Real-Time Identity-Deception Detection Techniques for Social Media: Optimizations and Challenges

2018 ◽  
Vol 22 (5) ◽  
pp. 35-45 ◽  
Author(s):  
Michail Tsikerdekis
2021 ◽  
Vol 54 (3) ◽  
pp. 1-35
Author(s):  
Ahmed Alharbi ◽  
Hai Dong ◽  
Xun Yi ◽  
Zahir Tari ◽  
Ibrahim Khalil

Social media have been growing rapidly and become essential elements of many people’s lives. Meanwhile, social media have also come to be a popular source for identity deception. Many social media identity deception cases have arisen over the past few years. Recent studies have been conducted to prevent and detect identity deception. This survey analyzes various identity deception attacks, which can be categorized into fake profile, identity theft, and identity cloning. This survey provides a detailed review of social media identity deception detection techniques. It also identifies primary research challenges and issues in the existing detection techniques. This article is expected to benefit both researchers and social media providers.


Author(s):  
Fulpagare Priya K. ◽  
Nitin N. Patil

Social Network is an emerging e-service for Content Sharing Sites (CSS). It is an emerging service which provides reliable communication. Some users over CSS affect user’s privacy on their personal contents, where some users keep on sending annoying comments and messages by taking advantage of the user’s inherent trust in their relationship network. Integration of multiple user’s privacy preferences is very difficult task, because privacy preferences may create conflict. The techniques to resolve conflicts are essentially required. Moreover, these methods need to consider how users would actually reach an agreement about a solution to the conflict in order to offer solutions acceptable by all of the concerned users. The first mechanism to resolve conflicts for multi-party privacy management in social media that is able to adapt to different situations by displaying the enterprises that users make to reach a result to the conflicts. Billions of items that are uploaded to social media are co-owned by multiple users. Only the user that uploads the item is allowed to set its privacy settings (i.e. who can access the item). This is a critical problem as users’ privacy preferences for co-owned items can conflict. Multi-party privacy management is therefore of crucial importance for users to appropriately reserve their privacy in social media.


2019 ◽  
Vol 118 (6) ◽  
pp. 97-99
Author(s):  
Arockia Jeyasheela A ◽  
Dr.S. Chandramohan

This study is discussed about the viral marketing. It is a one of the key success of marketing. This paper gave the techniques of viral marketing. It can be delivered word of mouth. It can be created by both the representatives of a company and consumer (individuals or communities). The right viral message with go to right consumer to the right time. Viral marketing is easy to attract the consumer. It is most important advertising to consumer. It involves consumer perception, organization contribution, blogs, SMO (Social Media Optimize), SEO (Social Engine Optimize). Principles of viral marketing are social profile gathering, Proximity Market, Real time Key word density.


2013 ◽  
Vol 33 (5) ◽  
pp. 1459-1462
Author(s):  
Xiaoming JU ◽  
Jiehao ZHANG ◽  
Yizhong ZHANG

2021 ◽  
pp. 193896552199308
Author(s):  
Kathryn A. LaTour ◽  
Ana Brant

Most hospitality operators use social media in their communications as a means to communicate brand image and provide information to customers. Our focus is on a two-way exchange whereby a customer’s social posting is reacted to in real-time by the provider to enhance the customer’s current experience. Using social media in this way is new, and the provider needs to carefully balance privacy and personalization. We describe the process by which the Dorchester Collection Customer Experience (CX) Team approached its social listening program and share lessons to identify best practices for hospitality operators wanting to delight their customers through insights gained from social listening.


Animals ◽  
2021 ◽  
Vol 11 (6) ◽  
pp. 1662
Author(s):  
Dominik Łagowski ◽  
Sebastian Gnat ◽  
Aneta Nowakiewicz ◽  
Aleksandra Trościańczyk

Dermatophytes are filamentous fungi with the ability to digest and grow on keratinized substrates. The ongoing improvements in fungal detection techniques give new scope for clinical implementations in laboratories and veterinary clinics, including the monitoring of the disease and carrier status. The technologically advanced methods for dermatophyte detection include molecular methods based on PCR. In this context, the aim of this study was to carry out tests on the occurrence of dermatophytes in cattle herds using qPCR methods and a comparative analysis with conventional methods. Each sample collected from ringworm cases and from asymptomatic cattle was divided into three parts and subjected to the real-time PCR technique, direct light microscopy analysis, and culture-based methods. The use of the real-time PCR technique with pan-dermatophyte primers detected the presence of dermatophytes in the sample with a 10.84% (45% vs. 34.17%) higher efficiency than direct analysis with light microscopy. Moreover, a dermatophyte culture was obtained from all samples with a positive qPCR result. In conclusion, it seems that this method can be used with success to detect dermatophytes and monitor cowsheds in ringworm cases and carriers in cattle.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Suppawong Tuarob ◽  
Poom Wettayakorn ◽  
Ponpat Phetchai ◽  
Siripong Traivijitkhun ◽  
Sunghoon Lim ◽  
...  

