Letteratura scientifica selezionata sul tema "Social Internet of Things (Social IoT)"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Social Internet of Things (Social IoT)".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Social Internet of Things (Social IoT)":

1

Milivojević, Sanja, e Elizabeth Radulski. "The 'Future Internet' and crime: Towards a criminology of the Internet of Things". Crimen 11, n. 3 (2020): 255–71. http://dx.doi.org/10.5937/crimen2003255m.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Internet of Things (IoT) is poised to revolutionise the way we live and communicate, and the manner in which we engage with our social and natural world. In the IoT, objects such as household items, vending machines and cars have the ability to sense and share data with other things, via wireless, Bluetooth, or Radio Frequency IDentification (RFID) technology. "Smart things" have the capability to control their performance, as well as our experiences and decisions. In this exploratory paper, we overview recent developments in the IoT technology, and their relevance for criminology. Our aim is to partially fill the gap in the literature, by flagging emerging issues criminologists and social scientists ought to engage with in the future. The focus is exclusively on the IoT while other advances, such as facial recognition technology, are only lightly touched upon. This paper, thus, serves as a starting point in the conversation, as we invite scholars to join us in forecasting-if not preventing-the unwanted consequences of the "future Internet".
2

Sowa, Grzegorz, e Alina Marchlewska. "The Internet of Things: Technological and Social Aspects". Journal of Applied Computer Science Methods 8, n. 1 (1 giugno 2016): 17–27. http://dx.doi.org/10.1515/jacsm-2016-0002.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Abstract The basic idea of is the Internet of Things is presence around us of a variety of things – such as RFID tags, sensors, actuators, mobile phones, etc. – which are able to interact with each other and cooperate with their neighbors to reach common goals. Semantic oriented IoT visions have also been proposed. The number of items involved in the future Internet is destined to become extremely high. Therefore, issues pertaining how to represent, store, interconnect, search, and organize information generated by the IoT will become very challenging. In this context, semantic technologies will play a key role. And creative approaches to visualizing data – humans are far better than computers at seeing patterns –frequently prove integral to the process of creating knowledge. From a privacy perspective, IoT is challenging because it operates in private settings, like homes, and presents an attack target that is harder to secure.
3

Bok, Kyoungsoo, Yeondong Kim, Dojin Choi e Jaesoo Yoo. "User Recommendation for Data Sharing in Social Internet of Things". Sensors 21, n. 2 (11 gennaio 2021): 462. http://dx.doi.org/10.3390/s21020462.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
As various types of data are generated on the social Internet of things (SIoT), which combine the Internet of things (IoT) and social networks, the relations of IoT devices should be established for necessary data exchange. In this paper, we propose a user recommendation scheme that facilitates data sharing through an analysis of an interaction between an IoT device and a user in the SIoT. An interrelation between a user and an IoT device as well as an interrelation between users exist simultaneously in the SIoT. Hence, the interaction between users must be analyzed to identify the interest keywords, and the interaction between IoT devices and users to determine the user’s preference of IoT device. Moreover, the proposed scheme calculates the similarity between users based on the IoT device preference based on IoT device usage frequency and interest keywords, which are identified through an analysis between the user and IoT device and that between users. Subsequently, it recommends top-N users who have a high similarity as the users for data sharing. Furthermore, the performance of the proposed scheme is verified through performance evaluation based on the precision, recall, and F-measure.
4

Bok, Kyoungsoo, Yeondong Kim, Dojin Choi e Jaesoo Yoo. "User Recommendation for Data Sharing in Social Internet of Things". Sensors 21, n. 2 (11 gennaio 2021): 462. http://dx.doi.org/10.3390/s21020462.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
As various types of data are generated on the social Internet of things (SIoT), which combine the Internet of things (IoT) and social networks, the relations of IoT devices should be established for necessary data exchange. In this paper, we propose a user recommendation scheme that facilitates data sharing through an analysis of an interaction between an IoT device and a user in the SIoT. An interrelation between a user and an IoT device as well as an interrelation between users exist simultaneously in the SIoT. Hence, the interaction between users must be analyzed to identify the interest keywords, and the interaction between IoT devices and users to determine the user’s preference of IoT device. Moreover, the proposed scheme calculates the similarity between users based on the IoT device preference based on IoT device usage frequency and interest keywords, which are identified through an analysis between the user and IoT device and that between users. Subsequently, it recommends top-N users who have a high similarity as the users for data sharing. Furthermore, the performance of the proposed scheme is verified through performance evaluation based on the precision, recall, and F-measure.
5

Hemmati, Mahdi. "Analyzing the Effect of Social Internet of Things on Making the Internet Marketing Smart". Modern Applied Science 10, n. 9 (20 luglio 2016): 213. http://dx.doi.org/10.5539/mas.v10n9p213.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The development of social internet of things in recent years led to widening the data and information scope. A wide scope of new services caused by this procedure. In this regard, a new pattern called the social internet of things is created by integrating the social network and internet of things (IOT) which shows the network communication of things. IOS can put a step toward the marketing world. In this paper, the effect of IoT on internet marketing and making it smart are taken into consideration by considering marketing in human social network.
6

H. Dutton, William. "Putting things to work: social and policy challenges for the Internet of things". info 16, n. 3 (6 maggio 2014): 1–21. http://dx.doi.org/10.1108/info-09-2013-0047.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Purpose – This paper aims to provide a critical assessment of the Internet of things (IoT) and the social and policy issues raised by its development. While the Internet will continue to become ever more central to everyday life and work, there is a new but complementary vision for an IoT, which will connect billions of objects – “things” like sensors, monitors, and radio-frequency identification devices – to the Internet at a scale that far outstrips use of the Internet as we know it, and will have enormous social and economic implications. Design/methodology/approach – It is based on a review of literature and emerging developments, including synthesis of a workshop and discussions within a special interest group on the IoT. Findings – Nations can harvest the potential of this wave of innovation not only for manufacturing but also for everyday life and work and the development of new information and services that will change the way we do things in many walks of life. However, its success is not inevitable. Technical visions will not lead inexorably to successful public and private infrastructures that support the vitality of an IoT and the quality of everyday life and work. In fact, the IoT could undermine such core values as privacy, equality, trust and individual choice if not designed, implemented and governed in appropriate ways. Research limitations/implications – There is a need for more multi-disciplinary research on the IoT. Practical implications – Policymakers and opinion formers need to understand the IoT and its implications. Social implications – If the right policies and business models are developed, the IoT will stimulate major social, economic and service innovations in the next years and decades. Originality/value – This paper pulls together discussions and literature from a social science perspective, as one means to enable more multidisciplinary studies of emerging developments.
7

