• Title/Summary/Keyword: Media Security

Search Result 734, Processing Time 0.031 seconds

The Impact of Snapchat and YouTube Influencers on the Consumption Behaviour of Saudi Consumers

  • Al-Ajlan, Monirah;Alsadhan, Afnan;Mirza, Abdulrahman
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.423-430
    • /
    • 2022
  • The emergence of social media platforms has changed the culture of business marketing. Their impact has increased considerably since the emergence of social media influencers or content creators. The phenomenon of social media influencers has been adopted as one of the most effective marketing strategies among global and local organizations. Those celebrities attract business owners, who seek to use them as means to reach a large number of potential consumers. Today, the user bases of Snapchat and YouTube in Saudi Arabia are growing fast and becoming very popular, unlike other social media platforms. Consequently, the impact of these applications' influencers on the purchasing habits of individuals cannot be underestimated. This survey paper intends to investigate the impact of Snapchat and YouTube influencers on the consumption behaviour of Saudi consumers. Results suggest that Snapchat is not only more popular but also more rusted and credible. Moreover, influencers' impact on purchasing behaviour is prevalent and powerful; furthermore, its influence is more effective in persuading Saudi consumers to buy certain products, such as food, than other products, like jewelry.

Monitoring People's Emotions and Symptoms after COVID-19 Vaccine

  • Najwa N. Alshahrani;Sara N. Abduljaleel;Ghidaa A. Alnefaiy;Hanan S. Alshanbari
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.202-206
    • /
    • 2023
  • Today, social media has become a vital tool. The world communicates and reaches the news and each other's opinions through social media accounts. Recently, considerable research has been done on analyzing social media due to its rich data content. At the same time, since the beginning of the COVID-19 pandemic, which has afflicted so many around the world, the search for a vaccine has been intense. There have been many studies analyzing people's feelings during a crisis. This study aims to understand people's opinions about available Coronavirus vaccines through a learning model that was developed for this purpose. The dataset was collected using Twitter's streaming Application Programming Interface (API) , then combined with another dataset that had already been collected. The final dataset was cleaned, then analyzed using Python. Polarity and subjectivity functions were used to obtain the results. The results showed that most people had positive opinions toward vaccines in general and toward the Pfizer one. Our study should help governments and decision-makers dispel people's fears and discover new symptoms linked to those listed by the World Health Organization.

Development of Security Level Evaluation Tool(ISSPET) Based on Information Security System (정보보호 시스템기반의 보안 수준 평가 도구(ISSPET) 개발)

  • Soh, Woo-Young;Kim, Wan-Kyung;Kim, Seak-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1911-1919
    • /
    • 2009
  • Currently, the evaluation technology for the security systems of risk analysis level measurement is maintained by only the developed countries including U.S and U.K, and the evaluation technology and its infrastructure are insufficient for the evaluation technology of security threat analysis level measurement in Korea. Therefore this paper presents the development of the security control items and the evaluation tool(ISSPET) for the security level performance. It is expected to evaluate the security management level of the current system and its security environment through analyzing the security management level of security systems using ISSPET.

Countermeasures against Security Threats on Smart Device in Educational Institutions (교육기관에서의 스마트단말기 보안위협에 대한 대응방안)

  • In Ho Lee;Tae-Sung Kim
    • Journal of Information Technology Services
    • /
    • v.23 no.2
    • /
    • pp.13-29
    • /
    • 2024
  • Recently, with the rapid spread of mobile terminals such as smartphones and tablet PCs, social demand for mobile information security is increasing as new security issues that are difficult to predict as well as service evolution and lifestyle changes are raised. Smart terminals include smartphones, smart pads, chromebooks, laptops, etc. that provide various functions such as phone calls, text messages, Internet browsing, social media apps, games, and education. Along with the explosive spread of these smart terminals, they are naturally being used in our daily life and educational environment. In the mobile environment, behind the convenience of portability, there are more various security threats and vulnerabilities than in the general PC environment, and threats such as device loss, information leakage, and malicious codes exist, so it is necessary to take fundamental security measures at a higher level. In this study, we suggest ways to improve security by identifying trends in mobile smart information security and effectively responding to security threats to the mobile environment. In addition, it presents implications for various measures for effective class utilization along with correct security management methods and security measures related to the supply of smart devices that the Office of Education is promoting for schools at each level.

Analyzing Gifted Students' Social Behavior on Social Media at COVID-19 Quarantine

  • Khayyat, Mashael;Sulaimani, Mona;Bukhri, Hanan;Alamiri, Faisal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.7-14
    • /
    • 2022
  • COVID-19 has caused a global disturbance, increased anxiety, and panic, eliciting diverse reactions. While its cure has not been discovered, new infection cases and fatalities are being recorded daily. The focus of the present study was to analyze the reaction of gifted undergraduate students on social media during the quarantine period of the COVID-19. A special group of gifted students, who joined the program of attracting and nurturing talents at the University of Jeddah, University students as were the target sample of this study. To analyze online reactions during the pandemic; the choice of university students was arrived at as they are perceived to be gifted academically. Hence, the analysis of the impacts on their behavior on social media use is imperative. This study presented accurate and consistent data on the effects of social media using Twitter platforms on gifted students during the quarantine occasioned by the COVID-19 pandemic. The behavior of learners due to during the use of social media was extensively explored and results analyzed. The study was carried out between April and May 2020 (quarantine period in Saudi Arabia) to establish whether the online behavior of gifted students reflects positive or negative feelings. The methods used in conducting this study the research were online interviews and scraping participants' Twitter accounts (where most of the online activities and studies take place). The study employed the Activity theory to analyze the behavior of gifted students on social media. The sample size used was 60 students, and the analysis of their behavior was based on Activity theory Overall, the results showed proactive, positive behavior for coping with a challenging situation, educating society, and entertaining. Finally, this study recommends investing in gifted students due to their valuable problem-solving skills that can help handle global pandemics efficiently.

