Information Processes and Threats in Social Networks . A

نویسندگان

  • Zlatogor Minchev
  • Maria Petkova
چکیده

The paper presents a conceptual model based case study of information processes and threats of the most fast progressing social network in Internet for 2010 – Facebook. The key idea is to study the Web.2 technology feedback effects in social networks by using E-R system notation and software environment for modelling and simulation support. The obtained results are based on high-level subject matter experts’ opinion usage. The input data was filtered with Delphi technique, including fuzzy sets uncertainty copying support. The created model is further analyzed, providing general sensitivity assessment of the user account settings within the context of the information processes, which are connected with them. ACM Computing Classification System (1998): H.5, I.2.4, I.6.5, K.4.2, K.6.5

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Prediction of user's trustworthiness in web-based social networks via text mining

In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...

متن کامل

طراحی چارچوب معماری اطلاعاتی برای به‌کارگیری شبکه‌های اجتماعی در نظام آموزش عالی ایران

Management of social networks, has become a strategic challenge for different applications including education due to its growing importance. Enterprise Architecture (EA), uses a holistic specification of information technology functions in organizations to decrease the complexity of using information technology and to increase its efficiency. As regards, using social networks in education in ...

متن کامل

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

Modeling, Designing and Evaluating A Social Network in the Field of Health

Background and Aim: Social networks that provide users with health data not only educate them but also play an active role in the health decision-making process. Health social networks, in addition to being a good tool for better patient communication with health care providers, can play an effective role in connecting similar patients with each other to receive social support. Social networkin...

متن کامل

Comparative Analysis of Information Dissemination Capabilities of Media and Social Networks

Background and Aim: Human Knowledge depends on data and information that is emerged and transffered from different channels. The dessimination process is different from type, form of transfer, and distribution based on information or awareness. This survey compares the librarians and information scienctist’s information transferring capabilities in mass media and social networks. Methods: This ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010