Hamed M. Almalki. "The impact of social media, big data and IOT on the supply chain management performance". Global Journal of Engineering and Technology Advances 12, n. 3 (30 settembre 2022): 067–76. http://dx.doi.org/10.30574/gjeta.2022.12.3.0163.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The development of Industry 4.0, a new digital industrial technology, has a favorable effect on how well the supply chain functions. Big Data, Social Media, and the Internet of Things (IoT) have all been proposed as ways to enhance supply chain performance. Although there has been limited exploratory research in this area, the favorable impact of the Internet of Things (IoT), Social Media, and Big Data on Supply Chain on supply chain and company performance has been empirically confirmed. How the logistics sector is being impacted by Big Data, IoT, and Social Media from a business and customer perspective? Can the Supply Chain be managed and controlled more effectively because of the integration of social media and ICT? Does Supply chain management get better with the incorporation of information and communication technology? The initial goal of this study is to demonstrate the connection that already exists between supply chain management, social media, big data, and the internet of things. Second, we'll discuss how the integration of social media, big data, and the internet of things has affected the sustainability, efficiency, and various flows of supply chain management.
8

Shin, Taehwan, e Jinsung Byun. "Design and Implementation of a Vehicle Social Enabler Based on Social Internet of Things". Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/4102163.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In recent years, the combination of novel context-aware systems with the Internet of Things (IoT) has received great attention with the advances in network and context-awareness technologies. Various context-aware consumer electronics based on IoT for intelligent and personalized user-centric services have been introduced. However, although the paradigm of the IoT has evolved from smart objects into social objects, the existing context-aware systems have not reflected the changes in these paradigms well. Therefore, this paper proposes a social enabler (S-Enabler) in order to overcome this limitation. The S-Enabler plays an important role in converting the existing objects into social objects. This paper presents the middleware architecture and cooperation processes for a social IoT-based smart system. In this paper, the S-Enabler is designed to be applied to a vehicle and an energy saving service is introduced by using the S-Enabler. The proposed energy saving service can reduce energy consumption and fuel consumption based on social behaviors such as sharing or competition. The performance of the S-Enabler is discussed through a simple vehicle service scenario. The experimental results show that the S-Enabler reduced fuel consumption by up to 31.7%.
9

Komarov, Mikhail, Nikita Konovalov e Nikolay Kazantsev. "How Internet of Things Influences Human Behavior Building Social Web of Services via Agent-Based Approach". Foundations of Computing and Decision Sciences 41, n. 3 (1 settembre 2016): 197–210. http://dx.doi.org/10.1515/fcds-2016-0012.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
AbstractThe paper discovers potential human interactions with growing amount of internet of things (IoT) via proposed concept of Social Web of Services (classical social web with smart things - daily life objects connected to the internet). To investigate the impact of IoT on user behaviour patterns we modelled human-thing interactions using agent-based simulation (ABM). We have proved that under certain conditions SmartThings, connected to the IoT, are able to change patterns of Human behaviour. Results of this work predict our way of living in the era of caused by viral effects of IoT application (HCI and M2M connections), and could be used to foster business process management in the IoT era.
10

Gao, Yunpeng, e Nan Zhang. "Social Security and Privacy for Social IoT Polymorphic Value Set: A Solution to Inference Attacks on Social Networks". Security and Communication Networks 2019 (28 agosto 2019): 1–16. http://dx.doi.org/10.1155/2019/5498375.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Social Internet of Things (SIoT) integrates social network schemes into Internet of Things (IoT), which provides opportunities for IoT objects to form social communities. Existing social network models have been adopted by SIoT paradigm. The wide distribution of IoT objects and openness of social networks, however, make it more challenging to preserve privacy of IoT users. In this paper, we present a novel framework that preserves privacy against inference attacks on social network data through ranked retrieval models. We propose PVS, a privacy-preserving framework that involves the design of polymorphic value sets and ranking functions. PVS enables polymorphism of private attributes by allowing them to respond to different queries in different ways. We begin this work by identifying two classes of adversaries, authenticity-ignorant adversary, and authenticity-knowledgeable adversary, based on their knowledge of the distribution of private attributes. Next, we define the measurement functions of utility loss and propose PVSV and PVST that preserve privacy against authenticity-ignorant and authenticity-knowledgeable adversaries, respectively. We take into account the utility loss of query results in the design of PVSV and PVST. Finally, we show that PVSV and PVST meet the privacy guarantee with acceptable utility loss in extensive experiments over real-world datasets.

