2017 International Conference On Social Media, Wearable And Web Analytics (Social Media)最新文献

筛选
英文 中文
The Valleys of Death in Refugee Crisis 难民危机中的死亡谷
J. Maric
{"title":"The Valleys of Death in Refugee Crisis","authors":"J. Maric","doi":"10.22619/IJCSA.2017.100114","DOIUrl":"https://doi.org/10.22619/IJCSA.2017.100114","url":null,"abstract":"The paper analyses the risks of a potential “valley of death” in development of ICT (Information and Communication Technology) for refugees’ social integration. Today’s refugee crisis is distinct from previous ones because of remarkable refugees’ reliance on technology. Therefore, not surprisingly, the effective employment of ICT is often mentioned in conjunction with refugees’ integration as a mean of facilitating integrative efforts. While academic literature widely accepts that ICT deployment is especially relevant to refugees’ social integration, little is done in terms of understanding that ICT impact requires a convergence of conditions of which ICT is only one of them. The paper questions the extent to which discrepancy between the ICT demand and supply creates a vacuum in the field of ICT for social inclusion. In order to understand parameters that influence efficiency of particular ICT solution for refugees’ social integration we use quantitative analytical approach looking at both sides - demand and supply. We put under the magnifying glass performance of ICT mobile solution specifically developed for refugees' social integration, parallel with refugees’ testimonials on their everyday mobile usage practices. Finally, after identifying that ICT solution for refugees’ social integration is in the “valley of death” this study argues that ICT does not operate alone. Social inclusion is bilateral social process that places demand on both refugees and the hosting society. Keeping that in mind, we call for overcoming simplistic view of the need of ICT development for social change per se, and propose deeper analysis of all parameters necessary for delivering meaningful and effective ICT solution for social change.","PeriodicalId":372822,"journal":{"name":"2017 International Conference On Social Media, Wearable And Web Analytics (Social Media)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117109138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
How the 'uses and gratifications' theory explains the usage of professional networking sites: comparison between individual members and companies members “使用与满足”理论如何解释专业社交网站的使用:个人会员与公司会员的比较
2017 International Conference On Social Media, Wearable And Web Analytics (Social Media) Pub Date : 2017-06-19 DOI: 10.1109/SOCIALMEDIA.2017.8057359
K. Grissa
{"title":"How the 'uses and gratifications' theory explains the usage of professional networking sites: comparison between individual members and companies members","authors":"K. Grissa","doi":"10.1109/SOCIALMEDIA.2017.8057359","DOIUrl":"https://doi.org/10.1109/SOCIALMEDIA.2017.8057359","url":null,"abstract":"Social media continues to gain enormous popularity. Therefore, it is not surprising that this attracts the interest of researchers to study this cyber-social phenomenon. Previous contributions focused hugely on Online Social Networks (ONS), but this paper uses the ‘Uses & Gratifications’ Theory to explain the member behaviour in the field of Professional Networking Sites (PNS) by considering the motivations usage for both individuals and companies. For this purpose, a qualitative research was conducted using the ‘Uses & Gratifications’ Theory to explain the user behaviour in the field of professional networking sites. To collect data, we conducted 8 face-to-face interviews with companies and 5 focus groups with individuals. The results permit to identify two types of motivations: contextual motivations and generic motivations in which a comparison with those previously found in the field of OSNs may be done. A discussion of the results is presented in the light of the rewards and gratifications gained from using professional networking sites.","PeriodicalId":372822,"journal":{"name":"2017 International Conference On Social Media, Wearable And Web Analytics (Social Media)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127467495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The impact of interaction and algorithm choice on identified communities 交互和算法选择对已识别社区的影响
2017 International Conference On Social Media, Wearable And Web Analytics (Social Media) Pub Date : 2017-06-01 DOI: 10.1109/SOCIALMEDIA.2017.8057361
Rana Maher, David Malone, Marie Wallace
{"title":"The impact of interaction and algorithm choice on identified communities","authors":"Rana Maher, David Malone, Marie Wallace","doi":"10.1109/SOCIALMEDIA.2017.8057361","DOIUrl":"https://doi.org/10.1109/SOCIALMEDIA.2017.8057361","url":null,"abstract":"In social networks, nodes are organized into densely linked communities where edges appear among the nodes with high concentration. Identifying communities has proven to be a challenging task due to various community definitions/algorithms and also due to the lack of “ground truth” for reference and evaluation. These communities not only differ due to various definitions but also can be affected by the type of interactions modeled in the network, which lead to different social groups. We are interested in exploring and studying the concept of partial network views, which is based on multiple types of interactions. An