2018 IEEE 13th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT) 2018
DOI: 10.1109/stc-csit.2018.8526635
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Specific Roles of Users of Social Networks and Their Influence Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…A definition of hub node has been proposed in [12], through the concept of node degree of graph theory. A hub node is then a central node, and in case of social networks it can show social activity [13,14,15,16,17,18]. Different definitions of social activity have been proposed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A definition of hub node has been proposed in [12], through the concept of node degree of graph theory. A hub node is then a central node, and in case of social networks it can show social activity [13,14,15,16,17,18]. Different definitions of social activity have been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…In [18], Aylani and Goyal introduce the Common Social Activity parameter, which exploits information about tags and comments sent by a user. A similar approach has been presented by Peleshchyshyn et al in [17], where several indicators have been considered for user social activity, such as the average frequency of content and the socially relevant content. Finally, Socialite [16] is a social activity mining framework, able to achieve social group discovering by exploring users' interactions.…”
Section: Introductionmentioning
confidence: 99%
“…Under current conditions, the advantage in the state's information space is gained due to the high speed of content distribution in SNS, which has a destructive information impact on actors, as well as the decentralized nature of the links between them. As a result, SNS are an effective and efficient online platform for conducting offensive actions in the national information space of the state [6][7][8][9][10][11][12][13][14]. Therefore, at the present stage of the development of information technologies and the formation of the information society, SNS has become a source of threats to the information security of the state.…”
Section: Introductionmentioning
confidence: 99%
“…Such popularity is associated with the dynamic development of tools for interacting users of SNSactors, the constant addition of their functional characteristics to new opportunities, increasing the effectiveness of interaction between actors in virtual communities, etc. [3,4]. The result of such phenomena has been the transformation of SNS into a virtual platform, which ensures the unification of all spheres of social activity and allows the involvement of different types of productive resourceslabor, financial, material, etc.…”
Section: Introductionmentioning
confidence: 99%