Tesi sul tema "Social Internet of Things (Social IoT)":

1

NITTI, MICHELE. "Managing the Internet of Things based on its Social Structure". Doctoral thesis, Università degli Studi di Cagliari, 2014. http://hdl.handle.net/11584/266422.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Society is moving towards an “always connected” paradigm, where the Internet user is shifting from persons to things, leading to the so called Internet of Things (IoT) scenario. The IoT vision integrates a large number of technologies and foresees to embody a variety of smart objects around us (such as sensors, actuators, smartphones, RFID, etc.) that, through unique addressing schemes and standard communication protocols, are able to interact with each Others and cooperate with their neighbors to reach common goals [2, 3]. IoT is a hot research topic, as demonstrated by the increasing attention and the large worldwide investments devoted to it. It is believed that the IoT will be composed of trillions of elements interacting in an extremely heterogeneous way in terms of requirements, behavior and capabilities; according to [4], by 2015 the RIFD devices alone will reach hundreds of billions. Unquestionably, the IoT will pervade every aspect of our world and will have a huge impact in our everyday life: indeed, as stated by the US National Intelligence Council (NIC) [5], “by 2025 Internet nodes may reside in everyday things − food packages, furniture, paper documents, and more”. Then, communications will not only involve persons but also things thus bringing about the IoT environment in which objects will have virtual counterparts on the Internet. Such virtual entities will produce and consume services, collaborate toward common goals and should be integrated with all the other services. One of the biggest challenges that the research community is facing right now is to be able to organize such an ocean of devices so that the discovery of objects and services is performed efficiently and in a scalable way. Recently, several attempts have been made to apply concepts of social networking to the IoT. There are scientific evidences that a large number of individuals tied in a social network can provide far more accurate answers to complex problems than a single individual (or a small group of – even knowledgeable – individuals) [1]. The exploitation of such a principle, applied to smart objects, has been widely investigated in Internet-related researches. Indeed, several schemes have been proposed that use social networks to search Internet resources, to route traffic, or to select effective policies for content distribution. The idea that the convergence of the “Internet of Things” and the “Social Networks” worlds, which up to now were mostly kept separate by both scientific and industrial communities, is possible or even advisable is gaining momentum very quickly. This is due to the growing awareness that a “Social Internet of Things” (SIoT) paradigm carries with it many desirable implications in a future world populated by objects permeating the everyday life of human beings. Therefore, the goal of this thesis is to define a possible architecture for the SIoT, which includes the functionalities required to integrate things into a social network, and the needed strategies to help things to create their relationships in such a way that the resulting social network is navigable. Moreover, it focuses on the trustworthiness management, so that interaction among objects that are friends can be done in a more reliable way and proposes a possible implementation of a SIoT network. Since this thesis covers several aspects of the Social internet of Things, I will present the state of the art related to the specific research activities at the beginning of every Chapter. The rest of the thesis is structured as follows. In Chapter 1, I identify appropriate policies for the establishment and the management of social relationships between objects, describe a possible architecture for the IoT that includes the functionalities required to integrate things into a social network and analyze the characteristics of the SIoT network structure by means of simulations. Chapter 2 addresses the problem of the objects to manage a large number of friends, by analyzing possible strategies to drive the objects to select the appropriate links for the benefit of overall network navigability and to speed up the search of the services. In Chapter 3, I focus on the problem of understanding how the information provided by members of the social IoT has to be processed so as to build a reliable system on the basis of the behavior of the objects and define two models for trustworthiness management starting from the solutions proposed for P2P and social networks. Chapter 4 presents an implementation of a SIoT platform and its major functionalities: how to register a new social object to the platform, how the system manages the creation of new relationships, and how the devices create groups of members with similar characteristics. Finally, in Chapter 5, conclusions will be drawn regarding the effectiveness of the proposed Introduction 3 algorithms, and some possible future works will be sketched
2

Ebrahiem, Waleed, e Naveed Arif. "Internet of Things : How vendors can use IoT to achieve value creation". Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-144582.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The IoT (Internet of Things) is developing rapidly, as a result of that, the number of connected devices in Sweden has doubled every year. According to big companies like Ericsson, the estimated number of connected devices worldwide will be 50 billion in 2020. IoT, by itself, may be a relatively simple concept of connected devices and machines, but its implications are profound. For companies in Sweden which offer a broad range of non-connected tools and products, it is becoming increasingly important to adapt their products to IoT; adherence to IoT will warrant new developments which offer value-added services such as monitoring and remote control, etc. The primary research method employed for this thesis is a case study at a vendor company who today offers their customers non-connected tools. To be able to demonstrate the concept of IoT enhanced tools we create a conceptual framework and a prototype, which we present to our interviewees and use as a starting point for qualitative interviews. In this thesis, we want to know how vendors could benefit themselves by the use of IoT in their businesses. We formulated some research questions, being, based on a vendor’s perspective: why do they (vendors) need connected products; how can such products be made marketable to the customer; and what are the predicted benefits of IoT-connected products for the customers? The case study brings to light some issues dealing with the business model, service providing, data display and data security which every company should take into consideration before implementing IoT.
3

Johansson, Fredrik, e Martin Göthe. "Internet of Things, bekvämt, men säkert? : En studie kring säkerhetsaspekter inom IoT". Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-135063.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The new technological phenomenon Internet of Things (IoT) is steadily growing and has become more incorporated into our daily lives. The technology can be found in a variety of applications in today's society and has helped to simplify and streamline tasks and processes. Analysts estimate that the market for IoT could potentially be worth 11 billion dollars by 2025. Large technology corporations are spending a vast amount of money to promote their IoT products, but we are also seeing companies which normally are not associated with IT making an entrance to make their products connected. During the fall of 2016 media reported about a big security breach within the IoT that affected security cameras and forced them to commit denial of service attacks. This event led us to take a closer look at the IoT and the security around the products. The aim of this study is to investigate how developers and security experts working with IoT perceive the current state of security and the possible threats and risks we face when using the technology. For this study we have used a qualitative approach with semi-structured interviews. A total of eight interviews were conducted equally divided between developers and security experts. Our results show that a common denominator between the respondents' answers was that the lack of standardization and platforms for IoT-applications is a problem. However, a unified security solution is currently unattainable due to the vast number of platforms present in IoT today. Therefore, the use of a standard or platform does not guarantee security. Also, with the increasing popularity of IoT, products from developers without the proper knowledge is becoming a serious security concern for the IoT.
4

