با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
71 |
Connecting the dots: A longitudinal observation of relief organizations representational networks on social media
اتصال نقاط: مشاهده طولی شبکه های بازنمودی سازمان های امدادرسانی در رسانه های اجتماعی-2017 In response to the call in the public relations research to examine organizations relationship building
beyond dyadic organization-public ties, this study employs a multidimensional network approach to
understand relief organizations relationship building through different features of social media. Unlike
the organizations studied in the existing public relations research, relief organizations often incorporate
emergency or disaster response as part of their mission operations. Specifically, this study focuses on the
organizations involved in the response actions after Typhoon Haiyan. Analysis of 66 relief organizations
network data on Twitter and Facebook shows that organizations multiple types of relationships in the
form of interorganizational representational networks constructed through different features of social
media are closely linked during and immediately after Typhoon Haiyan. However, organizations posi
tional centrality stays persistent across these networks over time, which suggests both constraints and
opportunities for organizations to build relational advantages through distinct features of social media.
Findings of this study show the usefulness of a multidimensional network approach in revealing the
hidden patterns behind organizations communication behavior on social media. In doing so, this study
offers more comprehensive explanations for organizations relationship building and relational outcomes
through social media use.
Keywords: Social media | Technological affordances | Relief organizations | Social network analysis | Disaster response | Public relations |
مقاله انگلیسی |
72 |
Factors Influencing Social Networks Use for Business: Twitter and YouTube Analysis
عوامل موثر بر استفاده از شبکه های اجتماعی برای کسب و کار: تجزیه و تحلیل توییتر و یوتیوب-2017 In this paper the authors aim at determining the factors that influence companies’ representative, both entrepreneurs and managers, into using social networks and in case they do, what are the benefits obtained. Prior research has focused especially on how social networks are used from the perspective of the individuals, while the analysis from the company perspective is limited. The papers previously published on this topic focus mostly on Facebook and less on other networks. Consequently, the authors test eight items for the social networks Twitter and YouTube that even though are not so used by Romanian companies, they have proven to influence the online performance of the business in various sectors with at least 30%.
Keywords: social networks | social media | Twitter | YouTube |
مقاله انگلیسی |
73 |
Dealing with video source identification in social networks
برخورد با شناسایی منبع ویدئویی در شبکه های اجتماعی-2017 Certainly detecting the source of a digital video it is a crucial task to be tackled by the image forensic scientific
community; in fact, knowing the brand and model of the device used for the video acquisition could be very
useful to focus investigations in a specific direction. Nowadays, videos are mostly acquired through a
smartphone and then shared on Social Networks (SNs). On such a basis, this paper proposes an analysis for
the source identification of a video uploaded on social networks, specifically, Twitter and Facebook.
Furthermore, the paper evaluates different methods to build a reliable fingerprint and also introduces a novel
method to generate a composite fingerprint by resorting to the use of PRNU noise. A tool to examine videos,
oriented to forensic analysts, is also presented. Experimental results carried out on various videos, firstly
uploaded and then downloaded from Facebook or Twitter, witness that the identification is still possible and
under which conditions.
Keywords: Video source identification | Social networks | Fingerprint | PRNU |
مقاله انگلیسی |
74 |
Formalising privacy policies in social networks
رسمیت بخشیدن به سیاست حفظ حریم خصوصی در شبکه های اجتماعی-2017 Social Network Services (SNS) have changed the way people communicate, bringing many
benefits but also new concerns. Privacy is one of them. We present a framework to write
privacy policies for SNSs and to reason about such policies in the presence of events
making the network evolve. The framework includes a model of SNSs, a logic to specify
properties and to reason about the knowledge of the users (agents) of the SNS, and a
formal language to write privacy policies. Agents are enhanced with a reasoning engine
allowing the inference of knowledge from previously acquired knowledge. To describe
the way SNSs may evolve, we provide operational semantics rules which are classified
into four categories: epistemic, topological, policy, and hybrid, depending on whether the
events under consideration change the knowledge of the SNS’ users, the structure of the
social graph, the privacy policies, or a combination of the above, respectively. We provide
specific rules for describing Twitter’s behaviour, and prove that it is privacy-preserving
(i.e., that privacy is preserved under every possible event of the system). We also show
how Twitter and Facebook are not privacy-preserving in the presence of additional natural
privacy policies.
