We Shall Not Only Survive to the Future of Social Networks

Author(s):  
Christophe Thovex
Keyword(s):  
2021 ◽  
Author(s):  
Jessica Flint

The urgency of regulating fake news on social networks regarding election campaigns is more evident than ever. This poses considerable difficulties for legislative practice. It is important to consider the fundamental rights of the parties involved without the state's influence on the formation of public opinion becoming too great. The current options of reacting to fake news do not suffice to ensure a free opinion-forming process. This publication makes an innovative proposal as to how social networks – especially Facebook – can be regulated in the future in such a way that the discourse is strengthened and the alarming influence of private companies on the formation of opinion is limited.


Author(s):  
Shanthi Sivakumar

The number of users using the internet has drastically increased. Due to the large number of online users, demand has increased in various fields like social networks, knowledge sharing, commerce, etc. to protect the user's private data as well as control access. Unfortunately, the need for security and authentication for individual data also increased. In an attempt to confront the new risks unveiled by the networking revolution over the recent years, we need an efficient means for automatically recognizing the identity of individuals. Biometric authentication provides an improved level of security and paves the way to the future. Further, biometric authentication systems are classified as physiological biometric and behavioral biometric technologies. Further, the author provides ideas on research challenges and the future of authentication systems.


Information ◽  
2020 ◽  
Vol 11 (11) ◽  
pp. 539
Author(s):  
Robin Cohen ◽  
Karyn Moffatt ◽  
Amira Ghenai ◽  
Andy Yang ◽  
Margaret Corwin ◽  
...  

In this paper, we explore how various social networking platforms currently support the spread of misinformation. We then examine the potential of a few specific multiagent trust modeling algorithms from artificial intelligence, towards detecting that misinformation. Our investigation reveals that specific requirements of each environment may require distinct solutions for the processing. This then leads to a higher-level proposal for the actions to be taken in order to judge trustworthiness. Our final reflection concerns what information should be provided to users, once there are suspected misleading posts. Our aim is to enlighten both the organizations that host social networking and the users of those platforms, and to promote steps forward for more pro-social behaviour in these environments. As a look to the future and the growing need to address this vital topic, we reflect as well on two related topics of possible interest: the case of older adult users and the potential to track misinformation through dedicated data science studies, of particular use for healthcare.


2014 ◽  
Vol 543-547 ◽  
pp. 1856-1859
Author(s):  
Xiang Cui ◽  
Gui Sheng Yin

Recommender systems have been proven to be valuable means for Web online users to cope with the information overload and have become one of the most powerful and popular tools in electronic commerce. We need a method to solve such as what items to buy, what music to listen, or what news to read. The diversification of user interests and untruthfulness of rating data are the important problems of recommendation. In this article, we propose to use two phase recommendation based on user interest and trust ratings that have been given by actors to items. In the paper, we deal with the uncertain user interests by clustering firstly. In the algorithm, we compute the between-class entropy of any two clusters and get the stable classes. Secondly, we construct trust based social networks, and work out the trust scoring, in the class. At last, we provide some evaluation of the algorithms and propose the more improve ideas in the future.


2014 ◽  
Vol 17 (07n08) ◽  
pp. 1550005 ◽  
Author(s):  
QI XUAN ◽  
CHENBO FU ◽  
LI YU

In open source software (OSS) projects, participants initially communicate with others and then may become developers if they are deemed worthy by the community. Recent studies indicate that the abundance of established social links of a participant is the strongest predictor to his/her promotion. Having reliable rankings of the candidates is key to recruiting and maintaining a successful operation of an OSS project. This paper adopts degree-based, PageRank, and Hits ranking algorithms to rank developer candidates in OSS projects based on their social links. We construct several types of social networks based on the communications between the participants in Apache OSS projects, then train and test the ranking algorithms in these networks. We find that, for all the ranking algorithms under study, the rankings of emergent developers in temporal networks are higher than those in cumulative ones, indicating that the more recent communications of a developer in a project are more important to predict his/her first commit in the project. By comparison, the simple degree-based and the PageRank ranking algorithms in temporal undirected weighted networks behave better than the others in identifying emergent developers based on four performance indicators, and are thus recommended to be applied in the future.