Laya, Andrés. "The Internet of Things in Health, Social Care, and Wellbeing". Doctoral thesis, KTH, Radio Systems Laboratory (RS Lab), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-212548.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Internet of Things (IoT) enables opportunities to remotely sense and control objects via communication networks. We study services based on connected devices and the collaboration they generate between the ICT and the Health, Social Care and Wellbeing (HSCWB) industries. In HSCWB, IoT can support a change from episodic treatments of illness to preventive care and wellbeing solutions. The IoT can be a supporter in cost efficient and high quality health care. The objective is to achieve healthier life years and more efficiency in health and social care. Even if the potential of IoT in HSCWB has been proven in pilot projects and small-scale solutions, the benefits and opportunities for many actors are still unclear. There is a research gap in studying the roles and business opportunities for market-driven technology-based solutions enabled by connected devices. The research approach separates technological and business domains. On the technology side, the focus is on advances in connectivity for IoT. We present the technical details on a limitation to support IoT devices in cellular networks. We quantify the limitations in the Random Access Channel of the LTE air interface to support IoT devices. Moreover, we propose the adaptation of an access mechanism to enable massive number of simultaneous access attempt in cellular networks. On the business side, we identify and present how the conditions of the health and social care structure in Sweden affect the establishment of IoT solutions in HSCWB. We then show how these conditions have generated three distinctive development patterns—to innovate within the public sector, to develop solutions in the private care sector, or to target the wellbeing sector to avoid regulatory setbacks. Based on these patterns, we look closer into study cases to show how business opportunities have been addressed from a business network perspective. When deploying an IoT service, not all critical challenges can be appreciated at a single firm level. Therefore, we rely on a network-level business model framework to analyze emerging IoT services in HSCWB. The findings suggest that IoT components can improve an existing service by automating internal working processes, or they can enable new value propositions and convenience to end users. In general terms, the collaboration can be used (i) to improve the efficiency of existing services in health and social care without an original intention to change the service offering, or (ii) to create novelty and differentiation, without affecting the internal logics of existing HSCWB services.

QC 20180828


IoT Ecosystems (VINNOVA)
COIN-SWEAT
MTC2020
M2MRISE
5

Hussein, Ali Dina. "A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds". Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024/document.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Récemment, l'intégration entre les environnements informatiques et de réseautage a été largement promu pour fournir des services intelligents à des utilisateurs finaux ainsi que l'utilisation efficace des ressources. Cette convergence a ouvert la voie à l'émergence de l'internet des objets (IdO). Le paradigme de l'IdO repose principalement sur la fabrication d'objets, appelés les choses, disparaître et se tissent dans le tissu de notre vie de tous les jours pour nous soutenir dans l'accomplissement des activités quotidiennes. L'évolutivité et l'hétérogénéité sont parmi les principaux défis qui entravent la réalisation à grande échelle de services de l'IdO dans la vie quotidienne des utilisateurs. Afin de relever les défis de l'IdO, un nouveau volet de recherche est venu en avant dans la littérature comme une classe paradigmatique des Cyber-physiques systèmes sociaux (CSPR), qui est connu comme l'Internet social des choses (Siot). Le SIOT se fonde sur la notion soulignée par phénomène petite-monde où la structure sociale permettant relation sociale fondée sur la confiance entre les personnes et les objets, d'une manière qui ressemble à des services de réseaux sociaux traditionnels (SNS) est suggérée de relever les défis de l'IdO. Cependant, depuis SIOT hérite des caractéristiques de différents informatiques et de réseautage environnements (par exemple, l'IdO et SNS) cela, en fait, augmente la quantité et la variété des données contextuelles qui doit être manipulé pour Adaptive fourniture de services dans Siot, qui agit comme le principal défi adressé dans cette thèse. Autrement dit, dans cette thèse, nous proposons la notion de contexte cognitif lorsque, dans certaine situation spatio-temporelle, le raisonnement sur les aspects objectifs du cadre, ce qui représente l'environnement physique, avec le contexte subjective, qui représente les aspects comportementaux et sociaux, est considéré comme l'amélioration des services SIOT intelligence et la capacité d'adaptation aux besoins conjoncturels des utilisateurs. Nous envisageons technologies du Web sémantique pour déployer notre contexte cognitif proposé dans deux domaines d'application; sensible au contexte recommandation des tâches quotidiennes dans les maisons intelligentes et structure sociale dépendant de la situation des choses. Un prototype de preuve de concept a été développé pour chaque domaine d'application, dans le but de démontrer l'intégration harmonieuse des objets sur le Web pour la réalisation de certaines applications. Nos résultats empiriques montrent un niveau de service amélioré l'adaptabilité et la complexité en temps de fonctionner lors de l'application de notre contexte cognitif suggéré
The paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
6

Hussein, Ali Dina. "A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Récemment, l'intégration entre les environnements informatiques et de réseautage a été largement promu pour fournir des services intelligents à des utilisateurs finaux ainsi que l'utilisation efficace des ressources. Cette convergence a ouvert la voie à l'émergence de l'internet des objets (IdO). Le paradigme de l'IdO repose principalement sur la fabrication d'objets, appelés les choses, disparaître et se tissent dans le tissu de notre vie de tous les jours pour nous soutenir dans l'accomplissement des activités quotidiennes. L'évolutivité et l'hétérogénéité sont parmi les principaux défis qui entravent la réalisation à grande échelle de services de l'IdO dans la vie quotidienne des utilisateurs. Afin de relever les défis de l'IdO, un nouveau volet de recherche est venu en avant dans la littérature comme une classe paradigmatique des Cyber-physiques systèmes sociaux (CSPR), qui est connu comme l'Internet social des choses (Siot). Le SIOT se fonde sur la notion soulignée par phénomène petite-monde où la structure sociale permettant relation sociale fondée sur la confiance entre les personnes et les objets, d'une manière qui ressemble à des services de réseaux sociaux traditionnels (SNS) est suggérée de relever les défis de l'IdO. Cependant, depuis SIOT hérite des caractéristiques de différents informatiques et de réseautage environnements (par exemple, l'IdO et SNS) cela, en fait, augmente la quantité et la variété des données contextuelles qui doit être manipulé pour Adaptive fourniture de services dans Siot, qui agit comme le principal défi adressé dans cette thèse. Autrement dit, dans cette thèse, nous proposons la notion de contexte cognitif lorsque, dans certaine situation spatio-temporelle, le raisonnement sur les aspects objectifs du cadre, ce qui représente l'environnement physique, avec le contexte subjective, qui représente les aspects comportementaux et sociaux, est considéré comme l'amélioration des services SIOT intelligence et la capacité d'adaptation aux besoins conjoncturels des utilisateurs. Nous envisageons technologies du Web sémantique pour déployer notre contexte cognitif proposé dans deux domaines d'application; sensible au contexte recommandation des tâches quotidiennes dans les maisons intelligentes et structure sociale dépendant de la situation des choses. Un prototype de preuve de concept a été développé pour chaque domaine d'application, dans le but de démontrer l'intégration harmonieuse des objets sur le Web pour la réalisation de certaines applications. Nos résultats empiriques montrent un niveau de service amélioré l'adaptabilité et la complexité en temps de fonctionner lors de l'application de notre contexte cognitif suggéré
The paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
7