Keywords: Social networks | Epistemic logic | Privacy |
مقاله انگلیسی |
75 |
Identification of influential users by neighbors in online social networks
شناسایی کاربران تاثیر گذار توسط همسایگان در شبکه های اجتماعی آنلاین-2017 Identification and ranking of influential users in social networks for the sake of news
spreading and advertising has recently become an attractive field of research. Given the
large number of users in social networks and also the various relations that exist among
them, providing an effective method to identify influential users has been gradually
considered as an essential factor. In most of the already-provided methods, those users who
are located in an appropriate structural position of the network are regarded as influential
users. These methods do not usually pay attention to the interactions among users, and also
consider those relations as being binary in nature. This paper, therefore, proposes a new
method to identify influential users in a social network by considering those interactions
that exist among the users. Since users tend to act within the frame of communities, the
network is initially divided into different communities. Then the amount of interaction
among users is used as a parameter to set the weight of relations existing within the
network. Afterward, by determining the neighbors’ role for each user, a two-level method
is proposed for both detecting users’ influence and also ranking them. Simulation and
experimental results on twitter data shows that those users who are selected by the
proposed method, comparing to other existing ones, are distributed in a more appropriate
distance. Moreover, the proposed method outperforms the other ones in terms of both the
influential speed and capacity of the users it selects.
Keywords: Influential users | Users’ interaction | SIR diffusion model | Social networks | Spreading process |
مقاله انگلیسی |
76 |
Identifying the same person across two similar social networks in a unified way: Globally and locally
شناسایی یک شخص در دو شبکه اجتماعی مشابه در یک روش واحد: در سطح جهانی و محلی-2017 With the increasing popularity of online social networks, people today typically own several such accounts (e.g., Facebook, Twitter, and Flickr). In this scenario, it arises an interesting and challenging problem: how to identify the same person in different social networks,
which is known as the network reconciliation problem. Prior work on this problem first assumes that the relationships between users are homogeneous, and then makes use of the local features (degree, common mapped neighbors) to achieve high precision. However,
this assumption does not hold in reality since users usually have different tie strengths between each other. In this paper, we remodel the reconciliation problem by considering the users’ heterogeneous relationships and propose a unified framework called UniRank for incorporating the local features and global features together. Based on UniRank, we design an efficient two-stage network reconciliation algorithm. First, we design a global matching algorithm to explore more seeds with fast speed. Second, for each explored seed, we design a breadth-first strategy based local matching algorithm to match more seeds. Extensive simulations on real-world and synthetic social network datasets show that our algorithm significantly improves the state-of-art algorithm by up to 9X in terms of F1 score even under very rough conditions.
Keywords: Social network | Network reconciliation | Identifying | Globally | Locally |
مقاله انگلیسی |
77 |
The Social Relation Key: A new paradigm for security
کلید ارتباط اجتماعی: یک نمونه جدید برای امنیت-2017 Article history:Received 23 June 2017Revised 7 July 2017Accepted 7 July 2017Available online 18 July 2017Keywords:Online social network Security keySMSTwitter SpamAuthenticationFor the last decade, online social networking services have consistently shown explosive annual growth, and have become some of the most widely used applications and services. Large amounts of social re- lation information accumulate on these platforms, and advanced services, such as targeted advertising and viral marketing, have been introduced to exploit this social information. Although many prior social relation-based services have been commerce oriented, we propose employing social relations to improve online security. Specifically, we propose that real social networks possess unique characteristics that are difficult to imitate through random or artificial networks. Also, the social relations of each individual are unique, like a fingerprint or an iris. These observations thus lead to the development of the Social Rela- tion Key (SRK) concept. We applied the SRK concept in different use cases in the real world, including in the detection of spam SMSes, and another in pinpointing fraud in Twitter followers. Since spammers multicast the same SMS to multiple, randomly-selected receivers and normal users multicast an SMS to friends or acquaintances who know each other, we devise a detection scheme that makes use of a clustering coefficient. We conducted a large scale experiment using an SMS log obtained from a major cellular network operator in Korea, and observed that the proposed scheme performs significantly better than the conventional content-based Naive Bayesian Filtering (NBF). To detect fraud in Twitter followers, we use different social network signatures, namely isomorphic triadic counts, and the property of social status. The experiment based on a Twitter dataset again confirmed the feasibility of the SRK. Our codes are available on a website1 .© 2017 Published by Elsevier Ltd. Keywords: Online social network | Security key | SMS | Twitter | Spam | Authentication |
مقاله انگلیسی |
78 |
Semantic network analysis of vaccine sentiment in online social media
تجزیه و تحلیل شبکه معنایی احساسات واکسن در رسانه های اجتماعی آنلاین-2017 Objective: To examine current vaccine sentiment on social media by constructing and analyzing semantic
networks of vaccine information from highly shared websites of Twitter users in the United States; and to
assist public health communication of vaccines.
