Dragonfly Algorithm with Gated Recurrent Unit for Cybersecurity in Social Networking

2019 ◽  
pp. 75-88
Author(s):  
Yutao Han ◽  
◽  
◽  
◽  
Ibrahim M. EL-Hasnony ◽  
...  

The advancements of information technologies and wireless networks have created open online communication channels. Inappropriately, trolls have abused the technologies to impose cyberattacks and threats. Automated cybersecurity solutions are essential to avoid the threats and security issues in social media. This paper presents an efficient dragonfly algorithm (DFA) with gated recurrent unit (GRU) for cybersecurity in social networking. The proposed DFA-GRU model aims to determine the social networking data into neural statements or insult (cyberbullying) statements. Besides, the DFA-GRU model primarily undergoes preprocessing to get rid of unwanted data and TF-IDF vectorizer is used. In addition, the GRU model is employed for the classification process in which the hyperparameters are optimally adjusted by the use of DFA, and thereby the overall classification results get improved. The performance validation of the DFA-GRU model is carried out using benchmark dataset and the results are examined under varying aspects. The experimental outcome highlighted the enhanced performance of the DFA-GRU model interms of distinct measures.

Author(s):  
Ankita Sharma

Today's due the popularity of internet number of users are increase on every social media platform. In recent research found that 80% of youth depend on social media to make new friends , share photos. Through this they get popularity and large number of user base and become influencers . Most of the social media platform are providing different privacy and security . Still attacker find out the way to breech the security, privacy and confidently of users and companies or organizations using several techniques . This paper highlight the major security issues phasing by many social networking web applications. Also identify the solution based on attacks in different literature . At last, we discuss open research issues


2018 ◽  
Vol 43 (4) ◽  
pp. 451-467 ◽  
Author(s):  
Uli Bernhard ◽  
Marco Dohle

Abstract The perception that many other people are being reached and affected by political communication can be a reason for intensifying one’s own communication activities. An online survey among German citizens (n = 2,957) was carried out to determine whether this is also true for political communication activities via social media. Results show that the presumed reach and the presumed influence of Facebook and Twitter with regard to the individual’s circle of friends/acquaintances affect the intensity of online communication. However, perceptions concerning the population in general are not relevant. This indicates that individuals primarily address their own social environment with their political social networking practices. Thus, by concentrating on perceptual processes, the findings contribute to shedding light on the causes and motives for political communication activities in the social media world.


Author(s):  
Chintan M. Bhatt

Cloud Computing changes the way Information Technology (IT) is expended and oversaw, promising enhanced cost efficiencies, quickened advancement, quicker time-to-market, and the capacity to scale applications of interest (Leighton, 2009). Users have started to explore new ways to interact with each other with the omnipresent nature of Social Networks and Cloud Computing. Facebook, YouTube, Orkut, Twitter, Flickr, Google+, Four Square, Pinterest, and the likes have distorted the way the Internet (Social Cloud) is being used. However, there is an absence of comprehension of protection and security issues of online networking. The protection and security of online networking should be explored, concentrated on and portrayed from different viewpoints (PCs, social, mental and so on). It is basic to distinguish security dangers and shield protection through constant and adaptable frameworks. Subsequent to there is no intelligent limits of the social networking, it is vital to consider the issue from a worldwide viewpoint as well.


2014 ◽  
Vol 1 (1) ◽  
pp. 565-568
Author(s):  
Anca-Elena Neaţă (David)

Abstract„Globalisation, new technologies and demographic developments constitute an enormous challenge; one of the answers to this problem is the access to lifelong learning”[1] (Jan Figel – Commissioner for Education, Training, Culture and Multilingualism). This paper is intended to be a plea in favour of faculty using and engaging social networks in the act of teaching and learning. This of course will imply a permanent effort of self-teaching for the teachers themselves. Similarly to the notorious brands that are already making use of the social media in an intense and prolific way, academic institutions ought as well to articulate a coherent and viable strategy, based on the new online communication channels, if they want to obtain and maintain their credibility and reputation for the public.


2020 ◽  
Vol V (III) ◽  
pp. 32-43
Author(s):  
Ashraf Iqbal ◽  
Kishwer Perveen ◽  
Saima Waheed

Social Networking sites are highly used for political proposes. In this study, the research tried to search the usage of social media by political parties during elections campaigns 2018 in Pakistan. The researcher applied the agenda-setting theory to link the social media posts of these political parties' pages and content analysis research technique for analyzing the variables. It was concluded from the that these social media are highly used for mobilizing voters where the users of these mediums not only see these posts but also like, comment and share for responding about what is uploaded on these social media pages by the representatives of political parties. It is concluded that from three trending political parties, PTI emerged as the most dominant party by using these social media tools, by uploading a maximum number of posts, by mobilizing voters to vote for a specific political party.


