The Right to Honour on Social Networks: Detection and Classifications of Users

被引:0
作者
Cordero-Gutierrez, Rebeca [1 ,2 ]
Chamoso, Pablo [1 ]
Gonzalez Briones, Alfonso [1 ]
Rivas, Alberto [1 ]
Casado-Vara, Roberto [1 ]
Manuel Corchado, Juan [1 ]
机构
[1] Univ Salamanca, BISITE Res Grp, Edificio I D I, Salamanca 37007, Spain
[2] Pontifical Univ Salamanca, Fac Comp Sci, Salamanca, Spain
来源
INTERNATIONAL JOINT CONFERENCE SOCO'18-CISIS'18- ICEUTE'18 | 2019年 / 771卷
关键词
Social networks; Right to honour; Text analytic;
D O I
10.1007/978-3-319-94120-2_9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
It is clear that social networks have come to stay. In recent years they have become the media par excellence. The users who participate in them help to spread information quickly and easily so that everyone can benefit. Users are becoming more inclined to voice their opinions, networks are willing to listen and technology has an enormous outreach. A priori, something that seems a great advantage can become a big problem when the news spread violates an individual's right to honour. This paper proposes a tool that detects and collects information from users who publish or disseminate offensive information to an individual. It establishes parameters that determine the level of damage certain individuals can make on social media and makes a ranking that is based on their characteristics and publications. This proposal is an example of the infinite possibilities that automatic data collection and processing provide us with. Without these technologies it would have been impossible to protect the rights of individuals on social networks, due to the large number of users.
引用
收藏
页码:90 / 99
页数:10
相关论文
共 50 条
  • [21] A robust method to discover influential users in social networks
    Qian Ma
    Jun Ma
    [J]. Soft Computing, 2019, 23 : 1283 - 1295
  • [22] RIGHT TO PRIVACY ON ONLINE SOCIAL NETWORKS IN COLOMBIA
    Castro Jaramillo, Angela Maria
    [J]. NOVUM JUS, 2016, 10 (01): : 113 - 133
  • [23] Anomaly Detection in Social Networks
    Giri, Vivek Kumar
    Sachdeva, Shelly
    [J]. 2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), 2019, : 698 - 703
  • [24] Using Bayesian networks with hidden variables for identifying trustworthy users in social networks
    Chen, Xu
    Yuan, Yuyu
    Orgun, Mehmet Ali
    [J]. JOURNAL OF INFORMATION SCIENCE, 2020, 46 (05) : 600 - 615
  • [25] Social networks among users of mental health day care
    Catty, J
    Goddard, K
    White, S
    Burns, T
    [J]. SOCIAL PSYCHIATRY AND PSYCHIATRIC EPIDEMIOLOGY, 2005, 40 (06) : 467 - 474
  • [26] Survey of Various Techniques for Determining Influential Users in Social Networks
    Singh, Sarabjot
    Mishra, Nishchol
    Sharma, Sanjeev
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 398 - 403
  • [27] Identifying specific roles of users of social networks and their influence methods
    Peleshchyshyn, Andriy
    Vus, Volodymyr
    Markovets, Oleksandr
    Albota, Solomiia
    [J]. 2018 IEEE 13TH INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE ON COMPUTER SCIENCES AND INFORMATION TECHNOLOGIES (CSIT), VOL 2, 2018, : 39 - 42
  • [28] Predicting Participation Shift of Users at the Next Stage in Social Networks
    Zhang, Yichao
    Wang, Zejian
    Zhuang, Huangxin
    Song, Lei
    Wen, Guanghui
    Guan, Jihong
    Zhou, Shuigeng
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2025, 12 (02): : 1066 - 1079
  • [29] MuLTI: Multiple Location Tags Inference for Users in Social Networks
    Chen, Zejia
    Yang, Jiahai
    Wang, Jessie Hui
    [J]. 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2015, : 555 - 561
  • [30] AUTrust: A Practical Trust Measurement for Adjacent Users in Social Networks
    Yin, Guangyu
    Jiang, Fan
    Cheng, Shaoyin
    Li, Xiang
    He, Xing
    [J]. SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 360 - 367