Linguistic Formality and Interactivity in Political Marketing: Effects of Structural Features in Plain Text Messages

2013 ◽  
Author(s):  
Byungho Park ◽  
Moon Young Kang ◽  
Jiwon Lee
2020 ◽  
Vol 12 (15) ◽  
pp. 5997
Author(s):  
Byungho Park ◽  
Moon Young Kang ◽  
Jiwon Lee

The success of Barack Obama’s 2008 U.S. presidential campaign led politicians and voters all over the world to pay attention to social media. Including Donald Trump for his upcoming 2020 re-election, many politicians around the world have used social media for their political campaigns. While some social media can deliver information in various forms (i.e., video, audio, and interactive content), some popular ones, such as Twitter, are still focused mostly on plain text messaging. With political marketing using simple text messages via social media, there is a need to examine ways of creating messages that ultimately help shape voters’ perception of politicians and eventually win the election. Based on communication science, this study attempts to test the limited capacity model of motivated mediated message processing by examining whether this model can be applied to the simplest form of mediated message, which is plain text. In order to do so, structural features of text messages exchanged on social media engaged in political campaigns, namely linguistic formality and network-mediated human interactivity, are manipulated in an experiment. Findings suggest that linguistic formality and human interaction in plain text messages influence perceived friendliness, truthfulness, and dependability of the message source (politicians), as well as the receivers’ (constituents’) behavioral intent to vote for the message source in an upcoming election. This implies that politicians should pay more attention on sustainable political marketing through appropriate manipulation of structural features in social media messages.


2020 ◽  
Vol 4 (2) ◽  
pp. 92-97
Author(s):  
Abd Charis Fauzan ◽  
Veradella Yuelisa Mafula

Security and confidentiality of documents stored on a computer is an important aspect in the field of computer or information system security. Documents will no longer be useful if they are intercepted or hijacked by unauthorized people, they will even endanger the document owner, if documents containing important information are misused by irresponsible people. Therefore the documents on the computer must be preserved so that they are only accepted and used by interested persons. One of the solutions to prevent eavesdropping of documents is to use cryptography. This study aims to increase cryptographic complexity using a combination of hill cipher algorithms and block chaining cipher modes. The combination of the two methods is expected to be able to cover the shortcomings of each method so that the cryptographic complexity can be increased. The method in this study consists of two stages, namely the document encryption and document decryption stages. The encryption stage is to change the plaintext document into a ciphertext document, on the other hand, the decryption stage is to change the ciphertext document back into a plaintext document. The stages for document encryption include; 1) retrieve plain text messages in the document so that they can be processed by the system (parsing); 2) encryption to convert plaintext documents into ciphertext documents using the hill cipher algorithm; 3) encryption to convert plaintext documents into cipher text documents using cipher block chaining mode. While the methods for decryption are 1) taking the ciphertext message in the document so that it can be processed by the system (parsing); 2) decryption to convert ciphertext documents into plaintext documents using cipher block chaining mode; 3) decryption to convert ciphertext documents into plaintext documents using a hill cipher.


Author(s):  
Himanshu Bhatia

Abstract: With the expanding utilization of instant chat messengers to share data, Suspicious exercises have additionally expanded. There are numerous sources to share the data however moment talk couriers and informal communication sites are fast, simply intended to share anything. In some cases, even new stories are at first separated via online media locales and further on talk couriers rather than any news channel and paper and so forth. Because of these innovation progressions, a few individuals are using these applications inappropriately to share suspicious messages and make arrangements to accomplish something unlawful. With the headway of web innovation and the change in the method of correspondence, it is discovered that much direct news has been examined in Internet discussions well before they are accounted for in conventional broad communications. Additionally, this correspondence channel gives a viable channel to criminal operations, for example, communicating of copyrighted films, compromising messages and internet betting and so on. Our Proposed Framework will examine online plain text messages from chosen conversation gatherings and our framework will choose which post is legitimate and unlawful. It will detect the suspicious keyword from the chatting and give a warning message to the user and also a mail will be sent to admin which will include all the details of the user. Keywords: Suspicious Chat, Chat Monitoring, Abusive word, Terrorist activities, Chat Tracking.


2020 ◽  
pp. 016555152097987
Author(s):  
Chun Chieh Chen ◽  
Hei-Chia Wang

Recently, the ceaseless rise in the global average temperature has led to extreme climates in which natural disasters, such as droughts, hurricanes, earthquakes and floods, are becoming increasingly serious. Recent research has found that social media typically reflects disasters earlier than official communication channels. In this study, the idea of collecting information on flood disasters caused during the periods of typhoons and heavy rains for a city from the plain text messages released by social media by means of a term frequency (TF) and sliding window approach is proposed. The dataset analysed here contains a total of 292 articles and 12,484 tweets. This research determines how to establish a warning mechanism, with an added notification time for flooding disasters, and it shows how to provide relevant disaster relief personnel with references. This article contributes by combining social media data with emergency management information cloud (EMIC) data, especially in the context of having a mechanism for warning about flooding disasters. According to the experimental results, a sliding window of 90 min and a sliding gap of 10 min obtained the best F-measure value ( F = 0.315). The event studied was Typhoon Megi (September 2016), which caused major flooding in Tainan. For the Typhoon Megi event, the flood disaster location database had 161 streets available for matching. Based on the experimental results, it is possible to obtain a high-precision (90% or higher) accuracy rate from real-time tweet data by exploiting a social media dataset.


