A Formal Approach to Modeling the Characteristics of Users of Social Networks Regarding Information Security Issues

被引:1
作者
Peleshchyshyn, Andriy [1 ,2 ]
Vus, Volodymyr [1 ,2 ]
Albota, Solomiia [1 ,2 ]
Markovets, Oleksandr [1 ,2 ]
机构
[1] Lviv Polytech Natl Univ, Social Commun & Informat Act Dept, Lvov, Ukraine
[2] Lviv Polytech Natl Univ, Appl Linguist Dept, Lvov, Ukraine
来源
ADVANCES IN ARTIFICIAL SYSTEMS FOR MEDICINE AND EDUCATION II | 2020年 / 902卷
关键词
Social networks; User activity; Socially significant content; Roles of users;
D O I
10.1007/978-3-030-12082-5_44
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The article focuses on formalization and identification of characteristics of users of social networks, which are treated as of great importance concerning national security. In particular, a group of individual identification data, its network identification, the state security characteristics groups are considered. Two components for describing network characteristics in terms of state security: the user activity log and social portrait have been included into the model. Characteristics that describe the level of user interaction with other users and with communities are regarded. The atomic components of the model have been reduced to the measuring values and data, which are suitable for direct storing in the relational database. A typical data model in the entity-relationship diagram format has been provided.
引用
收藏
页码:485 / 494
页数:10
相关论文
共 12 条
[1]  
El Marrakchi Mouna, 2017, International Journal of Intelligent Systems and Applications, V9, P17, DOI 10.5815/ijisa.2017.11.03
[2]  
Gururaj HL., 2018, International Journal of Education and Management Engineering, V8, P50, DOI DOI 10.5815/IJEME.2018.04.05
[3]  
Khatoon M., 2015, Int J Educ Manag Eng, V5, P8, DOI [10.5815/ijeme.2015.01.02, DOI 10.5815/IJEME.2015.01.02]
[4]  
Korzh R., 2015, WEBOLOGY, V12
[5]  
Limsaiprom Prajit, 2014, International Journal of Computer Network and Information Security, V6, P9, DOI 10.5815/ijcnis.2014.05.02
[6]  
Markovets O., 2013, E EUR J ENTERP TECHN, V3, P38
[7]  
Markovets O. V., 2015, INT J COMPUTER SCI B, V15, P36
[8]  
Meligy Ali M., 2017, International Journal of Computer Network and Information Security, V9, P31, DOI 10.5815/ijcnis.2017.01.04
[9]  
Mumtaz D., 2016, International Journal of Education and Management Engineering (IJEME), V6, P20
[10]  
Peleshchyshyn A., 2015, E EUROPEAN J EENTERP, V2/2, P27