منابع مشابه
Place as Topics: Analysis of Spatial and Temporal Evolution of Topics from Social Networks Data
Geography in a commonsense way is about place. Place is a term used to describe the meaning that humans give to a location. Characterising a location as a place requires a huge amount of time to collect and analyse data. Furthermore, a place definition associated to a location can become rapidly obsolete. Nowadays, social networks and social media became very popular. People on social networks ...
متن کاملSocial Threats Modelling with i*
Security incidents lead to loss or disruptions of an organisation’s operations, services or functions, or reductions in the quality of the expected services. For any security incident, there is an individual or a group of attackers, conducting the attack action, towards one or many victims. The two sides are played by social actors, with certain social positions, protecting or obstructing a giv...
متن کاملThreats of Online Social Networks
In the recent years, we have witnessed a dramatic rise in popularity of online social networking services, with several Social Network Sites (SNSs) such as Myspace, Facebook, Blogger, You Tube, Yahoo! Groups etc are now among the most visited websites globally. However, since such forums are relatively easy to access and the users are often not aware of the size and the nature of the audience a...
متن کاملPosting Topics \ne ≠ Reading Topics: On Discovering Posting and Reading Topics in Social Media
Social media users make decisions about what content to post and read. As posted content is often visible to others, users are likely to impose self-censorship when deciding what content to post. On the other hand, such a concern may not apply to reading social media content. As a result, the topics of content that a user posted and read can be different and this has major implications to the a...
متن کاملCyber threats in social networking websites
A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sourc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communication Research
سال: 2016
ISSN: 0093-6502,1552-3810
DOI: 10.1177/0093650216644025