scholarly journals A Study on Recommendation Systems in Location Based Social Networking

2017 ◽  
Vol 41 (2) ◽  
pp. 213-229
Author(s):  
Lakshmi Shree Kullappa ◽  
Rajeshwari Kullappa

Smart devices in the hands of people are revolutionizing the social lifestyle of one's self. Everyone across the world are using smart devices linked to their social networking activities one such activity is to share location data by uploading the tagged media content like photos, videos. The data is of surroundings, events attended/attending and travel experiences. Users share their experiences at a given location through localization techniques.  Using such data from social networks an attempt is made to analyse tagged media content to acquire information on user context, individual’s interests, tastes, behaviours and derive meaningful relationships amongst them are referred to as Location Based Social Networks (LBSNs). The resulting information can be used to market a product and to improve business, as well recommend a travel and plan an itinerary. This paper presents a comprehensive survey of recommended systems for LBSNs covering the concepts of LBSNs, terminologies of LBSN and various recommendation systems.

Online users create their profiles on numerous social platforms to get benefits of various types of social media content. During online profile creation, the user selects a username and feeds his/her personal details like name, location, email, etc. As different social networking services acquire common personal attributes of the same user and present them in a variety of formats. To understand the availability and similarity of personal attributes across various social networking services, we propose a method that uses the different distance measuring algorithms to determine the display-name similarity across social networks. From the experimental results, it is found that at least twenty percent GooglePlus-Facebook and Facebook-Twitter users select the same display name, while forty five percent Google and Twitter user select identical name across both the social networks.


2013 ◽  
Vol 15 (1) ◽  
Author(s):  
Stephen M. Mutula

Background: With the growing adoption and acceptance of social networking, there are increased concerns about the violation of the users’ legitimate rights such as privacy, confidentiality, trust, security, safety, content ownership, content accuracy, integrity, access and accessibility to computer and digital networks amongst others.Objectives: The study sought to investigate the following research objectives to: (1) describe the types of social networks, (2) examine global penetration of the social networks, (3) outline the users’ legitimate rights that must be protected in the social networking sites (SNS), (4) determine the methods employed by SNS to protect the users’ legitimate rights and (5) identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS.Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively.Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate.Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.


Author(s):  
Khalid Abdulkareem Al-Enezi ◽  
Imad Fakhri Taha Al Shaikhli ◽  
Sufyan Salim Mahmood AlDabbagh

<span>This research aims to measure the role of social networks in influencing purchasing decisions among consumers in Kuwait; the research used the quantitative methods, and analytical the technique to get the results, and the research developed a measure to study the relationship between the variables to the study and selection of a sample of consumers of (100). The results indicated that the social networking variables (exchange of information, evaluation of product) possess influence on purchasing decisions. Furthermore, the results indicate that majority of respondents do their digital scanning more often before intend to go to the store. The unexpected results came from the question “traditional advertising (TV, Newspaper, Magazine, Billboards) are more effective than the social networking; 23% agreed, 36% said no, and 41% said sometimes. In light of these findings, the study made a series of recommendations; the most important are; The executives and sales representatives need to understand the benefits offered by social networks, and understand the advantages and functions and tools of social communication, and knowing how to apply them effectively and efficiently, and then use the appropriate social networking tool.</span>


2014 ◽  
pp. 1717-1730
Author(s):  
Joanne Kuzma

The growth of Online Social Networking sites has brought new services and communication methods to consumers. However, along with benefits, serious problems such as online cyber harassment have recently come to the forefront of the electronic media. This behavior can have significant negative effect on individuals, businesses and the social networks. Some sites have begun to provide some levels of protection and create specific anti-harassment policies in their terms of service along with implementing protection technologies. However, these protective measures are not consistent among social media, leaving some consumers at greater risk. This study analyzed 60 worldwide social sites and determined the level of cyber-harassment protection. It reviewed statistical differences among geographical-based social networks. The results showed significant gaps among various social networks, but suggests methods for improving consumer safeguards to provide consistent levels of protection.