Background: Vaccine hesitancy continues to contribute to suboptimal vaccination coverage in the United
States, posing significant risk of disease outbreaks, yet remains poorly understood.
Methods: We constructed semantic networks of vaccine information from internet articles shared by
Twitter users in the United States. We analyzed resulting network topology, compared semantic differ
ences, and identified the most salient concepts within networks expressing positive, negative, and neu
tral vaccine sentiment.
Results: The semantic network of positive vaccine sentiment demonstrated greater cohesiveness in dis
course compared to the larger, less-connected network of negative vaccine sentiment. The positive sen
timent network centered around parents and focused on communicating health risks and benefits,
highlighting medical concepts such as measles, autism, HPV vaccine, vaccine-autism link, meningococcal dis
ease, and MMR vaccine. In contrast, the negative network centered around children and focused on orga
nizational bodies such as CDC, vaccine industry, doctors, mainstream media, pharmaceutical companies, and
United States. The prevalence of negative vaccine sentiment was demonstrated through diverse messag
ing, framed around skepticism and distrust of government organizations that communicate scientific evi
dence supporting positive vaccine benefits.
Conclusion: Semantic network analysis of vaccine sentiment in online social media can enhance under
standing of the scope and variability of current attitudes and beliefs toward vaccines. Our study synthe
sizes quantitative and qualitative evidence from an interdisciplinary approach to better understand
complex drivers of vaccine hesitancy for public health communication, to improve vaccine confidence
and vaccination coverage in the United States.
Keywords: Vaccine hesitancy | Vaccine sentiment | Semantic network analysis | Online social media | Twitter |
مقاله انگلیسی |
79 |
The future of online social networks (OSN): A measurement analysis using social media tools and application
آینده شبکه های اجتماعی آنلاین (OSN): تجزیه و تحلیل اندازه گیری با استفاده از ابزارها و برنامه های رسانه های اجتماعی-2017 The explosion of online social networks (OSN) has created an interactive and communica
tive global phenomenon that has enabled billions of users to connect to other individuals
on Facebook and Twitter but also with media sharing platforms such as Instagram and
Pinterest. This study examines the current use of social media platforms and explores
the factors that help define the long term implications of social media. The study employed
a nationwide survey collected from 2012 to 2013 and is available from the PEW Internet
research center of more than 2000 American citizens’ behaviour towards OSNs. The results
revealed strong predictors of OSN that form the connections among users; and the core
significant predictors: age, gender and access to mobile Internet that foster the adoption
and usage of OSN in the future. Furthermore, online activities such as posting video content
on social networks also highlighted the online usage patterns and trends of using social
media to actively engage with other users more willingly than text. This is due to the viral
nature of online media sharing on social media and as part of the video viewing and
creating experience. An outline of practical implications of the findings and areas for future
research is also discussed.
Keywords: Social media | Online social networks | Social network analysis | Video sharing | Photo sharing | Future of social media |
مقاله انگلیسی |
80 |
The Good Left Undone: Advances and Challenges in Decentralizing Online Social Networks
چپ خوب انجام نشده: پیشرفت ها و چالش ها در تقسیم شبکه های اجتماعی آنلاین-2017 Billions of users are now inter-connected in Online Social Networks (OSNs) and, as they interact with
each other, massive amounts of potentially private data are collected at the OSN providers’ (e.g., Face
book or Twitter) premises. Unfortunately, provider-initiated privacy violations on this data are frequent
and there is little chance that the providers will grant users effective data-protection means. To address
these issues and to help users regain the control over their data, decentralized OSNs (DOSNs) have lately
been introduced as a competitive paradigm to provider-controlled, centralized OSNs. DOSNs are built to
function without the participation of a provider and with the intent to prevent any misuse of private user
data. However, all proposed DOSNs still lack widespread adoption. While challenging the market-leading
OSNs is difficult for many reasons, in this paper, we set out to understand the technical deficiencies be
hind the absence of a successful DOSN. We focus on the major technical challenge of DOSNs: they need
to substitute the datacenter-based infrastructure of centralized OSNs. We first review recent advances in
decentralizing OSNs based on how they approach that challenge. In a next step, we analyze the advan
tages and disadvantages each approach yields, and then derive a series of challenges that a successful
DOSN will have to fulfill. Finally, we discuss options of moving forward in designing a new DOSN that
could be successful in doing so.
Keywords: Online social networks |Decentralization | Survey |
مقاله انگلیسی |