Åkerlund, Mathilda. "IoT on Twitter : A Mixed Methods Study". Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-149232.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Lundgren, Emil, e Markus Karmehag. "SAMBANDET MELLAN AUTONOMI OCH IoT-LÖSNINGAR I EN LINJEORGANISATION". Thesis, Umeå universitet, Institutionen för informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-173342.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The 4th phase of the industrial revolution is focused on the relationship between the humans and the machines and how they can collaborate. We are going to look deeper into the relationship between autonomy and IoT-based solutions in a line organization with the help of a case study. In this case study, we discovered that the industry and their workers will benefit from using IoT-solutions to maintain more competitiveness to the market. With the use of IoT- based solutions such as a digital Dashboard, they get more reliable information and better ways of communication within the organization. Our study emphasizes the necessity of improving the autonomy within an industrial workplace. The personnel in an organization will be able to use IoTin a way to get more creative, gain more responsibility, keep a higher level of quality and make the work procedures more efficient.
9

Davids, Natheer. "The Privacy Paradox: Factors influencing information disclosure in the use of the Internet of Things (IoT) in South Africa". Master's thesis, Faculty of Commerce, 2021. http://hdl.handle.net/11427/32636.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Internet of Things (IoT) has been acknowledged as one of the most innovative forms of technology since the computer, because of the influence it can have on multiple sectors of physical and virtual environments. The growth of IoT is expected to continue, by 2020 the number of connected devices is estimated to reach 50 billion. Recent developments in IoT provide an unprecedented opportunity for personalised services and other benefits. To exploit these potential benefits as best as possible, individuals are willing to provide their personal information despite potential privacy breaches. Therefore, this paper examines factors that influence the willingness to disclose personal information in the use of IoT in South Africa (SA) with the use of the privacy calculus as the theoretical underpinnings of this research. The privacy calculus accentuates that a risk-benefit trade off occurs when an individual decides to disclose their personal information, however, it is assumed that there are more factors than perceived risks and perceived benefits that influence information disclosure. After analysing previous literature, this study identified the following factors; information sensitivity, privacy concerns, social influence, perceived benefits, (perceived) privacy risks and privacy knowledge as possible key tenants in relation to willingness to disclose personal information. This research took on an objective ontological view, with the underlying epistemological stance being positivistic. The research incorporated a deductive approach, employing the use of a conceptual model which was constructed from a combination of studies orientated around privacy, the privacy calculus and the privacy paradox. Data for this research was collected using the quantitative research approach, through the use of an anonymous online questionnaire, where the targeted population was narrowed down to the general public residing within SA that make use of IoT devices and/or services. Data was collected using Qualtrics and analysed using SmartPLS 3. SmartPLS 3 was used to test for correlations between the factors which influence information disclosure in the use of IoT by utilising the complete bootstrapping method. A key finding was that the privacy paradox is apparent within SA, where individuals pursue enjoyment and predominantly use IoT for leisure purposes, while individuals are more likely to adopt self-withdrawal tendencies when faced with heightened privacy concerns or potential risks.
10

Masmoudi, Mariam. "Prévention des attaques de confiance en temps réel dans l'IoT social". Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
L'IoT social est un nouveau paradigme qui améliore la navigabilité des réseaux IoT et stimule la découverte de services en intégrant les contextes sociaux. Néanmoins, ce paradigme est confronté à plusieurs défis qui réduisent la qualité de ses performances. La confiance, en particulier les attaques de confiance, est l'un des défis les plus importants. Certains utilisateurs adoptent des comportements malveillants et lancent des attaques pour propager des services malveillants. Un mécanisme de gestion de la confiance est devenu une exigence majeure dans l'IoT social pour prévenir ces attaques en temps réel et garantir des expériences dignes de confiance pour les utilisateurs finaux. Cependant, peu de travaux ont abordé les questions de gestion de la confiance pour prévenir les attaques de confiance dans les environnements de l'IoT social. La plupart des études ont été menées pour détecter les attaques en mode hors ligne avec ou sans spécification du type d'attaque réalisée. En outre, elles n'ont pas pris en compte les propriétés de sécurité, telles que la cryptographie, la transparence et l'immutabilité, etc. A cet égard, nous devons traiter les transactions en continu pour prévenir ces attaques au niveau de la génération des transactions en temps réel tout en maintenant les propriétés de sécurité. Pour ce faire, nous avons comparé les techniques et technologies utilisées précédemment, dont le point commun est la prévention des attaques dans les contextes sociaux et l'IoT. Sur la base de ces comparaisons, nous avons indiqué que la technologie blockchain peut aider à développer un mécanisme de gestion de la confiance qui peut prévenir les attaques de confiance tout en maintenant la sécurité. Pour le temps réel, nous avons proposé de combiner un moteur de traitement de flux distribué, connu sous le nom d'Apache Spark, avec la technologie blockchain. Notre choix est basé sur une comparaison des moteurs de traitement de flux de données open source. En conséquence, nous proposons un nouveau mécanisme de gestion de la confiance, basé sur la blockchain et Apache Spark. Ce mécanisme permet de prévenir en temps réel tous les types d'attaques de confiance effectuées par des nœuds malveillants, afin d'obtenir un environnement fiable. L'expérimentation réalisée sur un jeu de données réelles nous permet de prouver la performance de notre proposition
The social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition

