Spam and Advertisement

Author(s):  
Dionysios Politis

A significant problem of our times, accelerated by the advances in technology, is the plethora of commercial Internet messages usually defined as spam, while the equivalent in classic television emission is the frequent and uncontrollable advertisement. Advertisement, perceived as an expression and factor of the economy, is legitimate and desirable. However, abusive advertising practices cause multiple damage: invasion in our private communication space, homogenisation of morals and customs leading to globalized overconsumption. Variations and cloning of spam and advertisement include spim, distributed instant messaging using bulk SMS’s over mobile telephone networks or the web, wireless attacks and penetration, targeted unsolicited online harassment and others.

2020 ◽  
Vol 10 (18) ◽  
pp. 6527 ◽  
Author(s):  
Omar Sharif ◽  
Mohammed Moshiul Hoque ◽  
A. S. M. Kayes ◽  
Raza Nowrozy ◽  
Iqbal H. Sarker

Due to the substantial growth of internet users and its spontaneous access via electronic devices, the amount of electronic contents has been growing enormously in recent years through instant messaging, social networking posts, blogs, online portals and other digital platforms. Unfortunately, the misapplication of technologies has increased with this rapid growth of online content, which leads to the rise in suspicious activities. People misuse the web media to disseminate malicious activity, perform the illegal movement, abuse other people, and publicize suspicious contents on the web. The suspicious contents usually available in the form of text, audio, or video, whereas text contents have been used in most of the cases to perform suspicious activities. Thus, one of the most challenging issues for NLP researchers is to develop a system that can identify suspicious text efficiently from the specific contents. In this paper, a Machine Learning (ML)-based classification model is proposed (hereafter called STD) to classify Bengali text into non-suspicious and suspicious categories based on its original contents. A set of ML classifiers with various features has been used on our developed corpus, consisting of 7000 Bengali text documents where 5600 documents used for training and 1400 documents used for testing. The performance of the proposed system is compared with the human baseline and existing ML techniques. The SGD classifier ‘tf-idf’ with the combination of unigram and bigram features are used to achieve the highest accuracy of 84.57%.


2015 ◽  
Vol 6 (4) ◽  
pp. 180-186 ◽  
Author(s):  
Cristina Verea Linares ◽  
Johno Breeze

Mobile telephone texts are the primary method of communication among junior doctors, superseding phone calls and bleeps. However, instant messaging is now one of the most common methods of social communication worldwide, and will likely supersede texting in the near future – but concerns over its security suggest further research is urgently required into the content of such communications, if it is to transmit patient specific information.


Author(s):  
Susan A. Elwood ◽  
Marsha Grace ◽  
Claudia Lichtenberger

We are making progressive advances towards Weiser’s vision. Technologies are already being embedded into our environment. Smart floors can sense when a person has fallen and immediately send vital information to paramedic support (Abowd, Atkeson, Bobick, Essa, MacIntyre, Mynatt, & Starner, 2000). People are using mobile devices, such as cell phones for e-mail, instant messaging, Web browsing, games, and MP3 playback (Lendino, 2006). Presence technologies are already informing us as to our IM buddy’s physical presence, such as online, off-line, busy, or away from the desk. Current uses of the Web for searching, photos, music, video, various levels of electronic communities, and online, collaborative software applications are preparing users to advance to the next Web 2.0 level of Internet use. Combine Web 2.0 with expanded WiFi capabilities, and we won’t need large computing devices for sharing large amounts of data within virtual, collaborative environments.


Author(s):  
Maria Rosa Miccoli ◽  
Giulia Gargaglione ◽  
Simone Barbato ◽  
Lorenzo Di Natale ◽  
Valentina Rotelli ◽  
...  

Cyberbullying is inducing significant socio-cultural problems and psychological disorders, which require a rapid solution. Cyberbullying is an extension of the traditional bullying that involves the typical behaviors of bullying perpetrated through the use of various technologies, electronic devices in particular (e-mail, instant messaging applications, media, etc.). While providing differences between traditional bullying and cyberbullying, this review aims at investigating how the new media can be used to prevent such phenomenon and investigating its psychological impact on victims. The focus will be on tools and interventions that are capable of identifying online bullying, on existent treatments with special regard to strategies that take advantage of technologies to fight cyberbullying. In particular, the web will be considered as a mean to assist a vast number of people; moreover, the role of virtual reality as a tool to help victims overcoming psychological distress within safe and protected environments will be object of discussion.


Author(s):  
Kannan Balasubramanian

With the arrival of the internet, cell phones, e-mail, instant messaging and social networking sites we can do many wonderful things electronically now that make our lives easier and more productive. We should get used to the idea that a good part of our social life can happen in cyberspace. You can keep up with your friends and meet new ones through a keyboard, microphone and a webcam. You can send a detailed e-mail, send a quick message or alert your circle of friends and followers about the latest details what's happening around you. At the same time, we should come to terms with the fact that the cyberspace is flooded with attacks from people who are unscrupulous in their intent to damage others in the cyberspace. The attacks date back to the time when telephone was invented, when the attackers found way to invade people's privacy. For most users, the web is just part of a well-rounded life that includes both a cyber world and a real world. The internet can be helpful, educational and fun. But It can also become an obsession leading to waste of time and money. Just because cyberspace is virtual, that does not mean that there are not real dangers out there. The same sort of bad people who can cause problems for people in the “real” world are also lurking on the internet. They spend their time looking for ways to steal your money, ruin your name or even cause you harm.


Sign in / Sign up

Export Citation Format

Share Document