Information Processes and Threats in Social Networks . A
نویسندگان
چکیده
The paper presents a conceptual model based case study of information processes and threats of the most fast progressing social network in Internet for 2010 – Facebook. The key idea is to study the Web.2 technology feedback effects in social networks by using E-R system notation and software environment for modelling and simulation support. The obtained results are based on high-level subject matter experts’ opinion usage. The input data was filtered with Delphi technique, including fuzzy sets uncertainty copying support. The created model is further analyzed, providing general sensitivity assessment of the user account settings within the context of the information processes, which are connected with them. ACM Computing Classification System (1998): H.5, I.2.4, I.6.5, K.4.2, K.6.5
منابع مشابه
Prediction of user's trustworthiness in web-based social networks via text mining
In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...
متن کاملطراحی چارچوب معماری اطلاعاتی برای بهکارگیری شبکههای اجتماعی در نظام آموزش عالی ایران
Management of social networks, has become a strategic challenge for different applications including education due to its growing importance. Enterprise Architecture (EA), uses a holistic specification of information technology functions in organizations to decrease the complexity of using information technology and to increase its efficiency. As regards, using social networks in education in ...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملModeling, Designing and Evaluating A Social Network in the Field of Health
Background and Aim: Social networks that provide users with health data not only educate them but also play an active role in the health decision-making process. Health social networks, in addition to being a good tool for better patient communication with health care providers, can play an effective role in connecting similar patients with each other to receive social support. Social networkin...
متن کاملComparative Analysis of Information Dissemination Capabilities of Media and Social Networks
Background and Aim: Human Knowledge depends on data and information that is emerged and transffered from different channels. The dessimination process is different from type, form of transfer, and distribution based on information or awareness. This survey compares the librarians and information scienctist’s information transferring capabilities in mass media and social networks. Methods: This ...
متن کامل