A statistical analysis for COVID-19 as a contract tracing approach and social network communication management

Author(s):  
Sipra Sahoo ◽  
Suneeta Satpathy ◽  
Saibal Dutta ◽  
Abdulsattar Abdullah Hamad ◽  
Anasuya Swain
Author(s):  
Matthew O. Jackson ◽  
Brian W. Rogers ◽  
Yves Zenou

What is the role of social networks in driving persistent differences between races and genders in education and labor market outcomes? What is the role of homophily in such differences? Why is such homophily seen even if it ends up with negative consequences in terms of labor markets? This chapter discusses social network analysis from the perspective of economics. The chapter is organized around the theme of externalities: the effects that one’s behavior has on others’ welfare. Externalities underlie the interdependencies that make networks interesting to social scientists. This chapter discusses network formation, as well as interactions between people’s behaviors within a given network, and the implications in a variety of settings. Finally, the chapter highlights some empirical challenges inherent in the statistical analysis of network-based data.


2016 ◽  
Vol 46 ◽  
pp. 98-106 ◽  
Author(s):  
Yaakov Ophir ◽  
Hananel Rosenberg ◽  
Christa S.C. Asterhan ◽  
Baruch B. Schwarz

Author(s):  
Jacob MBAYDAY ◽  
Paul DAYANG

In common Internet environments, most of the websites or services constrain the user account creation. Since the Internet is accessible by all and offers more and more services, a user has several accounts on the web. The difficulty in controlling their accounts does not leave indifferent to the users of the web. Hence the use of easy or insecure passwords. This is why we are victims of attacks and forgetting our passwords. Large companies such as Facebook, Google, etc., offer authorization and authentication mechanisms using the Oauth and OpenID protocol, which requires the opening of an account. To be independent of a social network or a site, it would be important to develop a model to make a statistical analysis between the attributes of the profiles of the same user and to create an account. Using the same password for all its different accounts could be an approach but avoiding the proliferation of data by proposing a model of identity analysis would be even more interesting. That is why this article proposes a centralized account management model by making a comparative and statistical study of the identity attributes and proposing a single account to the user to manage all its different accounts. So, we have a horizontal analysis between the attributes of the identity categories and a vertical analysis between these categories. This study allowed us to find a threshold to conclude that an account belongs to a user.


Author(s):  
Carlos A. Ballesteros-Herencia ◽  
Salvador Gómez-García

Framing processes are one of the preferred objects of study in the area of Communication, despite the frequent criticism regarding their theoretical and methodological strength. This study follows the proposal of Matthes and Kohring (2008) of the detection of frames through statistical analysis of clusters that operationalize the components as defined by Entman (2003) using framing elements. This is applied to the study of the electoral campaign on Facebook of the main Spanish political parties in the election of 28 April 2019. All messages published on this social network during the 15 days of the electoral campaign were captured automatically. The use of four large frames by the parties was detected, corresponding to events and political questions, request for vote, the rival party, and media treatment. The parties used these frames to different degrees: from the institutional and positive campaign of the PSOE, to the campaign aimed at criticizing the ruling party of the main opposition party, the PP, through the inclination towards media treatment of Unidas Podemos, or a focus on their own events and proposals by Ciudadanos and Vox. A negative correlation was detected between the frames most used by the political formations as a whole and the level of user engagement on Facebook, although the use of frames by PSOE and Unidas Podemos showed a greater parallelism with the levels of interaction in this social network. Resumen Los procesos de enmarcado, encuadre o framing son uno de los objetos de estudio preferentes en el área de Comunicación, a pesar de las frecuentes y reputadas críticas sobre su solidez teórica y metodológica. En esta investigación se sigue la propuesta de Matthes y Kohring (2008) para la detección de frames mediante análisis estadístico de conglomerados que operacionaliza en elementos de enmarcado los componentes de la definición de Entman (1993). Se aplica al estudio de la campaña electoral que hicieron los principales partidos políticos españoles a través de Facebook en la convocatoria del 28 de abril de 2019. Se capturaron automatizadamente todos los mensajes publicados en esta red social en los quince días de campaña electoral, detectándose el uso de cuatro grandes frames por parte de los partidos: marco de eventos y cuestiones políticas, marco de petición de voto, marco del partido rival y marco del tratamiento mediático. Los partidos utilizaron en diferente medida estos marcos: desde la campaña institucional y en positivo del PSOE; a la campaña volcada en criticar al partido gobernante del principal partido de la oposición, el PP; pasando por la inclinación hacia el tratamiento mediático de Unidas Podemos, o a centrarse en sus propios actos y propuestas de Ciudadanos y Vox. Se detectó una correlación negativa entre los frames más empleados por las formaciones políticas en su conjunto y el nivel de engagement en Facebook, si bien la utilización concreta de los marcos por parte del PSOE y Unidas Podemos sí mostró cierto paralelismo con los niveles de interacción en esta red social.


Author(s):  
Chiao Yi Yang ◽  
Frederick Kin Hing Phoa ◽  
Yen-Sheng Chiang

Transitivity is one of the most important mechanisms to form a social network in a human society, but it remains unclear how such behavior is quantified and affected by some key factors, including the social environment and the participants' characters. This study investigates the sharing behavior based on the notion of transitivity and an experiment is conducted on a variety of populations from kindergarteners to teenagers. The key effects that have high impacts to the sharing behavior are identified from the statistical analysis of the experimental results. A mathematical model is built for the experimental results and its performance compared with other models is also illustrated.


Author(s):  
Yaira K. Rivera Sánchez ◽  
Steven A. Demurjian

The emergence and ubiquity of mobile computing has placed powerful capabilities in one's hand providing a wide range of applications such as email, calendar, photos, browsers, social network, communication, shopping, health and fitness, games etc., which were once restricted to traditional platforms. Such applications on a single mobile device raise critical security issues related to managing identity, re-authenticating users that stay active for long periods of time, protecting sensitive PII and PHI against access and misuse, insuring secure transactions, and protecting the physical device. This chapter explores user authentication requirements for mobile computing by: evaluating alternative user authentication requirements in order to make recommendations on their usage in authentication; identifying authentication methods used in mobile healthcare applications; and proposing a set of requirements for user authentication to handle the situation when a user seeks to be securely authenticated across a set of applications that are placed into context within a framework.


Sign in / Sign up

Export Citation Format

Share Document