2021 ◽  
Vol 37 (3) ◽  
pp. 288-303
Author(s):  
Ghozian Aulia Pradhana ◽  
◽  
Syaifa Tania ◽  

This study aims to reveal how hyperreality is reflected in using the #BlackLivesMatter hashtag on social media. The death of an African-American, George Floyd, that involved white police, has sparked outrage and demonstrations in many U.S. states. Issues pertaining to racism sparked in relation to the event, and many people protested demanding justice. The demand for justice then went into a wave of massive global protests both in offline and online realities—the #BlackLivesMatter hashtag was widely used on social media when protests were held. The #BlackLivesMatter hashtag even became a trending topic on several social media platforms, as if everyone was concerned about the issue and aiming for the same purpose. However, we might find several posts that neither reflected nor were related to the case. Some social media users put the hashtag even though their content substance was not related. This phenomenon then led to a condition of hyperreality in questioning reality from a simulation of reality. The method used in this study is content analysis which measures the sentiment of comments on Twitter and Instagram. The study found that social networking sites mobilised online movements even though they were not directly related to the #BlackLivesMatter movement. On the other hand, hashtag activism reduced the true meaning of the social movement. Therefore, the hyperreality in #BlackLivesMatter could not be seen any longer as a form of massive protests demanding justice and ending violence, but merely to gain more digital presence on social media. Keywords: Black lives matter, movement, social media, hyperreality, hashtag activism.


2014 ◽  
pp. 1717-1730
Author(s):  
Joanne Kuzma

The growth of Online Social Networking sites has brought new services and communication methods to consumers. However, along with benefits, serious problems such as online cyber harassment have recently come to the forefront of the electronic media. This behavior can have significant negative effect on individuals, businesses and the social networks. Some sites have begun to provide some levels of protection and create specific anti-harassment policies in their terms of service along with implementing protection technologies. However, these protective measures are not consistent among social media, leaving some consumers at greater risk. This study analyzed 60 worldwide social sites and determined the level of cyber-harassment protection. It reviewed statistical differences among geographical-based social networks. The results showed significant gaps among various social networks, but suggests methods for improving consumer safeguards to provide consistent levels of protection.


Author(s):  
Ganiyu Ojo Adigun ◽  
Adebayo Muritala Adegbore ◽  
Halimah Odunayo Amuda

This chapter discusses how to transform libraries into a social library by integrating social networking tools into library reference services. Social networking/media tools enable Reference Librarians to communicate, network, and share documents with many library clients regardless of location, and at little or no expense. Reference Librarians can build relationships and keep up to date with library clients. Social networking media, however, open up new forms of collaboration that are not so bounded by time, place, and access to funding. This chapter looks at the following: needs and purpose of reference services, social responsibility of library, social networking in library reference services, challenges and prospects of integrating social networking into reference services, social media platforms, and ways to improve the use of social networking in library reference services in the future.


2010 ◽  
pp. 2226-2238
Author(s):  
Almudena Moreno Mínguez ◽  
Carolina Suárez Hernán

The generalization of the new information technologies has favored the transformation of social structures and the way of relating to others. In this changing process, the logic of the social relationships is characterized by the fragility and the temporality of the communicative systems reciprocity which are established “online” in a new cybernetic culture. “Virtual communities” are created in which the interaction systems established by individuals exceed the traditional categories of time and space. In this manner the individuals create online social webs where they connect and disconnect themselves based on their needs or wishes. The new online communication technologies favor the rigid norms of the “solid society” that dilute in flexible referential contexts and reversible in the context of the “global and liquid society” to which the sociologists Bauman or Beck have referred to. Therefore the objective that the authors propose in this chapter is to try new theoretic tools, from the paradigms of the new sociology of technology, which let them analyze the new relational and cultural processes which are being generated in the cultural context of the information global society, as a consequence of the new communication technologies scope. Definitely the authors propose to analyze the meaning of concepts such as “virtual community”, “cyber culture”, or “contacted individualism”, as well as the meaning and extent of some of the new social and individual behaviors which are maintained in the Net society.


Author(s):  
P. K. Muthukumar

Social media is never again an immaterial wonder; tools like Facebook, WhatsApp, LinkedIn, or YouTube have taken the world in a tempest. Social media has turned into a standard, changed individual connections, enabled people to add to number of issues, and produced new potential outcomes and difficulties to encourage joint effort. Associations have dire need of not just concentrating on advancement of new items and administrations, yet additionally giving explicit consideration to viable learning sharing, which is of indispensable significance for their success. The potential favourable position of grasping and executing web-based social networking is tremendous. Despite the fact that the enthusiasm for internet-based life is expanding, from one perspective information specialists and administrators are hanging tight to get engaged with this synergistic world, since they may not feel motivated or may not know about the benefits of utilizing these devices for work purposes.


Sign in / Sign up

Export Citation Format

Share Document