scholarly journals Cryptography – An Overview

Author(s):  
Mahasweta Das

With the day-by-day advancement of the Internet throughout the world, online marketing sites and applications are growing rapidly. More and more social networking sites are emerging almost every day connecting people from various parts of the world. These situations demand the organizers behind those networks to generate and store a huge amount of data regularly. Nonetheless to say, the more the data, the more is the risk of losing it. Hackers, phishers, or breachers are there at every nook and corner of the World Wide Web to steal and abuse the data of users. To protect the data from breaches, it is a necessity to secure the network. The general method of network protection is known as "Cryptography". Users are generally given a unique User ID and authentication code known as Password under which their data are stored individually. In this paper, we will discuss the overall idea of cryptography along with its methods and techniques.

Author(s):  
Lei Shi ◽  
Alexandra I. Cristea ◽  
Craig Stewart

The World Wide Web is changing, from the early Web 1.0 to the Social Web 2.0 and beyond to Web 3.0 interfaces, but more importantly, the users of the Web are also changing, and their numbers are increasing rapidly in line with this evolution. In e-Learning, it is essential to be able to keep up with these trends and provide personalized social interaction. Here, our main customers are our students, but these customers do not come unprepared: they already have a great deal of Web experience, especially in the areas of Social Networking Sites (SNS) and online interaction. Thus, it is essential to improve approaches used in the past, where learners were only involved in the receiving part of the delivery process. This chapter therefore proposes and explores applying participatory design methodologies in the early stages of the social adaptive educational hypermedia system design process, showing also its benefits for further design, implementation, and usage.


Author(s):  
Jean-Paul Lafayette DuQuette

What makes a successful online community? This is a question that would probably not have much meaning to someone in the early 1990. At the time, use of the World Wide Web had just begun to spread, first across college campuses and then among the general public in North America and Western Europe. A more common question, and one that Wellman and Gulia (1999) asked, was do online groups even call themselves communities at all? This chapter examines how much has changed about how we perceive online community since 1995: the people we converse with, the reasons for communicating online and the pitfalls encountered. It also introduces Cypris Chat, a virtual world community within Second Life that stubbornly clings to Internet first adopter values and goals, a group that reminds us that an online existence dominated by social networking sites has its alternatives.


Author(s):  
Sheela K.D Et. al.

Social Networking has become a global phenomenon. Millions of people now use internet to engage on social networks. As in, there are more than 300 Social Networking Sites (SNS) and the total number of people using Social Networking Sites around the world is 1.73 billion according to 2013 Sensex. In few years, the usage of Social Networking Sites has surprisingly grown. These Social Networking Sites offers a wide variety of resources and services such as messaging, sharing of  information, online marketing, blogging, connecting,  sharing photos, audios, videos, group discussion, and distribution of applications. Consequently; especially youth, are the avid users of these sites. And, the usage of Social Networking Sites among the youth has increased rapidly throughout the world. Evidently, Social Networking Sites have become significant part of our lives. However, the study has been set forward to analyse the influence of Social Networking Sites on the interpersonal relationships of youth in Kerala state. Humans are social animals and Interpersonal Relationships are a very vital aspect of human existence. Hence, the impact of Social Networking Sites on interpersonal relationships needs to be examined through the lens of Sociology.


Gamification ◽  
2015 ◽  
pp. 1882-1906
Author(s):  
Lei Shi ◽  
Alexandra I. Cristea ◽  
Craig Stewart

The World Wide Web is changing, from the early Web 1.0 to the Social Web 2.0 and beyond to Web 3.0 interfaces, but more importantly, the users of the Web are also changing, and their numbers are increasing rapidly in line with this evolution. In e-Learning, it is essential to be able to keep up with these trends and provide personalized social interaction. Here, our main customers are our students, but these customers do not come unprepared: they already have a great deal of Web experience, especially in the areas of Social Networking Sites (SNS) and online interaction. Thus, it is essential to improve approaches used in the past, where learners were only involved in the receiving part of the delivery process. This chapter therefore proposes and explores applying participatory design methodologies in the early stages of the social adaptive educational hypermedia system design process, showing also its benefits for further design, implementation, and usage.


2011 ◽  
Vol 2 (2) ◽  
pp. 708
Author(s):  
Andreas Chang

The use of Web 2.0 and Social Network Sites (SNS) has become an amazing phenomenon. In fact, one of the fastest-growing arenas of the World Wide Web is the space of so-called social networking sites. Face book, Tweeter, MySpace and other Social Network Sites have huge population of users. Almost seven hundred million people use Facebook, and hundreds of million others use other social networking sites. More and more advertisers switch their marketing budget to these SNS. This study contributes to our understanding of the Web 2.0 and the use of social networking websites by examining available literature. It seeks to understand what Web 2.0 and SNS mean, the trends, its functions and how they can be leveraged for marketing purposes.