Libri sul tema "Social Internet of Things (Social IoT)":

1

Soro, Alessandro, Margot Brereton e Paul Roe, a cura di. Social Internet of Things. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-94659-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

H L, Gururaj, Pramod H B e Gowtham M. Advances in SIoT (Social Internet of Things). Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003282990.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Kumar Pani, Santosh, e Manjusha Pandey, a cura di. Internet of Things: Enabling Technologies, Security and Social Implications. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8621-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Hassanien, Aboul Ella, Roheet Bhatnagar, Nour Eldeen M. Khalifa e Mohamed Hamed N. Taha, a cura di. Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-24513-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Brogan, Chris. The impact equation: Are you making things happen or just making noise? New York: Portfolio/Penguin, 2012.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Dependable IoT for Human and Industry: Modeling, Architecting, Implementation. River Publishers, 2019.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Kor, Ah-Lian, Andrzej Rucinski e Vyacheslav Kharchenko. Dependable IoT for Human and Industry: Modeling, Architecting, Implementation. River Publishers, 2019.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Kor, Ah-Lian, Andrzej Rucinski e Vyacheslav Kharchenko. Dependable IoT for Human and Industry: Modeling, Architecting, Implementation. River Publishers, 2022.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Kor, Ah-Lian, Andrzej Rucinski e Vyacheslav Kharchenko. Dependable IoT for Human and Industry: Modeling, Architecting, Implementation. River Publishers, 2022.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Ravulavaru, Arvind. Enterprise Internet of Things Handbook: Build end-to-end IoT solutions using popular IoT platforms. Packt Publishing, 2018.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Capitoli di libri sul tema "Social Internet of Things (Social IoT)":

1

Zamanifar, Azadeh. "Social IoT Healthcare". In Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications, 1–11. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24513-9_1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Panda, G. K., B. K. Tripathy e M. K. Padhi. "Evolution of Social IoT World: Security Issues and Research Challenges". In Internet of Things (IoT), 77–98. Boca Raton : Taylor & Francis, CRC Press, 2018.: CRC Press, 2017. http://dx.doi.org/10.1201/9781315269849-5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Briante, Orazio, Franco Cicirelli, Antonio Guerrieri, Antonio Iera, Alessandro Mercuri, Giuseppe Ruggeri, Giandomenico Spezzano e Andrea Vinci. "A Social and Pervasive IoT Platform for Developing Smart Environments". In Internet of Things, 1–23. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96550-5_1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Kosmides, Pavlos, Chara Remoundou, Ioannis Loumiotis, Evgenia Adamopoulou e Konstantinos Demestichas. "Introducing Community Awareness to Location-Based Social Networks". In Internet of Things. IoT Infrastructures, 125–30. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19743-2_19.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Kumar, Jitendra, e Mukesh Kumar. "Analysis of Cascading Behavior in Social Networks and IoT". In Industrial Internet of Things, 173–88. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003145004-10.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Liu, Can, Mara Balestrini e Giovanna Nunes Vilaza. "From Social to Civic: Public Engagement with IoT in Places and Communities". In Internet of Things, 185–210. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94659-7_10.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Podlaski, Krzysztof, Artur Hłobaż e Piotr Milczarski. "Secure Data Exchange Based on Social Networks Public Key Distribution". In Internet of Things. IoT Infrastructures, 52–63. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47063-4_5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Girau, Roberto, Salvatore Martis e Luigi Atzori. "A Cloud-Based Platform of the Social Internet of Things". In Internet of Things. IoT Infrastructures, 77–88. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47063-4_7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Ambrosio, João, Artur M. Arsenio e Orlando Remédios. "Learning About Animals and Their Social Behaviors for Smart Livestock Monitoring". In Internet of Things. IoT Infrastructures, 493–503. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47075-7_53.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Cotronei, Mariantonia, Sofia Giuffrè, Attilio Marcianò, Domenico Rosaci e Giuseppe M. L. Sarnè. "Detecting Collusive Agents by Trust Measures in Social IoT Environments: A Novel Reputation Model". In Internet of Things, 43–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21940-5_3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Social Internet of Things (Social IoT)":

1

Bernal Bernabe, Jorge, Ignacio Elicegui, Etienne Gandrille, Nenad Gligoric, Alex Gluhak, Christine Hennebert, Jose L. Hernandez-Ramos et al. "SocIoTal — The development and architecture of a social IoT framework". In 2017 Global Internet of Things Summit (GIoTS). IEEE, 2017. http://dx.doi.org/10.1109/giots.2017.8016286.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Okada, Miyo, Atsuro Ueki, Niclas Jonasson, Masato Yamanouchi, Cristian Norlin, Hideki Sunahara, Joakim Formo, Mikael Anneroth e Masa Inakage. "Autonomous Cooperation of Social Things". In IoT'16: The 6th International Conference on the Internet of Things. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2991561.2991574.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Nitti, Michele, Luigi Atzori e Irena Pletikosa Cvijikj. "Network navigability in the social Internet of Things". In 2014 IEEE World Forum on Internet of Things (WF-IoT). IEEE, 2014. http://dx.doi.org/10.1109/wf-iot.2014.6803200.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Izadi, Saeed, Mahnaz Izadi, Golshid Ranjbaran e Elham Ghasemi. "Enhancing Social Network Security: A Dynamic Approach for Detecting and Mitigating Social Spam". In 2023 7th International Conference on Internet of Things and Applications (IoT). IEEE, 2023. http://dx.doi.org/10.1109/iot60973.2023.10365355.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Saleem, Yasir, Noel Crespi, Mubashir Husain Rehmani, Rebecca Copeland, Dina Hussein e Emmanuel Bertin. "Exploitation of social IoT for recommendation services". In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, 2016. http://dx.doi.org/10.1109/wf-iot.2016.7845500.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Maheswaran, Muthucumaru, e Sridipta Misra. "Towards a social governance framework for Internet of Things". In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389156.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Butt, Talal Ashraf. "Edge Intelligence based Social Internet of Things for Smart Cities". In ICIT 2022: IoT and Smart City. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3582197.3582229.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Beltran, Victoria, Antonio M. Ortiz, Dina Hussein e Noel Crespi. "A semantic service creation platform for Social IoT". In 2014 IEEE World Forum on Internet of Things (WF-IoT). IEEE, 2014. http://dx.doi.org/10.1109/wf-iot.2014.6803173.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Van Anh Duong, Dat, e Seokhoon Yoon. "A social relationship-aware mobility model". In 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). IEEE, 2018. http://dx.doi.org/10.1109/wf-iot.2018.8355150.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Nitti, Michele, Virginia Pilloni e Daniele D. Giusto. "Searching the social Internet of Things by exploiting object similarity". In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, 2016. http://dx.doi.org/10.1109/wf-iot.2016.7845506.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Social Internet of Things (Social IoT)":