Author(s):  
O.C. de Hodgins ◽  
K. R. Lawless ◽  
R. Anderson

Commercial polyimide films have shown to be homogeneous on a scale of 5 to 200 nm. The observation of Skybond (SKB) 705 and PI5878 was carried out by using a Philips 400, 120 KeV STEM. The objective was to elucidate the structural features of the polymeric samples. The specimens were spun and cured at stepped temperatures in an inert atmosphere and cooled slowly for eight hours. TEM micrographs showed heterogeneities (or nodular structures) generally on a scale of 100 nm for PI5878 and approximately 40 nm for SKB 705, present in large volume fractions of both specimens. See Figures 1 and 2. It is possible that the nodulus observed may be associated with surface effects and the structure of the polymers be regarded as random amorphous arrays. Diffraction patterns of the matrix and the nodular areas showed different amorphous ring patterns in both materials. The specimens were viewed in both bright and dark fields using a high resolution electron microscope which provided magnifications of 100,000X or more on the photographic plates if desired.


Author(s):  
D. F. Blake ◽  
L. F. Allard ◽  
D. R. Peacor

Echinodermata is a phylum of marine invertebrates which has been extant since Cambrian time (c.a. 500 m.y. before the present). Modern examples of echinoderms include sea urchins, sea stars, and sea lilies (crinoids). The endoskeletons of echinoderms are composed of plates or ossicles (Fig. 1) which are with few exceptions, porous, single crystals of high-magnesian calcite. Despite their single crystal nature, fracture surfaces do not exhibit the near-perfect {10.4} cleavage characteristic of inorganic calcite. This paradoxical mix of biogenic and inorganic features has prompted much recent work on echinoderm skeletal crystallography. Furthermore, fossil echinoderm hard parts comprise a volumetrically significant portion of some marine limestones sequences. The ultrastructural and microchemical characterization of modern skeletal material should lend insight into: 1). The nature of the biogenic processes involved, for example, the relationship of Mg heterogeneity to morphological and structural features in modern echinoderm material, and 2). The nature of the diagenetic changes undergone by their ancient, fossilized counterparts. In this study, high resolution TEM (HRTEM), high voltage TEM (HVTEM), and STEM microanalysis are used to characterize tha ultrastructural and microchemical composition of skeletal elements of the modern crinoid Neocrinus blakei.


Author(s):  
U. Aebi ◽  
P. Rew ◽  
T.-T. Sun

Various types of intermediate-sized (10-nm) filaments have been found and described in many different cell types during the past few years. Despite the differences in the chemical composition among the different types of filaments, they all yield common structural features: they are usually up to several microns long and have a diameter of 7 to 10 nm; there is evidence that they are made of several 2 to 3.5 nm wide protofilaments which are helically wound around each other; the secondary structure of the polypeptides constituting the filaments is rich in ∞-helix. However a detailed description of their structural organization is lacking to date.


Author(s):  
R.M. Glaeser ◽  
S.B. Hayward

Highly ordered or crystalline biological macromolecules become severely damaged and structurally disordered after a brief electron exposure. Evidence that damage and structural disorder are occurring is clearly given by the fading and eventual disappearance of the specimen's electron diffraction pattern. The fading and disappearance of sharp diffraction spots implies a corresponding disappearance of periodic structural features in the specimen. By the same token, there is a oneto- one correspondence between the disappearance of the crystalline diffraction pattern and the disappearance of reproducible structural information that can be observed in the images of identical unit cells of the object structure. The electron exposures that result in a significant decrease in the diffraction intensity will depend somewhat upon the resolution (Bragg spacing) involved, and can vary considerably with the chemical makeup and composition of the specimen material.


Author(s):  
Godfrey C. Hoskins ◽  
Betty B. Hoskins

Metaphase chromosomes from human and mouse cells in vitro are isolated by micrurgy, fixed, and placed on grids for electron microscopy. Interpretations of electron micrographs by current methods indicate the following structural features.Chromosomal spindle fibrils about 200Å thick form fascicles about 600Å thick, wrapped by dense spiraling fibrils (DSF) less than 100Å thick as they near the kinomere. Such a fascicle joins the future daughter kinomere of each metaphase chromatid with those of adjacent non-homologous chromatids to either side. Thus, four fascicles (SF, 1-4) attach to each metaphase kinomere (K). It is thought that fascicles extend from the kinomere poleward, fray out to let chromosomal fibrils act as traction fibrils against polar fibrils, then regroup to join the adjacent kinomere.


Author(s):  
P. S. Kotval ◽  
C. J. Dewit

The structure of Ta2O5 has been described in the literature in several different crystallographic forms with varying unit cell lattice parameters. Earlier studies on films of Ta2O5 produced by anodization of tantalum have revealed structural features which are not consistent with the parameters of “bulk” Ta2O5 crystalsFilms of Ta2O5 were prepared by anodizing a well-polished surface of pure tantalum sheet. The anodic films were floated off in distilled water, collected on grids, dried and directly examined in the electron microscope. In all cases the films were found to exhibit diffraction patterns representative of an amorphous structure. Using beam heating in the electron microscope, recrystallization of the amorphous films can be accomplished as shown in Fig. 1. As suggested by earlier work, the recrystallized regions exhibit diffraction patterns which consist of hexagonal arrays of main spots together with subsidiary rows of super lattice spots which develop as recrystallization progresses (Figs. 2a and b).


Sign in / Sign up

Export Citation Format

Share Document