Enron email network is used to conduct our experiments. In this paper, we explore the mutual impact of selecting different views extracted from the same network and their interplay with various community detection algorithms to measure the change and the level of realism of the structure for non-overlapping communities. To better understand this, we assess the agreement of partitions by evaluating the partitioning quality (performance) and finding the similarity between algorithms. The results demonstrate that the topological properties of communities and the performance of algorithms are equivalent to each other. Both of them are affected by the type of interaction specified in each view. Some network views appeared to have more interesting communities than other views, thus, might help to approach a relatively informative and logic “ground truth” for communities.","PeriodicalId":372822,"journal":{"name":"2017 International Conference On Social Media, Wearable And Web Analytics (Social Media)","volume":"79 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113988183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of colloquial Arabic tweets in real-time to detect high-risk floods 实时对阿拉伯语推文进行分类,以检测高风险洪水
2017 International Conference On Social Media, Wearable And Web Analytics (Social Media) Pub Date : 2017-06-01 DOI: 10.1109/SOCIALMEDIA.2017.8057358
Waleed Alabbas, Haider M. Al-Khateeb, Ali Mansour, G. Epiphaniou, Ingo Frommholz
{"title":"Classification of colloquial Arabic tweets in real-time to detect high-risk floods","authors":"Waleed Alabbas, Haider M. Al-Khateeb, Ali Mansour, G. Epiphaniou, Ingo Frommholz","doi":"10.1109/SOCIALMEDIA.2017.8057358","DOIUrl":"https://doi.org/10.1109/SOCIALMEDIA.2017.8057358","url":null,"abstract":"Twitter has eased real-time information flow for decision makers, it is also one of the key enablers for Open-source Intelligence (OSINT). Tweets mining has recently been used in the context of incident response to estimate the location and damage caused by hurricanes and earthquakes. We aim to research the detection of a specific type of high-risk natural disasters frequently occurring and causing casualties in the Arabian Peninsula, namely ‘floods’. Researching how we could achieve accurate classification suitable for short informal (colloquial) Arabic text (usually used on Twitter), which is highly inconsistent and received very little attention in this field. First, we provide a thorough technical demonstration consisting of the following stages: data collection (Twitter REST API), labelling, text pre-processing, data division and representation, and training models. This has been deployed using ‘R’ in our experiment. We then evaluate classifiers’ performance via four experiments conducted to measure the impact of different stemming techniques on the following classifiers SVM, J48, C5.0, NNET, NB and k-NN. The dataset used consisted of 1434 tweets in total. Our findings show that Support Vector Machine (SVM) was prominent in terms of accuracy (F1=0.933). Furthermore, applying McNemar’s test shows that using SVM without stemming on Colloquial Arabic is significantly better than using stemming techniques.","PeriodicalId":372822,"journal":{"name":"2017 International Conference On Social Media, Wearable And Web Analytics (Social Media)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129351138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Cultural diversity in international social public relations 国际社会公共关系中的文化多样性
2017 International Conference On Social Media, Wearable And Web Analytics (Social Media) Pub Date : 2017-06-01 DOI: 10.1109/SOCIALMEDIA.2017.8057362
Anja Corduan
{"title":"Cultural diversity in international social public relations","authors":"Anja Corduan","doi":"10.1109/SOCIALMEDIA.2017.8057362","DOIUrl":"https://doi.org/10.1109/SOCIALMEDIA.2017.8057362","url":null,"abstract":"Social media introduces substantial and pervasive changes to communication between organizations and individuals. This can now significantly impact a company’s reputation, sales, and even survival. But social media and its chances and risks are discussed in most of the existing studies as pure 1:1 relationship. The behavioural recommendations given for companies are mostly stated as universally valid within the universally identical social networks. Differences in perception and usage of social media are considered only partially. This is especially true for soft factors such as the cultural frame. As hypothesis of this paper, this cultural dimension plays an essential role in investigating the chances and boundaries of social media usage as communication and advertising instrument of companies. In this study the companies Adidas, Nike, Haier, Samsung, HTC, Huawei, Toyota, Mercedes Benz, Starbucks and Walmart are investigated in detail.","PeriodicalId":372822,"journal":{"name":"2017 International Conference On Social Media, Wearable And Web Analytics (Social Media)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129195307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ECG classification and prognostic approach towards personalized healthcare 心电图分类和个性化医疗的预后方法
2017 International Conference On Social Media, Wearable And Web Analytics (Social Media) Pub Date : 2017-06-01 DOI: 10.1109/SOCIALMEDIA.2017.8057360
Amit Walinjkar, John Woods
