Application and Impact of Social Network in Modern Society

Author(s):  
Mamata Rath

Social network and its corresponding website permits a client to make a profile, set up an authorized account to create a digital representation of themselves, to select other members of the site as contacts, make connections with them, communicate and engage with these users in different social activities, etc. So, social network includes details of persons, group details, their friends list, contact list, business, affiliations, personal data, personal preferences, and historical information. In this age of smart communication and technology, most of the time people are connected with mobile smart telephones in their work culture, home, office, or any other related places. As they are constantly associated with social systems for long time, they get new posts, messages, and current refreshed news readily available in a flash. This is the constructive part of social networking that individuals consistently remain refreshed with most recent news and innovation. This chapter presents an overview of social network design, various issues, and emerging trends that are evolved simultaneously with modern age. It also presents a detail study on application and impact of social network in modern society as well as exhibits an exhaustive review of security measures in social sites.

Author(s):  
Rohit Anand ◽  
Akash Sinha ◽  
Abhishek Bhardwaj ◽  
Aswin Sreeraj

This chapter deals with the security flaws of social network of things. The network of things (NoT) is a dynamic structure that is basically an interface of real world and virtual world having capabilities of collection and sharing data over a shared network. The social network of things (SNoT) is a versatile way of connecting virtual and real world. Like any other device connected to internet, objects in SNoT are also vulnerable to the various security and privacy attacks. Generally, to secure Social Network of Things in which human intervention is absent, data capturing devices must be avoided. Types of security attacks that are huge threats to NoT as well as SNoT will be discussed in the chapter. The huge collection of information without necessary security measures allows an intruder to misuse the personal data of owner. Different types of attacks with reference to the different layers are also discussed in detail. The best possible potential solutions for the security of devices in SNoT will be considered.


2020 ◽  
Author(s):  
Cátia Santos-Pereira

BACKGROUND GDPR was scheduled to be formally adopted in 2016 with EU member states being given two years to implement it (May 2018). Given the sensitive nature of the personal data that healthcare organization process on a 24/7 basis, it is critical that the protection of that data in a hospital environment is given the high priority that data protection legislation (GDPR) requires. OBJECTIVE This study addresses the state of Public Portuguese hospitals regarding GDPR compliance in the moment of GDPR preparation period (2016-2018) before the enforcement in 25 May 2018, and what activities have started since then. The study focuses in three GDPR articles namely 5, 25 and 32, concerning authentication security, identity management processes and audit trail themes. METHODS The study was conducted between 2017 and 2019 in five Portuguese Public Hospitals (each different in complexity). In each hospital, six categories of information systems critical to health institutions were included in the study, trying to cover the main health information systems available and common to hospitals (ADT, EPR, PMS, RIS, LIS and DSS). It was conducted interviews in two phases (before and after GDPR enforcement) with the objective to identify the maturity of information systems of each hospital regarding authentication security, identity management processes and traceability and efforts in progress to avoid security issues. RESULTS A total of 5 hospitals were included in this study and the results of this study highlight the hospitals privacy maturity, in general, the hospitals studied where very far from complying with the security measures selected (before May 2018). Session account lock and password history policy were the poorest issues, and, on the other hand, store encrypted passwords was the best issue. With the enforcement of GDPR these hospitals started a set of initiatives to fill this gap, this is made specifically for means of making the whole process as transparent and trustworthy as possible and trying to avoid the huge fines. CONCLUSIONS We are still very far from having GDPR compliant systems and Institutions efforts are being done. The first step to align an organization with GDPR should be an initial audit of all system. This work collaborates with the initial security audit of the hospitals that belong to this study.