1

Solovyanenko, Nina I. Legal features of innovative (digital) entrepreneurship in the agricultural and food sector. DOI CODE, 2021. http://dx.doi.org/10.18411/0131-5226-2021-70008.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Modern agricultural production and food trade are involved in the process of digital transformation, which is a cardinal factor of sustainable development and is carried out on the basis of IT platforms, the Internet of Things, cloud computing, big data, artificial intelligence, blockchain technologies. The COVID-19 pandemic has increased the dependence of these sectors of the economy on information and communication technology infrastructure and services. At the same time, the slow updating of legislation, which lags behind the constantly improving digital technologies, not only hinders their implementation, but also is a source of a number of social and legal problems. A modern regulatory framework based on digital strategies should strengthen "smart agriculture". In Russia, the legal mechanism of digital transformation and development of the national platform "Digital Agriculture" should be supported by updated basic legislation.
2

Roberts, Tony, Judy Gitahi, Patrick Allam, Lawrence Oboh, Oyewole Oladapo, Gifty Appiah-Adjei, Amira Galal et al. Mapping the Supply of Surveillance Technologies to Africa: Case Studies from Nigeria, Ghana, Morocco, Malawi, and Zambia. Institute of Development Studies, settembre 2023. http://dx.doi.org/10.19088/ids.2023.027.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
African governments are spending over 1US$bn per year on digital surveillance technologies which are being used without adequate legal protections in ways that regularly violate citizens’ fundamental human rights. This report documents which companies, from which countries, are supplying which types of surveillance technology to African governments. Without this missing detail, it is impossible to adequately design measures to mitigate and overcome illegal surveillance and violations of human rights. Since the turn of the century, we have witnessed a digitalisation of surveillance that has enabled the algorithmic automation of surveillance at a scale not previously imaginable. Surveillance of citizens was once a labour and time-intensive process. This provided a practical limit to the scope and depth of state surveillance. The digitalisation of telephony has made it possible to automate the search for keywords across all mobile and internet communications. For the first time, state surveillance agencies can do two things: (a) conduct mass surveillance of all citizens’ communications, and (b) micro-target individuals for in-depth surveillance that draws together in real-time data from mobile calls, short message service (SMS), internet messaging, global positioning system (GPS) location, and financial transactions. This report was produced by qualitative analysis of open-source data in the public domain. The information presented is drawn from a diverse range of sources, including open government data sets, export licence portals, procurement notices, civil society databases of surveillance contracts, press releases from surveillance companies, academic articles, reports, and media coverage. The research is organised using a typology of five categories of surveillance technology. We did not set out to detail every technology available, every company, or every supply contract. Instead, we document the main companies and countries selling digital surveillance technologies to African governments. Rather than focus on the technical functionality distinguishing each product offering, we highlight five of the most important types of surveillance technology: internet interception, mobile interception, social media surveillance, ‘safe city’ technologies for the surveillance of public spaces, and biometric identification technologies.
3

Collyer, Michael, Tahir Zaman e Dolf te Lintelo. Displacement and Social Assistance. Institute of Development Studies (IDS), febbraio 2022. http://dx.doi.org/10.19088/basic.2022.029.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Displacement forms part of virtually any major crisis. It introduces a level of complexity when providing social assistance that leads to a specific, usually context-dependent set of challenges. It is widely recognised that the vast majority of displaced people will travel as short a distance as possible to reach safety, whether as Internally Displaced Persons (IDPs), refugees or irregular migrants in neighbouring countries. Displaced people are disproportionately hosted in low- and middle-income countries, and the length of their displacement is increasing. This highlights the urgent priority of displacement; indeed, it has received sustained attention from the highest levels of global decision-making, particularly since 2016, including two Global Compacts in 2018 (Global Compact for Migration, Global Compact for Safe, Orderly and Regular Migration). Although some have argued that such global summits offer a replacement for meaningful action, these events at least highlight clear political will to shift the emphasis from humanitarian responses to a much longer-term development focus. Interest in social assistance and displacement has also grown since 2018 and resulting policy must respond to this concern for more sustainable responses. High-level commitments are slowly filtering through to policy, while recent research has provided clear frameworks for analysing developing policy approaches. Gaps remain in the analysis of policy implementation and in the assessment of how to access social assistance beyond official state channels.
4

