2018 21st Saudi Computer Society National Computer Conference (NCC)最新文献

筛选
英文 中文
Measuring Passive Engagement with Health Information on Social Media 衡量对社交媒体上健康信息的被动参与
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-12-31 DOI: 10.1109/NCG.2018.8593032
Fatimah Alhayan, D. Pennington, Sara Ayouni
{"title":"Measuring Passive Engagement with Health Information on Social Media","authors":"Fatimah Alhayan, D. Pennington, Sara Ayouni","doi":"10.1109/NCG.2018.8593032","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593032","url":null,"abstract":"Little to no consensus exists on the definition of “engagement” on social media platforms.}{A myriad of management tools are available to measure behavioral interactions with social media. However, the majority of social media users engage with the content passively, without taking action such as liking or commenting on it. To gain an understanding of how passive engagement with social media is evaluated, this paper examines recent articles on why and how passive engagement is evaluated. Furthermore, we review some recent research proposing new methods for measuring this type of engagement. Most of this research typically evaluates passive engagement in relation to users' drivers and business outcomes. We then present our theoretical model for passive user engagement with health content on social media. Finally, we outline our plans for the next steps in our research and propose methods that will be used to evaluate the model.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124100497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Rise of Big Data – Issues and Challenges 大数据的兴起——问题与挑战
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-12-31 DOI: 10.1109/NCG.2018.8593166
Bayan Alabdullah, N. Beloff, Martin White
{"title":"Rise of Big Data – Issues and Challenges","authors":"Bayan Alabdullah, N. Beloff, Martin White","doi":"10.1109/NCG.2018.8593166","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593166","url":null,"abstract":"The recent rapid rise in the availability of big data due to Internet-based technologies such as social media platforms and mobile devices has left many market leaders unprepared for handling very large, random and high velocity data. Conventionally, technologies are initially developed and tested in labs and appear to the public through media such as press releases and advertisements. These technologies are then adopted by the general public. In the case of big data technology, fast development and ready acceptance of big data by the user community has left little time to be scrutinized by the academic community. Although many books and electronic media articles are published by professionals and authors for their work on big data, there is still a lack of fundamental work in academic literature. Through survey methods, this paper discusses challenges in different aspects of big data, such as data sources, content format, data staging, data processing, and prevalent data stores. Issues and challenges related to big data, specifically privacy attacks and counter-techniques such as k-anonymity, t-closeness, l-diversity and differential privacy are discussed. Tools and techniques adopted by various organizations to store different types of big data are also highlighted. This study identifies different research areas to address such as a lack of anonymization techniques for unstructured big data, data traffic pattern determination for developing scalable data storage solutions and controlling mechanisms for high velocity data.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129707709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Assembling the complexity of emerging knowledge the PhD Parallel Progress Pyramid (P4) 整合新兴知识的复杂性:博士平行发展金字塔(P4)
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-12-27 DOI: 10.1109/NCG.2018.8593064
M. Awais, Marie Manidis
{"title":"Assembling the complexity of emerging knowledge the PhD Parallel Progress Pyramid (P4)","authors":"M. Awais, Marie Manidis","doi":"10.1109/NCG.2018.8593064","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593064","url":null,"abstract":"Theorising doctoral learning/writing is generally within the purview of academics and professional theorists [1–5]. This paper seeks to give voice to an International Higher Degree Research candidate in Information Technology, highlighting an entirely unique perspective on learning and experiences in the PhD. It draws on the disciplinary field to illustrate a ‘software-based approach’ to undertaking PhD tasks in seeking to make sense of emergent learning. The candidate‘s co-author (drawing on practice theory-oriented perspectives on learning [6, 7]) highlights how differently this thinking is from predominant learning theories. The paper concludes that ‘amateur’ [8] insights can inform and contribute to doctoral pedagogy in researcher development, through providing a new language for talking to and possibly new methodologies for learning, for both international and science-based candidates, about their progress.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133721101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Holistic Framework for Enhancing Privacy Awareness 提高私隐意识的整体架构
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-12-27 DOI: 10.1109/NCG.2018.8592972
A. Alshehri, N. Clarke, Fudong Li
{"title":"A Holistic Framework for Enhancing Privacy Awareness","authors":"A. Alshehri, N. Clarke, Fudong Li","doi":"10.1109/NCG.2018.8592972","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592972","url":null,"abstract":"Home users face increasingly higher risks of privacy loss and struggle with the difficult task of protecting large volumes of personal information. Most privacy research assumes that users have uniform privacy requirements. The main problem with this approach is that research has also shown that users have different privacy attitudes and expectations based upon a variety of factors, including (but not limited to) gender, age and education level. Privacy therefore can mean different things in different contexts, to different people at different times. For example, some uses are less concerned regarding the sharing and use of their location information while others will be very concerned. Therefore, it is important to factor these requirements in to a privacy-awareness model that can enhance user’s awareness and make more informed decisions to reduce their specific degree of exposure. The quantity and range of sensitive information also requires approaches that give users back the control over their data. Therefore, prioritization of privacy-related information based on an individual user basis should be utilised to ensure relevant and timely notification about privacy-related information that is important to the user. This paper presents a critical analysis of the current state of the art and proposes a novel mobile-based architecture to provide users with effective and usable privacy protection.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134499357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unpacking Privacy Practices in SNSs: Users’ Protection Strategies to Enforce Privacy Boundaries 社交网络中的隐私实践:用户加强隐私边界的保护策略