2021 ◽  
Vol 12 ◽  
pp. 215013272098771
Author(s):  
S. M. Rashed Ul Islam ◽  
Tahmina Akther ◽  
Md. Abdullah Omar Nasif ◽  
Sharmin Sultana ◽  
Saif Ullah Munshi

SARS-CoV-2 initially emerged in Wuhan, China in late 2019. It has since been recognized as a pandemic and has led to great social and economic disruption globally. The Reverse Transcriptase Real-Time Polymerase Chain Reaction (rtRT-PCR) has become the primary method for COVID-19 testing worldwide. The method requires a specialized laboratory set up. Long-term persistence of SARS-CoV-2 RNA in nasopharyngeal secretion after full clinical recovery of the patient is regularly observed nowadays. This forces the patients to spend a longer period in isolation and test repeatedly to obtain evidence of viral clearance. Repeated COVID-19 testing in asymptomatic or mildly symptomatic cases often leads to extra workload for laboratories that are already struggling with a high specimen turnover. Here, we present 5 purposively selected cases with different patterns of clinical presentations in which nasopharyngeal shedding of SARS-CoV-2 RNA was observed in patients for a long time. From these case studies, we emphasized the adoption of a symptom-based approach for discontinuing transmission-based precautions over a test-based strategy to reduce the time spent by asymptomatic and mildly symptomatic COVID-19 patients in isolation. A symptom-based approach will also help reduce laboratory burden for COVID-19 testing as well as conserve valuable resources and supplies utilized for rtRT-PCR testing in an emerging lower-middle-income setting. Most importantly, it will also make room for critically ill COVID-19 patients to visit or avail COVID-19 testing at their convenience.


2020 ◽  
pp. 40-49
Author(s):  
Anna Vladimirovna Kostina

At present, social philosophy is dominated by the view that the importance of mass culture is constantly decreasing, which soon is supposed to lead to the natural decay of this cultural form. The author refutes the arguments of those who are skeptical about the position of mass culture in the post-industrial and digital information society and shows that the functional nature of this type of culture allows it to successfully fulfill its role in modern social systems. The materials of the article can be useful in preparing courses in the framework of social philosophy.


2021 ◽  
Vol 23 (11) ◽  
pp. 381-401
Author(s):  
Umar Abdullahi Tawfiq ◽  
◽  
Shohaimi Shamarina ◽  
Syafinaz Amin Nordin ◽  
Mohd Noor Hisham Mohd Nadzir ◽  
...  

Typhoid is a life-threatening disease that has remained endemic in parts of Africa and Asia where its burden is elevated by the inefficiency of control efforts which have been hampered by lack of epidemiological data, among others. In Nigeria, such data is absent in most of the States like Gombe where the disease has been rife for a long time, hence, to bridge that knowledge gap, this study was set up to determine the host-associated risk factors for typhoid occurrence and recurrence in Gombe. A questionnaire that was designed and validated for this location was used to obtain data from 663 respondents using simple random sampling and analyzed using the Chi-square test for association and binomial logistic regression to obtain risk factors for typhoid occurrence and recurrence, respectively. The study revealed that occurrences were statistically significantly associated with the variables for vaccination (χ2 = 39.729, p < 0.01), having houseboy/girl (χ2 = 16.909, p < 0.01), typhoid patient at home (χ2 = 13.393, p < 0.01), hand washing before handling food (χ2 = 22.856, p < 0.01), consuming iced/frozen items (χ2 = 16.805, p < 0.01), boiling drinking water (χ2 = 49.633, p < 0.01), and eating commercially available foods/drinks (χ2 = 27.864, p < 0.01), while recurrences were statistically significantly predicted by „not sure of been vaccinated‟ (OR = 2.962, CI = 1.290 to 6.802, p < 0.01), „not having another typhoid patient at home‟ (OR = 1.799, CI = 0.998 to 3.244, p < 0.01), and „drinking unboiled water sometimes‟ (OR = 2.130, CI = 1.023 to 4.434, p < 0.01). It is believed that these findings will guide efforts by the Government for health interventions against typhoid in the study area, thus improving the quality of life for the population.


1992 ◽  
Vol 14 (2) ◽  
Author(s):  
James S. Coleman

AbstractModern society has undergone a fundamental change to a society built around purposively established organizations. Social theory in this context can be a guide to social construction. Foundations of Social Theory is dedicated to this aim. Being oriented towards the design of social institutions it has to choose a voluntaristic, purposive theory of action and must make the behavior of social systems explainable in terms of the combination of individual actions. It has to deal with the emergence and maintenance of norms and rights, the concepts of authority, trust, law and legitimacy, the viability of organizations and the efficiency of social systems. But more important than the specific points is the vision of a new role for social theory in an increasingly constructed social environment. This vision is the motivation behind Foundations of Social Theory.


