The Analysis for the Influence of Individual Node Base on the Network Community

Author(s):  
Hai-Feng Zhang ◽  
Yun Liu ◽  
Jun-Jun Chen

This paper discussed the identification of theoretical research and practical application value that the influence of individual node in the social network node; Secondly, this paper proposes a influence of individual node arithmetic based on network community attribute, and carries on the simulation analysis in the real social network to compared with the influence of individual node that without network community attribute superposition.

Author(s):  
Geetika Sarna ◽  
M.P.S. Bhatia

Cyberbullying is a felonious act carried out against the victim by sending harassing/ embarrassing/ abusing information online. Normally offenders create fake profiles in order to hide their identity for unscrupulous activities. Assuming a fake identity is very harmful as the real picture of the offender is not visible, and also it can become difficult to entrap them. Sometimes, some trustworthy friends can also take advantage of the fake identity in order to harm the victim. Culprits can reveal victim's personal information like financial details, personal history, family, etc., and along with it, he can harass, threaten or blackmail the victim using fake profiles and permeates that information on the social network. So, it is necessary to resolve this issue. In this article, the authors used the concept of entropy and cross entropy to identify fake profiles as entropy works on the degree of uncertainty. Also, this article shows the comparison of proposed method with the existing classifiers.


Author(s):  
Geetika Sarna ◽  
M.P.S. Bhatia

Cyberbullying is a felonious act carried out against the victim by sending harassing/ embarrassing/ abusing information online. Normally offenders create fake profiles in order to hide their identity for unscrupulous activities. Assuming a fake identity is very harmful as the real picture of the offender is not visible, and also it can become difficult to entrap them. Sometimes, some trustworthy friends can also take advantage of the fake identity in order to harm the victim. Culprits can reveal victim's personal information like financial details, personal history, family, etc., and along with it, he can harass, threaten or blackmail the victim using fake profiles and permeates that information on the social network. So, it is necessary to resolve this issue. In this article, the authors used the concept of entropy and cross entropy to identify fake profiles as entropy works on the degree of uncertainty. Also, this article shows the comparison of proposed method with the existing classifiers.


Author(s):  
Marcos Luiz Mucheroni ◽  
Gonçalo Costa Ferreira

This paper presents and discusses some of the results of practical application of Social Network Analysis for Information (SNA) to a nonprofit organization, the publishing house Cidade Nova. The article starts by presenting the empirical and methodological options and refers the social networks basic terminology, after which the research procedures are detailed. Lastly, results from the actors Information Social Network (ISN) and from the complete ISN (where alters are included) are presented, to which were used degree, closeness and betweenness centralities, the strength of weak ties of Granovetter and the lambda (?) set measures.


2021 ◽  
Vol 13 (2-1) ◽  
pp. 126-142
Author(s):  
Irina Sapon ◽  

A profile on a social network site (SNS) containing the user’s personal information qualifies as both a personal and public space, which raises the problem of delineating, what is private and what is public in this virtual domain. The paper attempts to identify privacy boundaries in the social media environment and the actual ownership of personal information disclosed on users’ profiles. The stated problem is considered through the lens of Communication Privacy Management theory, an influential approach to the study of privacy in the online environment proposed by Sandra Petronio. The terms and concepts of the theory are applied to analyze the peculiarities of privacy management of the user’s personal information on the pages of the social network VKontakte (i.e. in the context of ‘one-to-many’ communication). The peculiarities noted are as follows: the presence of social media administration as a co-owner of the data (i.e. the user is not granted exclusive ownership of their personal information); difficulties with discussing information ownership rules with other social media participants; the presence of such phenomena as ‘online friends’ and ‘the imagined audience’ making it difficult for the user to recognize the composition of their actual audience and set proper privacy boundaries. It is also shown that the social network provides what can only be described as rather vague collective privacy boundaries (if the term privacy is even applicable to the social media environment). All the information shared by the user on the social media profile crosses the personal privacy boundaries and is moved almost uncontrollably to the collective ownership domain. The further theoretical research of privacy management of personal information on social media profiles should aim to critically examine the concept of collective privacy in the digital space and determine the ownership rights of original owners of personal information gone public.


