scholarly journals Identification of Malicious Accounts in Facebook

In this modern world of internet age social networking is becoming popular day by day for sharing of information and day to day communication. The social media has changed the way people pursue their life and made it a part of their life to get connected with friends, family, colleagues and with the society as a whole. Social networking can occur for social purposes, business purposes by the use of Facebook, Twitter, LinkedIn etc. Hence it has become the favorite spot for the cyber criminals. Facebook is a free social networking website that allows users to upload photos and video, send messages and keep in touch with friends, family and rest of the world. Unfortunately, spammers are also using this Facebook for their personal gain by creating fake profiles or comprising the other famous accounts. These accounts together are referred as malicious accounts. Hence it became important task to identify this spam for free communication over Facebook. However, some former researchers have proposed their work to identify these accounts but suffering from many limitations. In this paper a method is proposed called An unsupervised method to detect spam in Facebook using DBSCAN algorithm. This research work used Jaccard similarity and DBSCAN algorithm to detect spam messages. This research work is implemented using real time messages and evaluated. The experimental results show the methodology used is very efficient, having better accuracy and low false positive rate in detecting the spam messages in Facebook. This research work will help the common man in detecting malicious Facebook accounts in a great way. Related terms: Social networking, Facebook, malicious accounts

2017 ◽  
Vol 22 (1) ◽  
Author(s):  
Camila Amaral Borghi ◽  
Regina Szylit ◽  
Carolliny Rossi de Faria Ichikawa ◽  
Michelle Freire Baliza ◽  
Uyara Talmatare Jesus Camara ◽  
...  

Abstract Objective: This study aimed to understand how social networking websites are used by adolescents and their importance during the hospitalization process. Method: A descriptive and qualitative study was supported by the virtual ethnographic method and resorted to the symbolic interactionism as theoretical framework. Eleven hospitalized adolescents were interviewed. Results: Three categories were identified based on the analysis of interviews and posts: Being able to use social networking websites during hospitalization; Using the Facebook® chat to keep connected to friends; Seeking support from friends through social networking websites. Final considerations: Facebook® was the social networking website that adolescents used the most, standing out as an important form of entertainment during hospitalization that facilitates communication and social support. Healthcare professionals should value the use of social networking websites by hospitalized adolescents and encourage access to these tools, providing hospital resources to expand and facilitate this access.


2021 ◽  
Author(s):  
Xiang Shen ◽  
Ying Chen ◽  
Chaowen Li ◽  
Fucheng Yang ◽  
Zhanbo Wen ◽  
...  

Abstract In terms of radiation biological dose estimation, the cytokinesis block micronucleus (CBMN) assay is the internationally recognized dose estimation method. Due to the subjectivity and the time-consuming of manual detection, it cannot meet the needs of rapid standard assay of CBMN. Therefore, in this research work, we combined the convolutional neural network to design a software that can be used for rapid standard automatic detection of micronuclei in Giemsa stained binucleated lymphocytes image. The software analysis workflow is divided into four stages: cell acquisition, adhesive cell masses segmentation, cell type identification, micronucleus counting. After verification, our algorithm can quickly and effectively detect binucleated cells and micronucleus even when the cytoplasm is blurred, multiple micronucleus are attached to each other, or micronucleus is attached to the nucleus. In the test of a large number of random images, the software reached 99.4% of the manual detection in terms of the detection rate of binucleated cell, and the false positive rate of binucleated cell was 14.7%. In terms of micronucleus detection rate, the software reached 115.1% of manual detection, and its false positive rate was 26.2%. The analysis time of each picture is about 0.3s, an order of magnitude faster than conventional method.


Author(s):  
Brandis Phillips ◽  
Belinda Shipps

The social networking population continues to expand at a phenomenal pace. Nevertheless, the question of how an organization gets people to spend long periods on a particular social networking website as well as return to the website is becoming increasingly important. Is the technological sophistication of the website or the social aspect most important? This study addresses technological and social factors. The authors examine social network use by employing a survey instrument to gather data about technological factors based on the technology acceptance model and social factors collecting data on constructs representing social involvement and the sheer enjoyment of using the social networking website. Results of the study suggest that users of social networks are more apt to frequently use a site based upon social/enjoyment factors as opposed to technology-related factors.