Author(s):  
Danielle Fishman

As a result of the changing times, the constant overuse of recently discovered information communication technologies (ICT’s) has become a detrimental trend in contemporary society. There are a number of issues that arise from the regular use of these technologies which ultimately lead to the misuse of certain capabilities of these technologies. Web 2.0 (DiNucci, 1999), became the subject of discussion in the early 2000s. Web 2.0 identifies the newly popularized social networking sites on the World Wide Web which allow an interaction between the host and the user where the user has the ability to respond, comment or offer feedback to the host. It has been used to describe the idea of information sharing, feedback and ultimately, ubiquitous connectivity. As a result of the current Web 2.0 we engage in, there is a trend toward the constant use of social networking sites ultimately leading to participatory surveillance (Albrechtslund, 2008). Furthermore, the constant posting and updating required to manage your profile on social networking sites leads to new surveillance (Marx 2002) and sequentially, what has been termed lateral surveillance (Andrejevic, 2005). In addition, the development of location based technologies, for purposes of monitoring, have been integrated into popular social networking websites. The term Web 2.0 is associated with web applications that facilitate participatory information sharing, interoperability, user-centered design and collaboration on the World Wide Web. A Web 2.0 site allows users to interact and collaborate with one another in a social media dialogue as creators of user-generated content in a virtual community. This differs from the previous Web 1.0 websites where users (consumers) were limited to the passive viewing of content that was created for them. In turn, these activities are extensively popular and through the network effects of that popularity, economically significant (O’Reilly, 2005; Tweney, 2007; Madden and Fox, 2006). Finally, in accordance with the prosumer society, monetary gains are the primary focus of companies and furthermore, there has been a trend toward selling private information by internet website hosts in order to profit. The harnessing of collective intelligence within Web 2.0 demands platforms where this intelligence can be expressed and collected.  Furthermore, in an age of growing technology, new legislations must be created in conjunction with the growing use of personal information. In a time of extreme internet use, our privacy is limited. With a growing trend toward the integration of Web 2.0 in daily life, it is clear that the relationship between privacy and surveillance is dramatically changing. We, as users, are naive in understanding the concepts of privacy and surveillance in the Web 2.0 society. Social networking systems and information sharing has blurred our ideas of privacy and limited our understanding of the use of surveillance. In a growing age of a prosumer society and the culture of social networking, users are inadvertently exposed to living an entirely public life.


2019 ◽  
Vol 2 (3) ◽  
pp. 1
Author(s):  
Qassim Alwan Saeed ◽  
Khairallah Sabhan Abdullah Al-Jubouri

Social media sites have recently gain an essential importance in the contemporary societies، actually، these sites isn't simply a personal or social tool of communication among people، its role had been expanded to become "political"، words such as "Facebook، Twitter and YouTube" are common words in political fields of our modern days since the uprisings of Arab spring، which sometimes called (Facebook revolutions) as a result of the major impact of these sites in broadcasting process of the revolution message over the world by organize and manage the revolution progresses in spite of the governmental ascendance and official prohibition.


Author(s):  
Qingpeng Zhang ◽  
Dominic DiFranzo ◽  
James A. Hendler

Author(s):  
Vishnu VardanReddy ◽  
Mahesh Maila ◽  
Sai Sri Raghava ◽  
Yashwanth Avvaru ◽  
Sri. V. Koteswarao

In recent years, there is a rapid growth in online communication. There are many social networking sites and related mobile applications, and some more are still emerging. Huge amount of data is generated by these sites everyday and this data can be used as a source for various analysis purposes. Twitter is one of the most popular networking sites with millions of users. There are users with different views and varieties of reviews in the form of tweets are generated by them. Nowadays Opinion Mining has become an emerging topic of research due to lot of opinionated data available on Blogs & social networking sites. Tracking different types of opinions & summarizing them can provide valuable insight to different types of opinions to users who use Social networking sites to get reviews about any product, service or any topic. Analysis of opinions & its classification on the basis of polarity (positive, negative, neutral) is a challenging task. Lot of work has been done on sentiment analysis of twitter data and lot needs to be done. In this paper we discuss the levels, approaches of sentiment analysis, sentiment analysis of twitter data, existing tools available for sentiment analysis and the steps involved for same. Two approaches are discussed with an example which works on machine learning and lexicon based respectively.


Author(s):  
Vinay Kumar ◽  
Arpana Chaturvedi

<div><p><em>With the advent of Social Networking Sites (SNS), volumes of data are generated daily. Most of these data are multimedia type and unstructured with exponential growth. This exponential growth of variety, volume and complexity of structured and unstructured data leads to the concept of big data. Managing big data and harnessing its benefits is a real challenge. With increase in access to big data repository for various applications, security and access control is another aspect that needs to be considered while managing big data. We have discussed area of application of big data, opportunities it provides and challenges that we face in the managing such huge amount of data for various applications. Issues related to security against different threat perception of big data are also discussed. </em></p></div>


Sign in / Sign up

Export Citation Format

Share Document