scholarly journals Secrecy Regulation and Obstruction of Photo Theft on Social Platform

Nowadays, People are well-connected to one another in Social Networks. Usage of Internet and involvement in Online Social Platforms are increasing day by day. People sharing their personal information in these platforms. Even, they started Uploading their Photo in the Internet and it became very common among the Internet users. Without understanding the risk, user involved in sharing their personal details. Some fraudulent users uploading another user’s photo without their knowledge. They are getting photos of others in many ways such as by taking photos using their mobile cameras, collecting images from Social networks, stealing images from the theft mobile. They are posting the photos in the Social media applications which are stored enduringly in the database. This results in the misuse of photo and involved in many criminal activities. To overcome this security problem, a competent face recognition system is needed which identify the user in the photo. To handle this, a set of users, friends list and their private photographs. This system accomplished as an evidence of approach in social network on Facebook application.

Author(s):  
O. V. Yarmak ◽  
A. S. Tsepkova ◽  
E. A. Lysenko ◽  
I. L. Kalinskaya

The article analyses the content of Internet messages of the Crimean and Ukrainian segment of the network about events in Ukraine and the Crimea for the period from 2017 to 2019. The authors’ research interest is due to the degree of conflict and the ambiguity of the informational assessment of events on the Crimean and Ukrainian topics that took place during this period, and, as a result, the formation of conflicting information flows of the Ukrainian and the Crimean segments of the Internet network. In the course of the study, we used a system-efficient approach that studies the Internet space as a product of the social environment; comparative analysis, which we used to compare the content of Internet messages of online communities of Ukraine and the Crimea; method of content analysis, which made possible assessment of the social and political mood of the audience of Ukrainian and the Crimean Internet users. The authors present the results of a cybermetric analysis of messages from online communities of social networks Facebook and VKontakte. The tone of information flows on UkrainianCrimean themes remains negative, which is a consequence of the complex and contradictory relations between Ukraine and Russia in the realm of politics. We revealed the interest in social, cultural and linguistic discourses in the information flows of the Ukrainian and the Crimean segments of VKontakte and Facebook networks, which may act as a factor in combining Internet audiences with different political positions. However, it requires a separate in-depth cybermetric analysis.


2018 ◽  
pp. 66-72
Author(s):  
К. О. Рябова

The popularity of a hashtag is rising up every day. We use the hashtags to mark our messages or to find the information in the Internet. The hashtag has attracted attention not only Internet users but also scientists. The article focuses on the theoretical background and the approaches to the research of the hashtag as a kind of microtext. The author provides theoretical information about text and microtext, their main characteristics and classification as well as outlines the main linguistic features of the hashtag in the social networks Twitter, Facebook and Instagram. We have considered the etymology of “hashtag” and analyzed the previous works. The article presents the characteristic differences of microtext on phonetic-grapheme, lexical, syntactic levels. It is highlighted variation of pronunciation, graphic and phonetic substitutions, and spelling mistakes. The paper investigates various aspects of using microtext in the social networks.


Author(s):  
Konstantin S. Sharov

The paper is concerned with a study of the changing content and style of non-canonical Christian religious preaching in the digital age. Special attention is paid to the analysis of modern rhetoric Christian preachers practice in their Internet channels, forums and blogs. It is shown that the content of the Internet sermon is largely determined by the Internet users themselves and the topics of their appeals. The fundamental characteristics of the content of the Internet sermon are: 1) focus on the individual, their private goals and objectives, not just on theological problems; 2) rethinking the phenomenon of the neighbour; 3) a shift from the Hesychast tradition of preaching the importance of inner spiritual concentration to the preaching of religious interactivity. The observed stylistic features of the digital preaching can be summarised as follows: 1) moving away from simple answers to the rhetoric of new questions addressed to the audience; 2) empathy, co-participation with a person in his/her life conflicts and experiences; 3) desire to share religious information, not to impose it; 4) resorting to various rhetorical techniques to reach different audiences; 5) a tendency to use slang, sometimes even irrespective of the audience’s language preferences and expectations. It should be pointed out that the Orthodox Internet sermon in the Russian Internet space has a dual and contradictory nature. On the one hand, this phenomenon can be regarded as positive for the Orthodox preaching in general, since it is a means of spreading Christian ideas in the social groups that do not constitute a core of parishioners of Orthodox churches, for example, schoolchildren, students, representatives of technical professions, etc. On the other hand, the effectiveness of such preaching is still unclear. Lack of reliable statistics as well as the results of the survey related to the Orthodox Internet preaching gives us no opportunity to judge about effectiveness or ineffectiveness of the phenomenon at this stage of its development.


2020 ◽  
Vol 20 (2) ◽  
pp. 82-94
Author(s):  
Reza Abedi ◽  
Fatemeh Daneshvar Muhammadzadegan ◽  
Roqayyeh Sadat Hosseini Kerman ◽  
Fatemeh Miri Kolah Kaj

With an ever-increasing development of internet communications, human reactions have interred a new phase. The results of these communications are a most significant matter considered by the sociologists. Using the internet is developing and forms a significant part of individuals` lives. The advantages and disadvantages of this easiness in communicating and traveling through boundaries should be considered. Breaking the norms happened in the light of these reactions should be discussed, also increasing in awareness and availability to information, joining to global information networks and communication is another face of this placeless and timelessness. This contrasting face challenges the position of cyber space in the social communications, a challenge of which there is no escape by the society. In this research it is an attempt to criticize this challenge through criticizing the position of internet and to consider the role of social networks. We suppose that it is not possible to neglect the advantages of virtual space in developing a new level of human occasions but via this method lack of proper awareness in principle using of it results in some problems which should be covered by a proper training and comprehensive informing. Online spaces penetrate in human`s life in an extended way and it is a good opportunity to have good use from social networks as the basic condition. The results of this presence form reaction in individuals which will be considered in the present study.