Author(s):  
Sameh Awadallah Al Sayed ◽  
Mohammed Rizk Al-Beheiry

This study describes a new idea for the relationship between orphaned adolescents using the social networking website Facebook and its relationship to psychological resilience. The study also compares orphaned adolescents, male and female, in their use of Facebook and their degree of psychological resilience. It also identifies the rate of use of orphaned adolescents (male and female) for Facebook. One hundred orphaned adolescents were used as samples in this study. The results indicated a statistically positive correlation between the use of the social networking website Facebook by orphaned adolescents and their psychological resilience. It also showed statistically significant differences between the average specimens of the study sample of male and female orphaned adolescents on the questionnaire using Facebook in the direction of males, and statistically significant differences between the averages of the study sample scores of male and female adolescents on the psychological resilience scale of adolescents in the male direction.


Author(s):  
Ben Vincent

The Introduction begins with a brief contextualisation of the significance of the topic of the book, and how recent cultural events (such as the social networking website Facebook introducing dozens of additional options for individuals’ gender identities aside from ‘male’ and ‘female’ in 2014) justifies exploration and recognition.


Author(s):  
M. Norhailawati ◽  
Lina Handayani ◽  
HU Kalsum ◽  
Zainuri Saringat ◽  
A. Aidahani ◽  
...  

<span>Social networking web sites is not a new medium for users. The growth of this media helps students communicate and socialize with their friends or followers and used for education. The retention number of students is an issue or real problem in higher educational institutions since it is related to institution overall performance. This research focused on how students’ involvement in social network web site for educational purposes can have a positive effect to their studies and can help institution to retain number of students in the institution. During the research study, students did give full cooperation and involvement in the group that created and dedicated to their collaborative learning. Facebook is the social networking website that used to support learning. The research method applied was survey and the questionnaires distributed to 40 students who got probations result (the Cumulative Grade Point Average (CGPA) was below 2.00) from various academic programs. The result showed that social network website plays an important role in education. The finding also showed that the probation students improve their CGPA and status, while the institution able to maintain their student retention number.</span>


Author(s):  
Zanita Zahari ◽  
Eric Pardede

The popularity and rapid growth of social networking sites is undeniable. However, it is hard to guarantee the success and sustainability of these sites. This study will focus on identifying the key success factors for each phase in agile iteration development for social networks. A qualitative and quantitative analysis was adopted using web analytical tools to gather and measure these success factors. A comparative study between popular and unpopular social networking was undertaken to gather realistic data. Results reveal that determinants of success for agile development phases include: goal setting, developing brand image, quality content, trust building, user-centered design, technology and client server platform, service quality, user satisfaction and stability. The successful implementation of these factors will benefit developers and users in order to achieve the success and survival of the social networking website development.


2021 ◽  
Vol 26 (jai2021.26(2)) ◽  
pp. 15-25
Author(s):  
Belej O ◽  
◽  
Kolesnyk K ◽  
Nestor N ◽  
Fedirko Yu ◽  
...  

In this research work analyzes and compares existing methods for describing data from cyberphysical systems, methods for detecting network attacks targeting cyberphysical systems, analyzes fundamental approaches and solutions in the field of cyberphysical systems security, and makes recommendations for supplementing existing approaches using new algorithms. The considered application of the neuroevolutionary algorithm of NeuroEvolution of Augmenting Topology using a hypercube for the analysis of multivariate time series describing the state of cyberphysical systems in order to identify abnormal conditions. After the modification, the algorithm allows almost completely configuring the target neural network without user intervention according to the specified parameters, including additionally creating intermediate network layers that were previously unavailable in the primary version of the algorithm. The method is verified on the TON_IOT DATASETS dataset. The system topology is the structure of the Internet of Things. The data are relevant, verified and correct, which allows them to be used for analysis and assessment of the accuracy of the approach under consideration. The obtained overall accuracy, proximity of solutions, values of False Positive Rate and False Negative Rate indicate the lack of retraining of the model and the high reliability of this method for detecting attacks in cyberphysical systems


Sign in / Sign up

Export Citation Format

Share Document