Author(s):  
He Hu ◽  
Xiaoyong Du

Online tagging is crucial for the acquisition and organization of web knowledge. We present TYG (Tag-as-You-Go) in this paper, a web browser extension for online tagging of personal knowledge on standard web pages. We investigate an approach to combine a K-Medoid-style clustering algorithm with the user input to achieve semi-automatic web page annotation. The annotation process supports user-defined tagging schema and comprises an automatic mechanism that is built upon clustering techniques, which can automatically group similar HTML DOM nodes into clusters corresponding to the user specification. TYG is a prototype system illustrating the proposed approach. Experiments with TYG show that our approach can achieve both efficiency and effectiveness in real world annotation scenarios.


2018 ◽  
Vol 23 (5) ◽  
pp. 526-538 ◽  
Author(s):  
Shuang Liang ◽  
Yue Zhang ◽  
Bo Li ◽  
Xiaojie Guo ◽  
Chunfu Jia ◽  
...  

Mobile precise internet web sites dissent drastically from their computer laptop equivalents in cloth, format and functionality. Sooner or later, present techniques to sight detrimental net internet internet sites rectangular movement now not probably to determine for such webpages. During this paper, we often typically have a propensity to format and exercising paintings over, a mechanism that distinguishes amongst terrible and benign mobile net net web sites. Activity over makes this energy of will supported normal picks of a net internet web page beginning with the quantity of iframes to the life of identified dishonourable cellular mobile cellphone numbers. First, we have a tendency to via attempting out show the requirement for mobile information strategies so installation a spread of new regular options that very correlate with cellular malicious pages. We will be predisposed to then use work over to a dataset of over 350,000 famous benign similarly to volatile cellular webpages and show 90th accuracy in splendor. In addition, we frequently normally normally have a tendency to discover, end up aware of and furthermore document choice of websites incomprehensible through Google Safe Surfing and furthermore Virus Total, however decided through art work over. Lastly, we will be inclined to growth a web browser extension victimization undertaking over to comfortable customers from damaging mobile internet web sites in length. In doing consequently, we provide the number one everyday assessment technique to view volatile cellular webpages


2021 ◽  
Author(s):  
Anthony Xu ◽  
Aravind Venkateswaran ◽  
Lianguizi Zhou ◽  
Andreas Zankl

Knowledge curation from the biomedical literature is very valuable but can be a repetitive and laborious process. The paucity of user-friendly tools is one of the reasons for the lack of widespread adoption of good biomedical knowledge curation practices. Here we present Ontoclick, a Chrome web browser extension that streamlines the process of annotating a text span with a relevant ontology term. We hope this tool will make biocuration more accessible to a wider audience of biomedical researchers. Ontoclick is freely available under the GPL-3.0 license on the Chrome Web Store. Source code and documentation are available at: https://github.com/azankl/Ontoclick Contact: [email protected]


Author(s):  
Piotr Teodorowski

Liberal states simultaneously pursue policies of encouraging and controlling (un)desired immigration. Forces of representative democracy, nationhood, constitutionalism, and capitalism - each call for distinct migration strategy. Previous research focusing on attitudes towards migration used quantitative methods examining values and perceptions that influence people’ opinions. Still, it did not explore the diversity and complexity of sentiments. This paper aims to provide a more nuanced perspective based on tweets at and around the last day of the British membership in the European Union (31 January 2020). Data were collected using NCapture- a web-browser extension which downloaded tweets with hashtags #Brexit, #BrexitDay and #BrexitEve, and imported them directly to NVivo. Seven batches of tweets were captured on 30-31 January and 1, 7-10 February; extracting 250,095 published between 23 January and 10 February. All retweets, duplicates, non-English tweets and spam were removed; leaving 888 tweets for the analysis. The dataset was coded twice; assigning sentiments towards Brexit as positive (n=203), negative (n=586) or neutral (n=99), and using inductive thematic analysis.The findings showed the division of discourse on migration were more complicated than merely in favour and against immigration. Interestingly, they also exhibited the shift in the British debate from benefits and drawbacks of immigration to the reciprocity of migration policies in the future relations between the United Kingdom and the European Union.


2014 ◽  
Vol 519-520 ◽  
pp. 373-376
Author(s):  
Yi Tang ◽  
Zhao Kai Luo ◽  
Ji Zhang

A web page often contains objects that the hosted web server intends a browser to render. Rendering those objects can instruct network requests to foreign origins. Although the same origin policy (SOP) limits the access for foreign objects, web attackers could circumvent the SOP controls through injected unintended objects for sensitive data smuggling. In this paper, we propose UOFilter, a whitelist-based method to filter out unintended objects in web pages. We define a list item structure to describe intended objects with optional integrity guarantees. The UOFilter in a web browser interprets the items and blocks the network requests issued by those unintended objects. We implement a proof of concept UOFilter prototype as a chrome browser extension and validate it with experiments.


2018 ◽  
Vol 4 (4) ◽  
pp. 495-512 ◽  
Author(s):  
Danielle Barbe ◽  
Lori Pennington-Gray ◽  
Ashley Schroeder

Purpose The purpose of this paper is to understand the online communication strategies used by destination management organizations (DMOs) during a terrorist attack. In particular, this study analyzes Twitter use during seven terrorism incidents in six European cities (Paris, Brussels, Nice, Berlin, London and Barcelona) between 2015 and 2017. Design/methodology/approach Twitter content was collected via NCapture, a web browser extension of NVivo, one week prior to the attacks, the day of, and two weeks following to determine the timeframe in which DMOs communicated about the crisis, the types of messages being communicated, and whether these messages are effective. This study uses Coombs’ Situational Crisis Communication Theory as a guide to analyzing the effectiveness of the crisis communication strategies. Findings The findings of this paper indicate that DMOs are not effectively using Twitter during a terrorist attack. Few tweets relating to the attacks provided tourists with information regarding their safety, with the remaining only communicating as victims. Many DMOs went offline in the days immediately following the attacks and each DMO’s crisis communication on Twitter only lasted up to one week following the attacks. Originality/value This study provides insight into the ways DMOs are using social media for crisis communication. These results inform DMOs on their responsibility in communicating information during a terrorist attack. Messages of support are useful in the recovery stage, but tourists need information on how to stay safe and Twitter is often the first source people go to for information (Simon et al., 2014).


Author(s):  
Merve Basdogan ◽  
Zulfukar Ozdogan ◽  
Curtis Bonk

In this study, we attempt to understand discursive interrelationships among five professional job advertisements which are often used interchangeably, including educational technology, educational design, instructional design, learning design, and instructional systems design. The purpose is to better understand the distinctions, interactions, and overlaps of these disciplines using Encoding/Decoding Model over the discourses of the jobs’ announcements. We collected data using a social network analysis tool, NCapture, and imported to qualitative analysis software (i.e., NVivo) to conduct thematic analyses. For this study, 171 job postings in Twitter were captured by using NCapture as a Web-browser extension. Findings indicated that the relations between the targeted disciplines can be explained by Stuart Hall’s Communication Model (1980). Results can serve as a guide for scholars and students studying at the intersection of technology and education fields.


Sign in / Sign up

Export Citation Format

Share Document