Author(s):  
Guohui Fan ◽  
Chen Guo

Engineering cost budgeting is crucial to the healthy development of the engineering and construction industry. To solve the problem of large deviations in budget results from using traditional methods of cost budgeting based on evaluation results or drawing conversions, the BIM engineering cost budgeting method based on social network analysis method is studied in this paper. On the basis of analyzing cost budgeting requirements and determining modeling economic criteria, the social network analysis method is used to analyze the project cost risks. According to the project quantity list, professional BIM software is used to budget the project cost. Case verification proves the feasibility of this budgeting method as the budget deviation is reduced by about 78% compared with the traditional method. The result of the paper has a more ideal practical application effect and positive significance for optimizing the traditional cost budgeting methods


2021 ◽  
Vol 14 (1) ◽  
pp. 107-120
Author(s):  
Yanina Yu. SOKOLENKO

Subject. Instagram is one of the most promising social platforms for business promotion. It enables to publish and consume visual content that is perceived faster than text by users, and, therefore, to use promotional tools as a solution to problems faced by small businesses. Objectives. The study aims at comprehensive research on improving the use of Instagram promotion tools as a way to solve small business problems, and formulation of recommendations. Methods. The study rests on methods of logical analysis, induction and deduction, comparison and generalization. Results. I consider the features and benefits of using Instagram, the role of this social networking service from a commercial standpoint. The paper presents recommendations that can be used by small businesses for their promotion. Furthermore, it shows how to support the social network in the context of the pandemic, which provoked a crisis of small and medium-sized businesses. Conclusions. The offered recommendations can be considered by small businesses as a practical application, which will eventually increase the efficiency of their activities.


2013 ◽  
Vol 44 (2) ◽  
pp. 22
Author(s):  
ALAN ROCKOFF
Keyword(s):  

Methodology ◽  
2006 ◽  
Vol 2 (1) ◽  
pp. 42-47 ◽  
Author(s):  
Bonne J. H. Zijlstra ◽  
Marijtje A. J. van Duijn ◽  
Tom A. B. Snijders

The p 2 model is a random effects model with covariates for the analysis of binary directed social network data coming from a single observation of a social network. Here, a multilevel variant of the p 2 model is proposed for the case of multiple observations of social networks, for example, in a sample of schools. The multilevel p 2 model defines an identical p 2 model for each independent observation of the social network, where parameters are allowed to vary across the multiple networks. The multilevel p 2 model is estimated with a Bayesian Markov Chain Monte Carlo (MCMC) algorithm that was implemented in free software for the statistical analysis of complete social network data, called StOCNET. The new model is illustrated with a study on the received practical support by Dutch high school pupils of different ethnic backgrounds.


Author(s):  
V. Kovpak ◽  
N. Trotsenko

<div><p><em>The article analyzes the peculiarities of the format of native advertising in the media space, its pragmatic potential (in particular, on the example of native content in the social network Facebook by the brand of the journalism department of ZNU), highlights the types and trends of native advertising. The following research methods were used to achieve the purpose of intelligence: descriptive (content content, including various examples), comparative (content presentation options) and typological (types, trends of native advertising, in particular, cross-media as an opportunity to submit content in different formats (video, audio, photos, text, infographics, etc.)), content analysis method using Internet services (using Popsters service). And the native code for analytics was the page of the journalism department of Zaporizhzhya National University on the social network Facebook. After all, the brand of the journalism department of Zaporozhye National University in 2019 celebrates its 15th anniversary. The brand vector is its value component and professional training with balanced distribution of theoretical and practical blocks (seven practices), student-centered (democratic interaction and high-level teacher-student dialogue) and integration into Ukrainian and world educational process (participation in grant programs).</em></p></div><p><em>And advertising on social networks is also a kind of native content, which does not appear in special blocks, and is organically inscribed on one page or another and unobtrusively offers, just remembering the product as if «to the word». Popsters service functionality, which evaluates an account (or linked accounts of one person) for 35 parameters, but the main three areas: reach or influence, or how many users evaluate, comment on the recording; true reach – the number of people affected; network score – an assessment of the audience’s response to the impact, or how far the network information diverges (how many share information on this page).</em></p><p><strong><em>Key words:</em></strong><em> nativeness, native advertising, branded content, special project, communication strategy.</em></p>


Sign in / Sign up

Export Citation Format

Share Document