{"title":"ECG classification and prognostic approach towards personalized healthcare","authors":"Amit Walinjkar, John Woods","doi":"10.1109/SOCIALMEDIA.2017.8057360","DOIUrl":"https://doi.org/10.1109/SOCIALMEDIA.2017.8057360","url":null,"abstract":"A very important aspect of personalized healthcare is to continuously monitor an individual’s health using wearable biomedical devices and essentially to analyse and if possible to predict potential health hazards that may prove fatal if not treated in time. The prediction aspect embedded in the system helps in avoiding delays in providing timely medical treatment, even before an individual reaches a critical condition. Despite of the availability of modern wearable health monitoring devices, the real-time analyses and prediction component seems to be missing with these devices. The research work illustrated in this paper, at an outset, focussed on constantly monitoring an individual's ECG readings using a wearable 3-lead ECG kit and more importantly focussed on performing real-time analyses to detect arrhythmia to be able to identify and predict heart risk. Also, current research shows extensive use of heart rate variability (HRV) analysis and machine learning for arrhythmia classification, which however depends on the morphology of the ECG waveforms and the sensitivity of the ECG equipment. Since a wearable 3-lead ECG kit was used, the accuracy of classification had to be dealt with at the machine learning phase, so a unique feature extraction method was developed to increase the accuracy of classification. As a case study a very widely used Arrhythmia database (MIT-BIH, Physionet) was used to develop learning, classification and prediction models. Neuralnet fitting models on the extracted features showed mean-squared error of as low as 0.0085 and regression value as high as 0.99. Current experiments show 99.4% accuracy using k-NN Classification models and show values of Cross-Entropy Error of 7.6 and misclassification error value of 1.2 on test data using scaled conjugate gradient pattern matching algorithms. Software components were developed for wearable devices that took ECG readings from a 3-Lead ECG data acquisition kit in real time, de-noised, filtered and relayed the sample readings to the tele health analytical server. The analytical server performed the classification and prediction tasks based on the trained classification models and could raise appropriate alarms if ECG abnormalities of V (Premature Ventricular Contraction: PVC), A (Atrial Premature Beat: APB), L (Left bundle branch block beat), R (Right bundle branch block beat) type annotations in MITDB were detected. The instruments were networked using IoT (Internet of Things) devices and abnormal ECG events related to arrhythmia, from analytical server could be logged using an FHIR web service implementation, according to a SNOMED coding system and could be accessed in Electronic Health Record by the concerned medic to take appropriate and timely decisions. The system focused on ‘preventive care rather than remedial cure’ which has become a major focus of all the health care and cure institutions across the globe.","PeriodicalId":372822,"journal":{"name":"2017 International Conference On Social Media, Wearable And Web Analytics (Social Media)","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122753854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Security operations centre: situation awareness, threat intelligence and cybercrime 安全行动中心:态势感知、威胁情报和网络犯罪
2017 International Conference On Social Media, Wearable And Web Analytics (Social Media) Pub Date : 1900-01-01 DOI: 10.1109/CyberSecPODS.2017.8074844
Cyril Onwubiko
{"title":"Security operations centre: situation awareness, threat intelligence and cybercrime","authors":"Cyril Onwubiko","doi":"10.1109/CyberSecPODS.2017.8074844","DOIUrl":"https://doi.org/10.1109/CyberSecPODS.2017.8074844","url":null,"abstract":"There have been longitudinal advances in both cybersecurity and cyber-threats in recent years. With cybersecurity, for instance, there are now mechanisms to geographically locate an entity; there are those that can intercept most forms of electronic communications, and those that can recover most types of hidden images and data in electronic devices. The pace of change and advancements has equally been astronomical and astonishing. Technology refresh cycles have been slashed, and are now estimated to between 12 to 18 months, while the number of cyber users or entities has quadrupled in the last five years. These continuous changes have left an ever increasing gap between cybersecurity, that is, control mechanisms (a.k.a. safeguards) that help protect, detect, respond and recover organisational or national cyber investment, and cyber-threats, that is, threats that aim to exploit, breach or circumvent the cyber controls. This gap between cybersecurity on one hand and cyber-threats on the other hand appears to widen even further in areas with far greater financial rewards for the criminals, or nation state political gains. Exploits are now common and frequent, and impacts far much greater than before. This situation is further exacerbated by the lack of adequate and well deployed security operations centres to monitor organizational cyber investments.","PeriodicalId":372822,"journal":{"name":"2017 International Conference On Social Media, Wearable And Web Analytics (Social Media)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116801723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信