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-26 DOI: 10.1109/NCG.2018.8593046
F. Asiri, D. Millard
{"title":"Unpacking Privacy Practices in SNSs: Users’ Protection Strategies to Enforce Privacy Boundaries","authors":"F. Asiri, D. Millard","doi":"10.1109/NCG.2018.8593046","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593046","url":null,"abstract":"With the emergence of Social Networking Sites (SNSs), privacy management has been a great area of concern for SNSs’ population. Moreover, most of the studies reach contradictory findings regarding how people regulate their online privacy. This lack of clarity around behaviours and attitudes makes creating legislation and designing new systems to protect privacy challenging. Communication Privacy Management theory (developed in the context of fact-to-face interactions) suggests that when communicating people manage a complex set of imaginary boundaries, and use a variety of strategies to enforce them. In this paper, we explore to what extent this has been observed in online behaviour. Consequently, this paper presents a broad review of the literature published between 2003-2017 relating to privacy protection strategies. This reveals 10 distinct strategies: 5 technological and 5 social. It also reveals a strong bias towards Facebook, and a majority American or European context. Our findings suggest that previous work may have overlooked some of the strategies, even in the technological category, and that may explain the behavioural discrepancies observed. It also indicates that more needs to be done to understand privacy behaviour on a wider set of platforms, and with a broader cultural context","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134335353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Real-time Intervention System Applied in Smart City 智能实时干预系统在智慧城市中的应用
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-25 DOI: 10.1109/NCG.2018.8593047
L. K. B. Melhim, M. Jemmali, Mafawez T. Alharbi
{"title":"Intelligent Real-time Intervention System Applied in Smart City","authors":"L. K. B. Melhim, M. Jemmali, Mafawez T. Alharbi","doi":"10.1109/NCG.2018.8593047","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593047","url":null,"abstract":"Living in smart cities is different from living in traditional cities. One of these differences is the level of services that will be provided to the inhabitants of smart cities. Fiber networks, Wi-Fi, Wi-max and advanced sensors will not be enough to form smart cities. Improving the level of services by minimizing response time and maximizing service quality will make cities smarter. Based on this point of view, this paper presents a proposal to improve and upgrade the services to be provided to the residents of smart cities, especially critical services such as those related to the ambulance, firefighting, civil defense, police, maintenance, and power issues. The suggested proposal focuses on providing an intelligent mechanism. This mechanism aimed at enhancing the performance and readiness of organizations and institutions responsible for these services. The enhancement is performed by reducing response time, improving level and quality of provided services and ensuring continuity of these services.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"919 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123047295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Saudi Mood: A Real-Time Informative Tool for Visualizing Emotions in Saudi Arabia Using Twitter 沙特心情:一个实时信息工具可视化情绪在沙特阿拉伯使用Twitter
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-25 DOI: 10.1109/NCG.2018.8593165
Tahani Almanie, Alanoud Aldayel, Ghaida Alkanhal, Lama Alesmail, Manal Almutlaq, Ruba Althunayan
{"title":"Saudi Mood: A Real-Time Informative Tool for Visualizing Emotions in Saudi Arabia Using Twitter","authors":"Tahani Almanie, Alanoud Aldayel, Ghaida Alkanhal, Lama Alesmail, Manal Almutlaq, Ruba Althunayan","doi":"10.1109/NCG.2018.8593165","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593165","url":null,"abstract":"With today’s growing technology, Internet usage has increased greatly, especially in Saudi Arabia. Saudi people use the Internet and social media, particularly Twitter, as an expressive platform to share their feelings and opinions. Although many studies have analyzed people’s sentiment using Twitter, there is still a shortage of applications in analyzing Arabic tweets. In particular, there is an absence of informative tools that can show how people in Saudi Arabia are feeling according to their tweets. This brings to light the idea of “Saudi Mood”, which is a web-based application aims at providing a real-time visualization of people emotions from different Saudi’s cities based on mining their tweets’ text and emojis used taking into consideration the different dialects. Our solution applies a set of language-processing techniques in order to preprocess the tweets. A dataset containing more than 4000 emotional words has been developed and used to classify the tweets into the relevant emotion (happy, sad, angry, scared, surprised). Then, common emotions will be calculated for each city, and the results will be displayed on a dynamic, colorful map of Saudi Arabia in which colors of cities are changing according to the dominant emotion. Also, the website will present the associated trending hashtags for each city along with some interesting emotion statistics. Developing this solution will bring a live informative tool of Saudi Arabia presented in an easy and efficient manner and it is expected to have a positive impact on several aspects.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115769245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Classification of Parkinson’s Disease Using NNge Classification Algorithm. 基于NNge分类算法的帕金森病分类。
