Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (2)
- Digital Communications and Networking (2)
- Arts and Humanities (1)
- Communication (1)
- Communication Technology and New Media (1)
-
- Computational Engineering (1)
- Computer Sciences (1)
- Computer and Systems Architecture (1)
- E-Commerce (1)
- Electrical and Computer Engineering (1)
- Information Security (1)
- International and Intercultural Communication (1)
- Marketing (1)
- Mass Communication (1)
- Other Computer Engineering (1)
- Physical Sciences and Mathematics (1)
- Social Influence and Political Communication (1)
- Social Media (1)
- Social and Behavioral Sciences (1)
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Computer Engineering
Detection Of Truthful, Semi-Truthful, False And Other News With Arbitrary Topics Using Bert-Based Models, Elena Shushkevich, John Cardiff, Anna Boldyreva
Detection Of Truthful, Semi-Truthful, False And Other News With Arbitrary Topics Using Bert-Based Models, Elena Shushkevich, John Cardiff, Anna Boldyreva
Conference Papers
Easy and uncontrolled access to the Internet provokes the wide propagation of false information, which freely circulates in the Internet. Researchers usually solve the problem of fake news detection (FND) in the framework of a known topic and binary classification. In this paper we study possibilities of BERT-based models to detect fake news in news flow with unknown topics and four categories: true, semi-true, false and other. The object of consideration is the dataset CheckThat! Lab proposed for the conference CLEF-2022. The subjects of consideration are the models SBERT, RoBERTa, and mBERT. To improve the quality of classification we use …
How Online Discourse Networks Fields Of Practice: The Discursive Negotiation Of Autonomy On Art Organisation About Pages, Tommie Soro
Articles
This article examines how the online discourse of art organisations forges relationships between the artworld and the fields of politics and economy. Combining elements of Pierre Bourdieu’s field analysis and Norman Fairclough’s critical discourse analysis, the article analyses an elite art magazine, e-flux, and an elite art museum, IMMA, and the activities of discourses, genres, and utterances on their about pages. Its results suggest that the about pages of these organisations forge links between the artworld and the fields of politics and economy by mobilising discourse in these fields and by incorporating discourse practices from these fields. The ideological tension …
The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy
The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy
Articles
This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …
Kicm: A Knowledge-Intensive Context Model, Fredrick Mtenzi, Denis Lupiana
Kicm: A Knowledge-Intensive Context Model, Fredrick Mtenzi, Denis Lupiana
Conference papers
A context model plays a significant role in developing context-aware architectures and consequently on realizing context-awareness, which is important in today's dynamic computing environments. These architectures monitor and analyse their environments to enable context-aware applications to effortlessly and appropriately respond to users' computing needs. These applications make the use of computing devices intuitive and less intrusive. A context model is an abstract and simplified representation of the real world, where the users and their computing devices interact. It is through a context model that knowledge about the real world can be represented in and reasoned by a context-aware architecture. This …
Unified Messaging Systems: An Evolutionary Overview, Declan Barber
Unified Messaging Systems: An Evolutionary Overview, Declan Barber
The ITB Journal
Over the last decade, the widespread demand and use of the internet has changed the direction of the telecommunications industry as it was recognised that the internet could be used as an inexpensive way to handle not only data but also voice communications. This convergence of traditional voice and data technologies towards an IP-based open architecture has been paralleled by a convergence of the internet and mobile communications. As a result of these convergences, unified messaging has emerged as a technically viable service. Integrated messaging services that offer partial unification of different message types are already in the marketplace. This …
The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy
The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy
The ITB Journal
Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.
Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi
Defending Privacy: The Development And Deployment Of A Darknet, Conor Mcmanamon, Fredrick Mtenzi
Conference papers
New measures imposed by governments, Internet service providers and other third parties which threaten the state of privacy are also opening new avenues to protecting it. The unwarranted scrutiny of legitimate services such as file hosters and the BitTorrent protocol, once relatively unknown to the casual Internet user, is becoming more obvious. The darknet is a rising contender against these new measures and will preserve the default right to privacy of Internet users. A darknet is defined in the context of file sharing as a network which operates on top of another network such as the Internet for the purpose …