Systems (IDPS) are necessary to reduce the risk to an absolute minimum. Although IDPSs can detect various types of cyber-attacks with high accuracy, their performance is limited by a high false alarm rate. This study proposes a new technique called Fuzzy Logic - Objective Risk Analysis (FLORA) that can significantly reduce false positive alarm rates and maintain a high level of security against serious cyber-attacks. The FLORA model has a high fuzzy accuracy rate of 90.11% and can predict vulnerabilities with a high level of certainty. It also has a mechanism for monitoring and recording digital forensic evidence which can be used in legal prosecution proceedings in different jurisdictions.

Formation of Anti-Corruption Consciousness of Citizens as a Direction of Interaction of Public Authorities and Institutions of Civil Society

  • Shpak, Yurii;Bandura, Ivan;Primush, Roman;Dokalenko, Varvara;Abdullayev, Vagif
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.17-22
    • /
    • 2022
  • This article defines the process of formation of anti-corruption consciousness as one of the areas of interaction between public authorities and civil society institutions. It is concluded that the implementation of the state anti-corruption policy in Ukraine may be more promising if the institutions of civil society are actively involved. The degree of citizen engagement can be increased by increasing social trust, as well as by increasing the level of political and legal education and culture. Particular attention should be paid to the organization of public control and monitoring of the activities of public authorities, impartial coverage of information on the fight against corruption in the media, as well as the joint conduct of an information and educational campaign and the promotion of the formation of anti-corruption consciousness among a large number of citizens.

The Features of Ukrainian Media Art in a Global Context

  • Hridyayeva, Tamara O.;Kohut, Volodymyr O.;Tokar, Maryna I.;Stanychnov, Oleg O.;Helytovych, Andrii A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.229-240
    • /
    • 2021
  • The article seeks to explore Ukrainian media art and its features in a global context. In particular, it performs an in-depth analysis of the stages of its development from video art of the 1990s, media installations of the 2000s, and to various digital and VR technologies today. Due to historical circumstances, the development of media art was quite rapid, as young artists sought to gain new experience in media art. Most often, their experience was broadened through international cooperation and studying abroad. The paper analyzes the presentation of Ukrainian media art outside the country during 1993-2020 and distinguishes the main thematic areas of the artists' work. It examines how artists present and reveal the peculiarities of the Ukrainian worldview, aesthetics, and culture through the problematization of certain aspects and themes in their work. Specifically, among the principal topics which are problematized in the work of media artists are a sensory experience, limited sensory capabilities, gender issues, the Chernobyl tragedy, the development of utopian models of the city, and global communication. The leading themes of Ukrainian artists also include revolution and war. Notably, political and social sentiments determine the unique energy and vitality of contemporary Ukrainian art, create a revolutionary creative environment, and unite media artists in group art projects. It is concluded that by showing, exhibiting, and presenting them outside the country, artists shape the image of Ukrainian art in a global context.

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

Factors affecting social commerce acceptance - Perceived risks and social networking sites (SNS) use -

  • Park, Hansil;Babicheva, Eva;Lee, Kyu-Hye
    • The Research Journal of the Costume Culture
    • /
    • v.26 no.4
    • /
    • pp.547-562
    • /
    • 2018
  • As social media penetrates more deeply into people's everyday lives, social commerce (a type of commerce that combines SNS features and possibility for commercial transactions) has enjoyed unprecedented growth. Shopping on Facebook is a representative example of social commerce platform that allows consumers to interact with other users, exchange information and purchase products without leaving a Facebook page. Social commerce presents great opportunities for marketers in terms of leveraging social aspects of shopping experience. It also offers a large potential for Korean companies to reach various target markets, as well as establish their presence abroad. Yet, acceptance of social commerce as a legitimate shopping channel has been slow, and consumers are still hesitant to shop via Facebook. This study draws on uses and gratification theory and the concept of perceived risk to examine how different motives for SNS use and the associated types of perceived risks can affect the purchase intention on the platform. Empirical data from 288 young users of Facebook were analyzed. Findings identified two main motives for SNS use: information-related motive and communication-related motive. Information-related motive significantly affected the intention to shop on Facebook, whereas communication-related motive did not have any significant influence. Risks associated with shopping via Facebook included delivery risk, security risk, social risk and economic risk. Overall, consumers perceived a higher level of security and social risk associated with shopping on Facebook. However, only social risk had a significant negative influence on the purchase intention. Awareness and previous experience of buying via social commerce platform positively affected consumers' purchase intention.

Profane or Not: Improving Korean Profane Detection using Deep Learning

  • Woo, Jiyoung;Park, Sung Hee;Kim, Huy Kang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.305-318
    • /
    • 2022
  • Abusive behaviors have become a common issue in many online social media platforms. Profanity is common form of abusive behavior in online. Social media platforms operate the filtering system using popular profanity words lists, but this method has drawbacks that it can be bypassed using an altered form and it can detect normal sentences as profanity. Especially in Korean language, the syllable is composed of graphemes and words are composed of multiple syllables, it can be decomposed into graphemes without impairing the transmission of meaning, and the form of a profane word can be seen as a different meaning in a sentence. This work focuses on the problem of filtering system mis-detecting normal phrases with profane phrases. For that, we proposed the deep learning-based framework including grapheme and syllable separation-based word embedding and appropriate CNN structure. The proposed model was evaluated on the chatting contents from the one of the famous online games in South Korea and generated 90.4% accuracy.