This report examines the technical challenges associated with incorporating bulk, automated analysis of social media information into procedures for vetting people seeking entry into the United States. The authors identify functional requirements and a framework for operational metrics for the proposed social media screening capabilities and provide recommendations on how to implement those capabilities.
Authorship Attribution surveys the history and present state of the discipline, presenting some comparative results where available. It also provides a theoretical and empirically-tested basis for further work. Many modern techniques are described and evaluated, along with some insights for application for novices and experts alike.
This book constitutes the proceedings of the 8th International Conference on Big Data Analytics, BDA 2020, which took place during December 15-18, 2020, in Sonepat, India. The 11 full and 3 short papers included in this volume were carefully reviewed and selected from 48 submissions; the book also contains 4 invited and 3 tutorial papers. The contributions were organized in topical sections named as follows: data science systems; data science architectures; big data analytics in healthcare; information interchange of Web data resources; and business analytics.
Sustainability and mobile computing embraces a wide range of Information and Communication Technologies [ICT] in recent times. This book focuses more on the recent research and development works in almost all the facets of sustainable, ubiquitous computing and communication paradigm. The recent research efforts on this evolving paradigm help to advance the technologies for next-generation, where socio-economic growth and sustainability poses significant challenges to the computing and communication infrastructures. The main purpose of this book is to promote the technical advances and impacts of sustainability and mobile computing to the informatics research. The key strands of this book include green computing, predictive models, mobility, data analytics, mobile computing, optimization, Quality of Service [QoS], new communicating and computing frameworks, human computer interaction, Artificial Intelligence [AI], communication networks, risk management, Ubiquitous computing, robotics, smart city and applications. The book has also addressed myriad of sustainability challenges in various computing and information processing infrastructures.
Social Media is fast becoming a key area of linguistic research. This highly accessible guidebook leads students through the process of undertaking research in order to explore the language that people use when they communicate on social media sites. This textbook provides: An introduction to the linguistic frameworks currently used to analyse language found in social media contexts An outline of the practical steps and ethical guidelines entailed when gathering linguistic data from social media sites and platforms A range of illustrative case studies, which cover different approaches, linguistic topics, digital platforms, and national contexts Each chapter begins with a clear summary of the topics covered and also suggests sources for further reading to supplement the initial discussion and case studies. Written with an international outlook, Researching Language and Social Media is an essential book for undergraduate and postgraduate students of Linguistics, Media Studies and Communication Studies.
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security.
Serious games provide a unique opportunity to engage students more fully than traditional teaching approaches. Understanding the best way to utilize games and play in an educational setting is imperative for effectual learning in the twenty-first century. Gamification: Concepts, Methodologies, Tools, and Applications investigates the use of games in education, both inside and outside of the classroom, and how this field once thought to be detrimental to student learning can be used to augment more formal models. This four-volume reference work is a premier source for educators, administrators, software designers, and all stakeholders in all levels of education.
Author-specific linguistic patterns can be objectively described and often measured, making author identification possible in many cases. This work demonstrates the validity of this claim and addresses the use of stylistic analysis for author identification and meaning interpretation.
This book is dedicated to advances in the field of user authentication. The book covers detailed description of the authentication process as well as types of authentication modalities along with their several features (authentication factors). It discusses the use of these modalities in a time-varying operating environment, including factors such as devices, media and surrounding conditions, like light, noise, etc. The book is divided into several parts that cover descriptions of several biometric and non-biometric authentication modalities, single factor and multi-factor authentication systems (mainly, adaptive), negative authentication system, etc. Adaptive strategy ensures the incorporation of the existing environmental conditions on the selection of authentication factors and provides significant diversity in the selection process. The contents of this book will prove useful to practitioners, researchers and students. The book is suited to be used a text in advanced/graduate courses on User Authentication Modalities. It can also be used as a textbook for professional development and certification coursework for practicing engineers and computer scientists.