![](images/graphics/blank.gif)
Entries in social networks
-
Ebook Information security management handbook (Volume 7): Part 2 includes the following content: Chapter 14 - managing the security testing process, chapter 15 - security and resilience in the software development life cycle, chapter 16 - cloud cryptography, chapter 17 - identity and access management architecture, chapter 18 - fedramp: entry or exit ramp for cloud security? chapter 19 - data storage and network security, chapter 20 - national patient identifier and patient privacy in the digital era, chapter 21 - addressing social media security and privacy challenges,…
224p
haojiubujain01
24-06-2023
10
5
Download
-
This study was carried out to investigate the use of social networking sites (SNS) among the undergraduate students of National Economics University (NEU), Vietnam. The results showed that Facebook, YouTube, Zalo, and Instagram were the most favorite social networking sites used by NEU students. Most students used SNS more than four times a day and they devoted an average of 30 minutes in each of their entries to these websites.
11p
vipatriciawoertz
26-05-2022
12
3
Download
-
The purpose of this paper is first to present vectorial representations of user’s entries and interests in topics in social networks. Based on such vectorization of short texts, we propose three interest measures of users. And then we investigate the relationships among interest degrees, similarity and trustworthiness of users based on these measures. Some preliminary studies on these correlations are exhibited.
9p
trinhthamhodang9
10-12-2020
10
1
Download
-
This paper presents a model for estimating the similarity between users based on their behavior on social networks. The considered behaviors are activities including posting entries, liking these entries, commenting and liking the comment in these entries. The model is then evaluated with a dataset-collected users from Twitter.
11p
vithanos2711
09-08-2019
26
0
Download
-
We measure the reliable transport of event features from source nodes to the sink in terms of the number of received data packets. Regardless of any application-specific metric that may actually be used, the number of received data packets is closely related to the amount of information acquired by the sink for the detection and extraction of event features. Hence, this serves as a simple but adequate event reliability measure at the transport level.
9p
giamdocamnhac
06-04-2013
64
5
Download
-
Modern communication tools such as the Internet provide a relatively inexpensive, accessible, easy-entry means of sharing ideas, information, and pictures around the world. In a political and human rights context, in closed societies when the more established, formal news media is denied access to or does not report on specified news events, the Internet has become an alternative source of media, and sometimes a means to organize politically.
15p
doiroimavanchuadc
06-02-2013
65
6
Download
-
π π Effective users are more likely to use social media to monitor trends, research new product ideas via social networks, have an online user group for customers, and collect and track customer reviews on their website. π π Effective users are more likely to know where customers are talking about them on the Web and prioritize their social media activities accordingly. Out of all the executives in the survey, only one-quarter said they could target where their most important customer segments discussed their brands and services.
24p
mebachano
01-02-2013
68
5
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)