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-25 DOI: 10.1109/NCG.2018.8592989
Ebtesam J. Alqahtani, F. Alshamrani, H. F. Syed, S. Olatunji
{"title":"Classification of Parkinson’s Disease Using NNge Classification Algorithm.","authors":"Ebtesam J. Alqahtani, F. Alshamrani, H. F. Syed, S. Olatunji","doi":"10.1109/NCG.2018.8592989","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592989","url":null,"abstract":"One of the most widely spread diseases around the world is Parkinson’s disease (PD). This disease affects the human brain and results in sudden and random body movements. It progresses slowly and differently at every stage. Moreover, the disease has few known symptoms. Therefore, it is difficult for doctors to discover it in its initial stages. One of the main symptoms that can help researchers to predict the disease as early as possible is speech disorder. Many researchers have conducted several studies using voice recordings to produce an accurate PD diagnosis system. One unique promising way to use the speech disorder as a helping factor to predict PD is by using machine learning techniques. In this paper, we used NNge classification algorithms to analyze voice recordings for PD classification. NNge classification is known to be an efficient algorithm for analyzing voice signals but has not been explored in details in this area. In this paper, a literature review of previous research papers about PD prediction was briefly presented. Then, an experiment using NNge classification algorithm to classify people into healthy people and PD patients was performed. The parameters of the NNge algorithm were optimized. Moreover, SMOTE algorithm was used to balance the data. Finally, NNge and ensemble algorithms specifically, AdaBoostM1 was implemented on the balanced data. The final implementation of NNge using AdaBoost ensemble classifier had an accuracy of 96.30%.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"269 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122721829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Optimized Twitter Cyberbullying Detection based on Deep Learning 基于深度学习的Twitter网络欺凌检测优化
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-25 DOI: 10.1109/NCG.2018.8593146
Monirah A. Al-Ajlan, M. Ykhlef
{"title":"Optimized Twitter Cyberbullying Detection based on Deep Learning","authors":"Monirah A. Al-Ajlan, M. Ykhlef","doi":"10.1109/NCG.2018.8593146","DOIUrl":"https://doi.org/10.1109/NCG.2018.8593146","url":null,"abstract":"Cyberbullying is a crime in which a perpetrator targets a person with online harassment and hate. Many cyberbullying detection approaches have been introduced, but they were largely based on textual and user features. Most of the research found in the literature aimed to improve detection by introducing new features. Although, as the number of features increases, the feature extraction and selection phases become harder. In addition, another drawback of such improvements is that some features—for example, user age—can be easily fabricated. In this paper, we propose optimised Twitter cyberbullying detection based on deep learning (OCDD), a novel approach to address the above challenges. Unlike prior work in this field, OCDD does not extract features from tweets and feed them to a classifier; rather, it represents a tweet as a set of word vectors. In this way, the semantics of words is preserved, and the feature extraction and selection phases can be eliminated. As for the classification phase, deep learning will be used, along with a metaheuristic optimisation algorithm for parameter tuning.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122482154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
The Current Situation of Insider Threats Detection: An Investigative Review 内部威胁检测的现状:调查回顾
2018 21st Saudi Computer Society National Computer Conference (NCC) Pub Date : 2018-04-25 DOI: 10.1109/NCG.2018.8592986
Gaseb Alotibi, N. Clarke, Fudong Li, S. Furnell
{"title":"The Current Situation of Insider Threats Detection: An Investigative Review","authors":"Gaseb Alotibi, N. Clarke, Fudong Li, S. Furnell","doi":"10.1109/NCG.2018.8592986","DOIUrl":"https://doi.org/10.1109/NCG.2018.8592986","url":null,"abstract":"Information Technology and the Internet are ubiquitous tools for companies. Various companies are increasingly deploying information technologies to increase their process efficiency and to minimize costs. Information technologies have redefined the ways of conducting businesses. These technological revolutions have changed the nature of doing business on a global scale; simultaneously the threats surrounding these technologies are on rise. There have been various cases found in the aspects of information misuse, security attacks etc., which can be put together as cybercrime. There are different security tools like Authentication, Access Control, Anti-Virus, Firewalls, Intrusion Detection Systems and Security Information and Event Management (SIEM) to enable organizations to control and mitigate information misuse and any threat surrounding the systems. However, they are effective in detecting outside threats, and often lack the ability to detect the insider threats (attacks undertaken by employees of the company). Insider threats have become one of the major information security challenges for the organizations. Traditional information security measures are focused on the threats from the outside environment rather than the internal environments. A wide range of research has been undertaken to investigate approaches to detect the insider threats. The study has identified packet based and flow based network analysis as the two popular approaches in detecting internal threats. This paper presents a comprehensive analysis, literature review and limitations on network traffic analysis approaches.","PeriodicalId":305464,"journal":{"name":"2018 21st Saudi Computer Society National Computer Conference (NCC)","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122998544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信