Author(s):  
Emad Abu-Shanab ◽  
Mushera Frehat

Social networks are virtual communication sites that allow its participants to connect, building relationships, and collaborate on social issues. It became part of our lives and spread rapidly among youth. Young people join these sites to keep strong relationships with friends and to make new ones. Therefore, it is important to investigate the factors that influence the intention to use social networking sites (SNSs) to gain better position in the social reform among young people. This study developed an integrated theoretical model which has five major factors that predict the intention to use SNSs. An empirical test was conducted, where a sample of 302 university students and an instrument containing 27 items was used. The results provide consistent evidence that all hypothesized positive associations exist except for the isolation variable. After taking into account different demographic and attitudinal variables, Facebook use still predicted respondents' social reform. The future work might focus on a specific context such as the effects of using social networks on education, and focus on students' environment in education and the influence of social network. Detailed results, conclusions and future work are stated in later sections.


Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequate for the high value of the published information. For all these reasons, online social networks suffer more and more attacks by sophisticated crackers and scammers. To make things worse, the information gathered from social web sites can trigger attacks to even more sensible targets. This work reviews some typical social attacks that are conducted on social networking systems, describing real-world examples of such violations and analyzing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


2011 ◽  
pp. 1286-1297
Author(s):  
Malcolm Shore

This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the evolution of hacking as a form of social networking, from its roots in Bulletin Board systems to the current attacks on Second Life, and considers the motivation for hacking. Ajzen’s Theory of Planned Behavior and Beveren’s Flow Theory model are, when considered together, found to explain many of the observed characteristics of early hacker activity. The place of social networks in motivating hacking is explored, and some observations are made in relation to hacking and the Second Life environment. A number of control variables are identified which can be used to reduce the likelihood of people engaging in the hacking activity. Addressing the social network factors which motivate hacking provides an important early step in addressing cybercrime.


Author(s):  
Mehmet Ferhat Sönmez

Identity emerges as a flexible, multidimensional, variable, and slippery concept that cannot be defined through the processes of discussion and understanding. The new construction area of this concept, which is regarded as a process constructed on the social plane, is the social networking platforms. This is because these platforms are the most common communication environments where people and their lifestyles are presented to the outside world, in addition to the cheap and rapid satisfaction of their needs for information and entertainment. Face-to-face communication and language practices are not sufficient enough in the identity presentation anymore. Individuals choose to design and update their identities through social networks and to perform an image-based identity manifestation. This chapter examines how identity was established and manifested through social networks, and analyzes the identities the popular people in these networks designed and exhibited.


2017 ◽  
pp. 88-111 ◽  
Author(s):  
Cristina Elena Turcu ◽  
Corneliu Octavian Turcu

This chapter presents a future vision for healthcare, which will involve smart devices, Internet of Things, and social networks, that make this vision a reality. The authors present the necessary background by introducing the Social Internet of Things paradigm. Agent technology seems to be a promising approach in the adoption of the Social Internet of Things in collaborative environments with increased autonomy and agility, like healthcare is. Also, it is examined challenges to the adoption of the Social Internet of Things in healthcare in order to facilitate new applications and services in more effective and efficient ways.


2015 ◽  
Vol 6 (1) ◽  
pp. 61-75 ◽  
Author(s):  
Emad Abu-Shanab ◽  
Mushera Frehat

Social networks are virtual communication sites that allow its participants to connect, building relationships, and collaborate on social issues. It became part of our lives and spread rapidly among youth. Young people join these sites to keep strong relationships with friends and to make new ones. Therefore, it is important to investigate the factors that influence the intention to use social networking sites (SNSs) to gain better position in the social reform among young people. This study developed an integrated theoretical model which has five major factors that predict the intention to use SNSs. An empirical test was conducted, where a sample of 302 university students and an instrument containing 27 items was used. The results provide consistent evidence that all hypothesized positive associations exist except for the isolation variable. After taking into account different demographic and attitudinal variables, Facebook use still predicted respondents' social reform. The future work might focus on a specific context such as the effects of using social networks on education, and focus on students' environment in education and the influence of social network. Detailed results, conclusions and future work are stated in later sections.


Sign in / Sign up

Export Citation Format

Share Document