2021 ◽  
Vol 16 (2) ◽  
pp. 0
Author(s):  
Dmitry Muravyev

The authorization on sites, in social networks and personal accounts with passwords is an extremely common practice today. It has become an integral part of people's lives, even they are not aware of it. But despite this, most Internet users have difficulties in creating and remembering of the strong passwords. This article analyzes the problem using the speech act theory of John Austin and John Searle. It allows to shed light on a person's behaviour on the Internet and his reaction to the question "Who is there?", which the machine asks him.


Land ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1142
Author(s):  
Adolfo Elizondo Saltos ◽  
David Flores-Ruiz ◽  
María de la O Barroso González

In this study, the presence and management of the social networks of 78 tourist destinations were analyzed for the development of sustainable tourism, with particular attention being paid to Spanish smart destinations. The variables for the empirical analysis were determined from a literature review, and it was concluded from a descriptive analysis, correlation analysis and an analysis of variance, that although the presence of tourist destinations on the internet and on social networks was notable, their management was inadequate for the development of sustainable tourist destinations. It was shown that there is a direct relationship between the number of visitors at a tourist destination and its presence on social networks. However, our analyses found that this correlation was not related to social network management; a greater number of visitors were not related to the effective management of social networks. It was concluded that smart destinations, despite having a technological advantage, did not stand out for their presence and management on social networks. The manuscript ends with some recommendations for the future


2020 ◽  
Vol 5 (1) ◽  
pp. 184-194
Author(s):  
Hui Lin ◽  
Shijuan Li

AbstractWith the development of Internet technology, online health forums have become indispensable for people who seek non-professional health support. This research focuses on the content posted by cancer patients and their relatives in online health forums and social networks to raise the following research questions: What is the overall view of the social support network in the online tumor community? What are the information behaviors of the online tumor community in different identities of users? How users interact in this community and build this network of social support? What are the topics users would like to share and talk about? What kinds of users could be the key users in this community? Method: Using the post and comment data of the Oncology Forum of Tianya Hospital in 2019, combined with social network analysis and word co-occurrence network analysis, the following conclusions are obtained: (1) There are some central points in the overall social support network, and there are central users consistent with other social networks. (2) Positive users are more likely to comment on others, and it is easier to get others’ comments, while negative users are more likely to share personal information and do not want to participate more in social interaction. (3) Users focus on posting emotional and emotional content in content sharing. Information-based social support information. The social support experience that this type of information brings to users can be positive and negative. (4) The most active group in the patients’ online health community, followed by the patients’ children. (5) The relationship between users and patients is diverse and there are two types of singularity. Users with diverse relationships are more likely to be commented on, and they are more willing to comment on users who also have diverse relationships.


Author(s):  
Julio Angulo

Frequent contact with online businesses requires Internet users to distribute large amounts of personal information. This spreading of users’ information through different Websites can eventually lead to increased probabilities for identity theft, profiling and linkability attacks, as well as other harmful consequences. Methods and tools for securing people’s online activities and protecting their privacy on the Internet, called Privacy Enhancing Technologies (PETs), are being designed and developed. However, these technologies are often perceived as complicated and obtrusive by users who are not privacy aware or are not computer or technology savvy. This chapter explores the way in which users’ involvement has been considered during the development process of PETs and argues that more democratic approaches of user involvement and data handling practices are needed. It advocates towards an approach in which people are not only seen as consumers of privacy and security technologies, but where they can play a role as the producers of ideas and sources of inspiration for the development of usable PETs that meet their actual privacy needs and concerns.


Author(s):  
Vaggelis Saprikis

Contemporary commerce is completely different as regards features some years ago. Nowadays, a considerable number of individuals and firms take advantage of the information and communication technologies and conduct transactions online. In particular, the mobile industry along with the broad use of social networks and improvements in the internet bandwidth worldwide has created a completely different business environment. Consequently, the technology incited many consumers to cross-border e-shopping, allowing access to a wider variety of products and services, and in numerous circumstances, access to cheaper goods. The purpose of this chapter is to investigate the perceptions internet users have towards e-shops focusing on Greece. More precisely, it aims to find out whether there are contingent differences on customers' perceptions regarding domestic vs. international e-shops, since a gradually augmented number of people have been expressing their preference on non-domestic e-stores for their purchases. Additionally, the chapter intends to shed light on the difficulty in understanding vital aspects of e-consumer behaviour.


2011 ◽  
pp. 3371-3388
Author(s):  
Pippa Norris

The core issue for this study concerns less the social than the political consequences of the rise of knowledge societies; in particular, the capacity of the Internet for strengthening democratic participation and civic engagement linking citizens and government. To consider these issues, Part I summarizes debates about the impact of the Internet on the public sphere. The main influence of this development, as it is theorized in a market model, will be determined by the “supply” and “demand” for electronic information and communications about government and politics. Demand, in turn, is assumed to be heavily dependent upon the social characteristics of Internet users and their prior political orientations. Given this understanding, the study predicts that the primary impact of knowledge societies in democratic societies will be upon facilitating cause-oriented and civic forms of political activism, thereby strengthening social movements and interest groups, more than upon conventional channels of political participation exemplified by voting, parties, and election campaigning. Part II summarizes the sources of survey data and the key measures of political activism used in this study, drawing upon the 19-nation European Social Survey, 2002. Part III examines the evidence for the relationship between use of the Internet and indicators of civic engagement. The conclusion in Part IV summarizes the results and considers the broader implications for governance and democracy.


Sign in / Sign up

Export Citation Format

Share Document