Spiritualita ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Sukron Romadhon

Spirituality and a new religious awakening, are seen by religious elites as a stage of religious directness in carrying out religious traditions and rituals. New civilizations can instead be a threat to conventional religious traditions and rituals. Without the willingness of religious elites to criticize and re-interpret conventional ritual traditions and patterns, the functions of the world's major religions could fade. The world's major religions are increasingly alienated from the objective world and awareness of the lives of the people and their people. It seems that there will be a new form of religion or a new religion that is completely different from the tradition of religious rituals that have been carried out by the major religions of the world. While the religious elite is still attached to classical religious interpretations. But on the other hand, the emergence of modern society, encouraging the argument of secularization is part of modernization. The values underlying socio-political and economic relations also appear to be beginning to enter an irregular stage, when viewed conventionally, the spiritulitas of global civilization, rather than lies in the format of values, traditional systems and structures or modern rationality. New civilizations in social systems and Science and Technology (SCIENCE AND TECHNOLOGY) began to be directed at a more intuitive spirituality stage. Then came the act of social piety that proved impartiality over the duafa wal mustad'afin, workers and the poor who were oppressed by the economic system. The emergence of the term left theology only wants to explain about righteousness and belief based on the ability to perform acts of liberation of the proletariat. This action is not only done after the reality of the proletariat appears, but creates a social and economic system that has impartiality towards the proletariat.Keywords: Spirituality, Secularization, Social Piety


2020 ◽  
Vol 9 (2) ◽  
pp. 3-7
Author(s):  
Tang Minh Chau

Highland is a typical area in Vietnam with a great deal of unique things for people to study and discover. Among them are culture and language, the two reciprocal elements to create communities called Hill tribes. Original Hill tribes came to the Highland long time ago and set up their life based on their root culture until now. When studying about Hill tribes, we realize that their culture is very interesting and worth tracing. Therefore, how to conserve Hill tribes’ culture is what we need to take into consideration as soon as possible.


Author(s):  
Ernest Gramatskyy ◽  
Inha Kryvosheyina ◽  
Volodymyr Makoda ◽  
Liydmyla Panova

The modern society necessitates the introduction of new IT-solutions to meet its needs. With the spread of know-how, the need for its detailed analysis with the further determination of the direction of development. The purpose is to carry out an analysis of the introduction and functioning of know-how, as well as to determine the vectors of its use, taking into account the needs of participants in legal relations arising in this area. The subject of research – information technologies (know-how) as objects of intellectual property rights in their use. The methodological basis consists of the method of analysis, the method of synthesis, the dialectical method, the comparative-legal method, the system method, and the logical-legal method. The result of this work is to identify the importance of the information technologies in everyday life of modern society and the level of popularity of their use, outlining possible vectors of development in the economics in the direction of digitalization and justification of the need to improve the provisions of current legislation within the considered topic, expressing the idea of the direction of innovative information policy in the direction of active use of blockchain and maximum compliance with the protection of personal data of customers.


2021 ◽  
Author(s):  
Alberto Acerbi

Cultural evolution researchers use transmission chain experiments to investigate which content is more likely to survive when transmitted from one individual to another. These experiments resemble oral storytelling, where individuals need to understand, memorise, and reproduce the content. However, prominent contemporary forms of cultural transmission—think an online sharing— only involve the willingness to transmit the content. Here I present two fully preregistered online experiments that explicitly investigated the differences between these two modalities of transmission. The first experiment (N=1080) examined whether negative content, information eliciting disgust, and threat-related information were better transmitted than their neutral counterpart in a traditional transmission chain set-up. The second experiment (N=1200), used the same material, but participants were asked whether they would share or not the content in two conditions: in a large anonymous social network, or with their friends, in their favourite social network. Negative content was both better transmitted in transmission chain experiments and shared more than its neutral counterpart. Threat-related information was successful in transmission chain experiments but not when sharing, and, finally, information eliciting disgust was not advantaged in either. Overall, the results present a composite picture, suggesting that the interactions between the specific content and the medium of transmission are important and, possibly, that content biases are stronger when memorisation and reproduction are involved in the transmission—like in oral transmission—than when they are not—like in online sharing.


Sign in / Sign up

Export Citation Format

Share Document