Author(s):  
Iryna Skril ◽  
Nataliia Vasylyshyna ◽  
Tetiana Skyrda ◽  
Olena Moroz ◽  
Tatiana Voropayeva

The integration of Ukraine into the world community has caused a significant increase in interest in learning foreign languages as a means of information exchange. The modern conditions of development, expansion and deepening of international contacts require a high level of foreign language proficiency from a future specialist, especially in a foreign language of professional direction. High demands to the quality of education provision for the informatization of society. The high level of proficiency in a foreign language of a professional direction allows the future specialist to compete adequately not only in the domestic labor market but also abroad. It is promoted by the informatization of the educational process. It determined the relevance of the research problem. The study aims to establish the effectiveness of informatization of the foreign languages learning process of professional communication; to bring the feasibility of using social networks, cloud messengers, educational platforms in preparing future specialists for professional communication in a foreign language environment. The research methodology uses several methods. The main method in the study is the method of pedagogical experiment, also used the method of questioning, observation, to consider the theoretical material uses descriptive method, as well as methods of synthesis and analysis. The main hypothesis of the study is that the application of the educational potential of social networks, platforms, messengers, quizzes is an effective method of training a specialist with a high level of foreign language proficiency in the professional sphere. The result of the study is to determine the effectiveness of the use of the informatization process at the level of involvement of social networks, messengers to form a high level of foreign language proficiency as per profession. In the future, it is envisaged to study the application of informatization of the educational space during the teaching of a foreign language of professional communication.


2020 ◽  
Vol 10 (22) ◽  
pp. 8003
Author(s):  
Yi-Chun Chen ◽  
Cheng-Te Li

In the scenarios of location-based social networks (LBSN), the goal of location promotion is to find information propagators to promote a specific point-of-interest (POI). While existing studies mainly focus on accurately recommending POIs for users, less effort is made for identifying propagators in LBSN. In this work, we propose and tackle two novel tasks, Targeted Propagator Discovery (TPD) and Targeted Customer Discovery (TCD), in the context of Location Promotion. Given a target POI l to be promoted, TPD aims at finding a set of influential users, who can generate more users to visit l in the future, and TCD is to find a set of potential users, who will visit l in the future. To deal with TPD and TCD, we propose a novel graph embedding method, LBSN2vec. The main idea is to jointly learn a low dimensional feature representation for each user and each location in an LBSN. Equipped with learned embedding vectors, we propose two similarity-based measures, Influential and Visiting scores, to find potential targeted propagators and customers. Experiments conducted on a large-scale Instagram LBSN dataset exhibit that LBSN2vec and its variant can significantly outperform well-known network embedding methods in both tasks.


Surrounded by new pieces of technology every day, nowadays citizens often do not have so updated schemes of thinking as the hardware and software they deal with. So, they go on mainly with old ideas and are not able to imagine the future beyond the suggestions of the market. Velocity and competition myths are not born exactly with the digital age, and nonstop connection could be probably something more than only to chat with friends, watching videos and listen to music on line. From different sides, in our experience often mixed into an indistinct set, commercial social networks and non-profit ventures have in fact changed a great part of our lives and habits. But the way of technology is not already drawn, as it depends much on our deeds and choices.


Cloud computing and IoT are two very different technologies that are both already part of our life. Their adoption and use are expected to be more and more pervasive, making them important components of the Future Internet. A novel paradigm where Cloud and IoT are merged together is foreseen as disruptive and as an enabler of a large number of application scenarios. In this chapter, we focus our attention on the integration of Cloud and IoT. Reviewing the rich and articulate state of the art in this field, some issues are selected; Cloud Radio Access Network (C-RAN), Mobile Cloud IoT (MCIoT), Social Cloud (SC) and Fog Radio Access Network (F-RAN). C-RAN provides infrastructure layer services to mobile users by managing virtualized infrastructure resources. SC is a service or resource sharing framework on top of social networks, and built on the trust-based social relationships. In recent years, the idea of SC has been gaining importance because of its potential applicability. With an explosive growth of Mobile Cloud (MC) and IoT technologies, the MCIoT concept has become a new trend for the future Internet. MCIoT paradigm extends the existing facility of computing process to different mobile applications executing in mobile and portable devices. As a promising paradigm for the 5G wireless communication system, a new evolution of the cloud radio access network has been proposed, named as F-RANs. It is an advanced socially-aware mobile networking architecture to provide a high spectral and energy efficiency while alleviating backhaul burden. With the ubiquitous nature of social networks and cloud computing, IoT technologies exploit these developing new paradigms.


Sign in / Sign up

Export Citation Format

Share Document