Model of Classification of University Services Using the Polarity of Opinions Taken from Social Networks

Author(s):  
Javier Sánchez-Guerrero ◽  
Silvia Acosta-Bones ◽  
Rosario Haro-Velastegui ◽  
Marco V. Guachimboza-Villalva
2019 ◽  
pp. 1-13
Author(s):  
Luz Judith Rodríguez-Esparza ◽  
Diana Barraza-Barraza ◽  
Jesús Salazar-Ibarra ◽  
Rafael Gerardo Vargas-Pasaye

Objectives: To identify early suicide risk signs on depressive subjects, so that specialized care can be provided. Various studies have focused on studying expressions on social networks, where users pour their emotions, to determine if they show signs of depression or not. However, they have neglected the quantification of the risk of committing suicide. Therefore, this article proposes a new index for identifying suicide risk in Mexico. Methodology: The proposal index is constructed through opinion mining using Twitter and the Analytic Hierarchy Process. Contribution: Using R statistical package, a study is presented considering real data, making a classification of people according to the obtained index and using information from psychologists. The proposed methodology represents an innovative prevention alternative for suicide.


2021 ◽  
pp. 124-131
Author(s):  
Marina Zyryanova

This article presents the classification of fakes on grounds of the information source that underlies the occurrence of false information. The study was perfomed on the coronavirus fakes that spread in Russian Federation in March 2020 during the beginning of the coronavirus pandemic in our country. For the analysis, only those fakes were taken, which the Administrations of the Russian regions promptly denied in their official accounts on social networks. Based on this, only those fakes that caused the greatest public response were selected for analysis. In this article, the following types of fakes are distinguished: folklore, symmetric, interpretive, additional, and conspiracy. Folklore fakes in various variations reproduce the same motives and are associated with well-established ideas and stereotypes in the mass consciousness. Symmetrical fakes partially or completely transfer true facts from one territory (country, region) to another. They can also transfer information from one person (structure) to another (s). Interpretative fakes are associated with the incorrect interpretation of events, information disseminated, or decisions made by the authorities by individual individuals. Additional fakes for a short period of time continue the theme of previously thrown disinformation. Conspiracy fakes are associated with conspiracy theory, characterized by stuffing on a wide territory and a large audience This classification is not exhaustive and can be supplemented as new fakes appear and are studied. Also, within the framework of this article, recommendations are given on how to refute a particular fake, depending on its belonging to a particular type.


2018 ◽  
Vol 22 (S2) ◽  
pp. 4035-4045 ◽  
Author(s):  
A. N. Arularasan ◽  
A. Suresh ◽  
Koteeswaran Seerangan
Keyword(s):  

Author(s):  
S. V. Kondratyuk ◽  

The author considered the classification of accomplices' acts in obtaining by a person of the highest position within the criminal hierarchy (the thief-in-law status). The research took into account the causal connections between the elements of the co-enforcement system regarding such crime. The paper divided the objective aspect of obtaining the highest position within the criminal hierarchy (the status of a thief in the law) into stages depending on the content of the crime co-perpetrators actions. The author considered the situations with a voluntary refusal of a person from the obtained highest position within the criminal hierarchy (the status of a thief in the law) as well as the conditions for co-executors active repentance. The paper defines an applicant to obtain the highest position within the criminal hierarchy (the thief-in-law status) as a performer. The study established that the status leaders become the co-perpetrators of a crime participating in the decision to grant a person the highest position in the criminal hierarchy (the status of a thief in the law). The co-perpetrators of this crime also include persons who consciously and purposefully disseminate the information about the assignment of a person to the highest position in the criminal hierarchy (the status of a thief in the law). Personal voluntary renunciation of the acquired highest position in the criminal hierarchy (the status of a thief in the law) should be made openly, for example, using the status in social networks or a chat. Active repentance of the accomplices of the crime under consideration provides for the voluntary refusal of a person from the acquired highest position in the criminal hierarchy (the status of a thief in law).


Author(s):  
Francisco Echarte ◽  
José Javier Astrain ◽  
Alberto Córdoba ◽  
Jesús Villadangos

Internet social networks offer a wide variety of possibilities, including communication between users, sharing information, and the creation of virtual communities on many different subjects. One of these subjects is healthcare, where different social networks are now appearing and covering different objectives. In this chapter, a social network is described, where users can formulate healthcare questions that are automatically classified under concepts of a medical ontology and assigned to experts of each topic. These questions are then answered by healthcare expert physicians. This chapter includes a semantic classifying method that provides the automatic classification of questions by means of a medical ontology, based on the tags used to annotate them, and the previously classified questions. The chapter includes an ontological model that represents the questions, the assigned tags, the answers, the physicians, and the medical concepts.


Author(s):  
Ramanpreet Kaur ◽  
Tomaž Klobučar ◽  
Dušan Gabrijelčič

This chapter is concerned with the identification of the privacy threats to provide a feedback to the users so that they can make an informed decision based on their desired level of privacy. To achieve this goal, Solove's taxonomy of privacy violations is refined to incorporate the modern challenges to the privacy posed by the evolution of social networks. This work emphasizes on the fact that the privacy protection should be a joint effort of social network owners and users, and provides a classification of mitigation strategies according to the party responsible for taking these countermeasures. In addition, it highlights the key research issues to guide the research in the field of privacy preservation. This chapter can serve as a first step to comprehend the privacy requirements of online users and educate the users about their choices and actions in social media.


Author(s):  
M. Rajesh ◽  
R. Abhilash ◽  
R. Praveen Kumar

Social Networks such as Twitter, Facebook play a remarkable growth in recent years. The ratio of tweets or messages in the form of URLs increases day by day. As the number of URL increases, the probability of fabrication also gets increased using their HTML content as well as by the usage of tiny URLs. It is important to classify the URLs by means of some modern techniques. Conditional redirection method is used here by which the URLs get classified and also the target page that the user needs is achieved. Learning methods also introduced to differentiate the URLs and there by the fabrication is not possible. Also the classifiers will efficiently detect the suspicious URLs using link analysis algorithm.


2021 ◽  
Vol 12 (1) ◽  
pp. 98-106
Author(s):  
Angelica Dosenko

The aim.Тhere is a theoretical justification for the phenomenon of «Communication Platform».Theapplied social and communication technologies there is a layering of terminological apparatus: classification and identification of terms and theoretical and methodological basis. One of such phenomena is the development of communication platforms, which are separated into an independent definition and depart from Internet platforms and social networks. It is important to study the development of platforming as a process of forming platforms of different types and cluster formation.Research methods.The method of theoretical analysis is used to study the existing points of view and clearly derive the definition of «communication platform».A method of comparison to derive the author's vision of the existence and functioning of the characteristics of the definition of «Communication Platform»and distinguish it from other types of platforms.The method of sociological survey contributed to the practical vision of the communication platform as an independent unit that is able to raise socially important issues and help solve difficult issues.The resultsof the study showed the difference between the terms «Social Networks»and "Communication Platform". There is a classification of platforms, the difference between them. The own vision of the terminological unit is given. This approach demonstrated the need for further scientific study of the phenomenon, the need to unify the approach to the description of platforming as a process in applied social and communication technologies.Social networks as a communication unit are considered in detail, the features that distinguish platforms and social networks are described.The conclusionsemphasize the further need to study communication platforms as applied scientific units. The definition of the phenomenon taking into account the author's vision is offered. Emphasis is placed on the features inherent in communication platforms.


Sign in / Sign up

Export Citation Format

Share Document