Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy
The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy
Articles
This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …
Cyber Social Threats 2021: Ai, Covid-19 Vaccine, Detection And Countering Strategies, Ugur Kursuncu, Jeremy Blackburn, Yelena Mejova, Megan Squire, Amit Sheth
Cyber Social Threats 2021: Ai, Covid-19 Vaccine, Detection And Countering Strategies, Ugur Kursuncu, Jeremy Blackburn, Yelena Mejova, Megan Squire, Amit Sheth
Publications
In recent years, online platforms have been utilized for promoting harmful content and behavior such as extremism, harassment, mis/disinformation, human trafficking, genderbased violence among others affecting our society, often leading to real-world events. Such content and behaviors are inherently complex, making the recognition of these narratives challenging for researchers as well as social media companies. The Cyber Social Threats (CySoc) Workshop 2021 aimed to facilitate a rich forum for researchers and practitioners from both academia and industry in the areas of computing and social science, to discuss novel avenues for research on interdisciplinary aspects of harmful communications on social media, …
Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo
Trust And Closeness: A Mixed Method For Understanding The Relationship Of Social Network Users, Lei Yang, Xue Wang, Margaret Meiling Meiling Luo
Journal of International Technology and Information Management
Mutual trust among social networks users encourages positive communications, so it is critical to study trust in the context of online social networks. In this study, we built a model to calculate trust of social media users. Data was collected from Qzone (Tencent Technology Co., Ltd.), a SN service (also known as QQ) in China. We identified 150 QQ users and 3 friends from each of the users; data of these users were collected by Python program. The relationship between trust and closeness was constructed using an ordinary least squares regression model, and the factors that influence trust between social …
Evaluating Social Media As A Medium Of Private Communication Through Steganographic Images, Kendall Weldon Coles
Evaluating Social Media As A Medium Of Private Communication Through Steganographic Images, Kendall Weldon Coles
Graduate Theses, Dissertations, and Problem Reports
Social media is a vastly used communication tool with billions of users worldwide. These social networks provide users the ability to share their ideas and thoughts through the messages, videos, and images that they post. The images that are shared can possibly be embedded with private messages through the use of a steganographic tool. The messages are embedded in a fashion that doesn’t change the visual appearance of an image. This allows for these types of images to hide in plain sight, which creates the possibility of someone communicating privately in a public social media setting. This project proved how …