A New Method of Object-based Tracking Modules for the Interactive Media

  • Kim, Young-Ouk;Suh, Sang-Bong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.100.1-100
    • /
    • 2001
  • With the prolific growth of cable, satellite digital broadcasting and internet related industry, new digital contents are being demanded. Today, more end-users seek participations in the media through interactivity. Visual tracking technology, based on image processing, is mainly used in fields of human face tracking, security inspection, and traffic monitoring applications. In this research, we describe the interactive modules such as information display, e1-commerce and other services along with on-screen visuals on the streaming media using object visual tracking technology. The ...

  • PDF

An Implementation of Authentication and Encryption of Multimedia Conference using H.235 Protocol (H.235 프로토콜에 의한 영상회의의 인증과 암호화 구현)

  • Sim, Gyu-Bok;Lee, Keon-Bae;Seong, Dong-Su
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.343-350
    • /
    • 2002
  • This paper describes the implementation of H.235 protocol for authentication and media stream encryption of multimedia conference systems. H.235 protocol is recommended by ITU-T for H.323 multimedia conference security protocol to prevent from being eavesdropped and modified by an illegal attacker. The implementation in this paper has used password-based with symmetric encryption authentication. Media streams are encrypted using the Diffie-Hellman key exchange algorithm and symmetric encryption algorithms such as RC2, DES and Triple-DES. Also, 128-bit Advanced Encryption Standard and 128-bit Korean standard SEED algorithms are implemented for the future extension. The implemented authentication and media stream encryption has shown that it is possible to identify terminal users without exposing personal information on networks and to preserve security of multimedia conference. Also, encryption delay time and used memory are not increased even though supporting media stream encryption/decryption, thus the performance of multimedia conference system has not deteriorated.

CYBERCRIME AS A THREAT TO UKRAINE'S NATIONAL SECURITY

  • Varenia, Nataliia;Avdoshyn, Ihor;Strelbytska, Lilia;Strelbytskyy, Mykola;Palchyk, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.73-83
    • /
    • 2021
  • The information space, the main components of which are information resources, means of information interaction, and information infrastructure, is a sphere of modern social life in which information communications play a leading role. The objective process is the gradual but stable entry of the national information space into the European and world information sphere, in the context of which there is a legitimate question of its protection as one of the components of the national security of Ukraine. However, the implementation of this issue in practice immediately faces the need to respect the rights and fundamental freedoms guaranteed by international regulations and the Constitution of Ukraine, especially in the field of cybersecurity. The peculiarity of the modern economy is related to its informational nature, which affects the sharp increase in cyber incidents in the field of information security, which is widespread and threatening and affects a wide range of private, corporate, and public interests. The problem of forming an effective information security system is exacerbated by the spread of cybercrime as a leading threat to information security both in Ukraine and around the world. The purpose of this study is to analyze the state of cybersecurity and on this basis to identify new areas of the fight against cybercrime in Ukraine. Methods: the study is based on an extensive regulatory framework, which primarily consists of regulatory acts of Ukraine. The main methods were inductions and deductions, generalizations, statistical, comparative, and system-structural analysis, grouping, descriptive statistics, interstate comparisons, and graphical methods. Results. It is noted that a very important component of Ukraine's national security is the concept of "information terrorism", which includes cyberterrorism and media terrorism that will require its introduction into the law. An assessment of the state of cybersecurity in Ukraine is given. Based on the trend analysis, further growth of cybercrimes was predicted, and ABC analysis showed the existence of problems in the field of security of payment systems. Insufficient accounting of cybercrime and the absence in the current legislation of all relevant components of cybersecurity does not allow the definition of a holistic system of counteraction. Therefore, the proposed new legal norms in the field of information security take into account modern research in the field of promising areas of information technology development and the latest algorithms for creating media content.

Implementation of a Secure VoIP System based on SIP (SIP 기반의 VoIP 보안 시스템 구현)

  • Choi, Jae-Deok;Jung, Tae-Woon;Jung, Sou-Hwan;Kim, Young-Han
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9B
    • /
    • pp.799-807
    • /
    • 2004
  • In this paper, a security mechanism for a VoIP system based on SIP was implemented. This was satisfied sec security requirement of RFC 3261. The SIP standard proposes a HTTP digest authentication for user authentication mechanism, TLS for hop-by-hop security and S/MIME for end-to-end security. SRTP draft was implemented for media security. We also analyzed security of proposed SIP standard.