AbstractThe explosion of online information with the recent advent of digital technology in information processing, information storing, information sharing, natural language processing, and text mining techniques has enabled stock investors to uncover market movement and volatility from heterogeneous content. For example, a typical stock market investor reads the news, explores market sentiment, and analyzes technical details in order to make a sound decision prior to purchasing or selling a particular company’s stock. However, capturing a dynamic stock market trend is challenging owing to high fluctuation and the non-stationary nature of the stock market. Although existing studies have attempted to enhance stock prediction, few have provided a complete decision-support system for investors to retrieve real-time data from multiple sources and extract insightful information for sound decision-making. To address the above challenge, we propose a unified solution for data collection, analysis, and visualization in real-time stock market prediction to retrieve and process relevant financial data from news articles, social media, and company technical information. We aim to provide not only useful information for stock investors but also meaningful visualization that enables investors to effectively interpret storyline events affecting stock prices. Specifically, we utilize an ensemble stacking of diversified machine-learning-based estimators and innovative contextual feature engineering to predict the next day’s stock prices. Experiment results show that our proposed stock forecasting method outperforms a traditional baseline with an average mean absolute percentage error of 0.93. Our findings confirm that leveraging an ensemble scheme of machine learning methods with contextual information improves stock prediction performance. Finally, our study could be further extended to a wide variety of innovative financial applications that seek to incorporate external insight from contextual information such as large-scale online news articles and social media data.


2021 ◽  
Vol 4 (1) ◽  
Author(s):  
James T. H. Teo ◽  
Vlad Dinu ◽  
William Bernal ◽  
Phil Davidson ◽  
Vitaliy Oliynyk ◽  
...  

AbstractAnalyses of search engine and social media feeds have been attempted for infectious disease outbreaks, but have been found to be susceptible to artefactual distortions from health scares or keyword spamming in social media or the public internet. We describe an approach using real-time aggregation of keywords and phrases of freetext from real-time clinician-generated documentation in electronic health records to produce a customisable real-time viral pneumonia signal providing up to 4 days warning for secondary care capacity planning. This low-cost approach is open-source, is locally customisable, is not dependent on any specific electronic health record system and can provide an ensemble of signals if deployed at multiple organisational scales.


2021 ◽  
pp. 016555152110077
Author(s):  
Sulong Zhou ◽  
Pengyu Kan ◽  
Qunying Huang ◽  
Janet Silbernagel

Natural disasters cause significant damage, casualties and economical losses. Twitter has been used to support prompt disaster response and management because people tend to communicate and spread information on public social media platforms during disaster events. To retrieve real-time situational awareness (SA) information from tweets, the most effective way to mine text is using natural language processing (NLP). Among the advanced NLP models, the supervised approach can classify tweets into different categories to gain insight and leverage useful SA information from social media data. However, high-performing supervised models require domain knowledge to specify categories and involve costly labelling tasks. This research proposes a guided latent Dirichlet allocation (LDA) workflow to investigate temporal latent topics from tweets during a recent disaster event, the 2020 Hurricane Laura. With integration of prior knowledge, a coherence model, LDA topics visualisation and validation from official reports, our guided approach reveals that most tweets contain several latent topics during the 10-day period of Hurricane Laura. This result indicates that state-of-the-art supervised models have not fully utilised tweet information because they only assign each tweet a single label. In contrast, our model can not only identify emerging topics during different disaster events but also provides multilabel references to the classification schema. In addition, our results can help to quickly identify and extract SA information to responders, stakeholders and the general public so that they can adopt timely responsive strategies and wisely allocate resource during Hurricane events.


2021 ◽  
Vol 2 (2) ◽  
Author(s):  
Kate Highnam ◽  
Domenic Puzio ◽  
Song Luo ◽  
Nicholas R. Jennings

AbstractBotnets and malware continue to avoid detection by static rule engines when using domain generation algorithms (DGAs) for callouts to unique, dynamically generated web addresses. Common DGA detection techniques fail to reliably detect DGA variants that combine random dictionary words to create domain names that closely mirror legitimate domains. To combat this, we created a novel hybrid neural network, Bilbo the “bagging” model, that analyses domains and scores the likelihood they are generated by such algorithms and therefore are potentially malicious. Bilbo is the first parallel usage of a convolutional neural network (CNN) and a long short-term memory (LSTM) network for DGA detection. Our unique architecture is found to be the most consistent in performance in terms of AUC, $$F_1$$ F 1 score, and accuracy when generalising across different dictionary DGA classification tasks compared to current state-of-the-art deep learning architectures. We validate using reverse-engineered dictionary DGA domains and detail our real-time implementation strategy for scoring real-world network logs within a large enterprise. In 4 h of actual network traffic, the model discovered at least five potential command-and-control networks that commercial vendor tools did not flag.


Sign in / Sign up

Export Citation Format

Share Document