Droogan, Julian, Lise Waldek, Brian Ballsun-Stanton e Jade Hutchinson. Mapping a Social Media Ecosystem: Outlinking on Gab & Twitter Amongst the Australian Far-right Milieu. RESOLVE Network, settembre 2022. http://dx.doi.org/10.37805/remve2022.6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Attention to the internet and the online spaces in which violent extremists interact and spread content has increased over the past decades. More recently, that attention has shifted from understanding how groups like the self-proclaimed Islamic State use the internet to spread propaganda to understanding the broader internet environment and, specifically, far-right violent extremist activities within it. This focus on how far right violent extremist—including far-right racially and ethnically motivated violent extremists (REMVEs) within them—create, use, and exploit the online networks in which they exist to promote their hateful ideology and reach has largely focused on North America and Europe. However, in recent years, examinations of those online dynamics elsewhere, including in Australia, is increasing. Far right movements have been active in Australia for decades. While these movements are not necessarily extremist nor violent, understanding how violent far right extremists and REMVEs interact within or seek to exploit these broader communities is important in further understanding the tactics, reach, and impact of REMVEs in Australia. This is particularly important in the online space access to broader networks of individuals and ideas is increasingly expanding. Adding to a steadily expanding body of knowledge examining online activities and networks of both broader far right as well as violent extremist far right populations in Australia, this paper presents a data-driven examination of the online ecosystems in which identified Australian far-right violent extremists exist and interact,1 as mapped by user generated uniform resource locators (URL), or ‘links’, to internet locations gathered from two online social platforms—Twitter and Gab. This link-based analysis has been used in previous studies of online extremism to map the platforms and content shared in online spaces and provide further detail on the online ecosystems in which extremists interact. Data incorporating the links was automatically collected from Twitter and Gab posts from users existing within the online milieu in which those identified far right extremists were connected. The data was collected over three discrete one-month periods spanning 2019, the year in which an Australian far right violent extremist carried out the Christchurch attack. Networks of links expanding out from the Twitter and Gab accounts were mapped in two ways to explore the extent and nature of the online ecosystems in which these identified far right Australian violent extremists are connected, including: To map the extent and nature of these ecosystems (e.g., the extent to which other online platforms are used and connected to one another), the project mapped where the most highly engaged links connect out to (i.e., website domain names), and To explore the nature of content being spread within those ecosystems, what sorts of content is found at the end of the most highly engaged links. The most highly engaged hashtags from across this time are also presented for additional thematic analysis. The mapping of links illustrated the interconnectedness of a social media ecosystem consisting of multiple platforms that were identified as having different purposes and functions. Importantly, no links to explicitly violent or illegal activity were identified among the top-most highly engaged sites. The paper discusses the implications of the findings in light of this for future policy, practice, and research focused on understanding the online ecosystems in which identified REMVE actors are connected and the types of thematic content shared and additional implications in light of the types of non-violent content shared within them.
5

Yatsymirska, Mariya. SOCIAL EXPRESSION IN MULTIMEDIA TEXTS. Ivan Franko National University of Lviv, febbraio 2021. http://dx.doi.org/10.30970/vjo.2021.49.11072.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The article investigates functional techniques of extralinguistic expression in multimedia texts; the effectiveness of figurative expressions as a reaction to modern events in Ukraine and their influence on the formation of public opinion is shown. Publications of journalists, broadcasts of media resonators, experts, public figures, politicians, readers are analyzed. The language of the media plays a key role in shaping the worldview of the young political elite in the first place. The essence of each statement is a focused thought that reacts to events in the world or in one’s own country. The most popular platform for mass information and social interaction is, first of all, network journalism, which is characterized by mobility and unlimited time and space. Authors have complete freedom to express their views in direct language, including their own word formation. Phonetic, lexical, phraseological and stylistic means of speech create expression of the text. A figurative word, a good aphorism or proverb, a paraphrased expression, etc. enhance the effectiveness of a multimedia text. This is especially important for headlines that simultaneously inform and influence the views of millions of readers. Given the wide range of issues raised by the Internet as a medium, research in this area is interdisciplinary. The science of information, combining language and social communication, is at the forefront of global interactions. The Internet is an effective source of knowledge and a forum for free thought. Nonlinear texts (hypertexts) – «branching texts or texts that perform actions on request», multimedia texts change the principles of information collection, storage and dissemination, involving billions of readers in the discussion of global issues. Mastering the word is not an easy task if the author of the publication is not well-read, is not deep in the topic, does not know the psychology of the audience for which he writes. Therefore, the study of media broadcasting is an important component of the professional training of future journalists. The functions of the language of the media require the authors to make the right statements and convincing arguments in the text. Journalism education is not only knowledge of imperative and dispositive norms, but also apodictic ones. In practice, this means that there are rules in media creativity that are based on logical necessity. Apodicticity is the first sign of impressive language on the platform of print or electronic media. Social expression is a combination of creative abilities and linguistic competencies that a journalist realizes in his activity. Creative self-expression is realized in a set of many important factors in the media: the choice of topic, convincing arguments, logical presentation of ideas and deep philological education. Linguistic art, in contrast to painting, music, sculpture, accumulates all visual, auditory, tactile and empathic sensations in a universal sign – the word. The choice of the word for the reproduction of sensory and semantic meanings, its competent use in the appropriate context distinguishes the journalist-intellectual from other participants in forums, round tables, analytical or entertainment programs. Expressive speech in the media is a product of the intellect (ability to think) of all those who write on socio-political or economic topics. In the same plane with him – intelligence (awareness, prudence), the first sign of which (according to Ivan Ogienko) is a good knowledge of the language. Intellectual language is an important means of organizing a journalistic text. It, on the one hand, logically conveys the author’s thoughts, and on the other – encourages the reader to reflect and comprehend what is read. The richness of language is accumulated through continuous self-education and interesting communication. Studies of social expression as an important factor influencing the formation of public consciousness should open up new facets of rational and emotional media broadcasting; to trace physical and psychological reactions to communicative mimicry in the media. Speech mimicry as one of the methods of disguise is increasingly becoming a dangerous factor in manipulating the media. Mimicry is an unprincipled adaptation to the surrounding social conditions; one of the most famous examples of an animal characterized by mimicry (change of protective color and shape) is a chameleon. In a figurative sense, chameleons are called adaptive journalists. Observations show that mimicry in politics is to some extent a kind of game that, like every game, is always conditional and artificial.
6

Gandelman, Néstor, e Ana Balsa. The Impact of ICT on Health Promotion: A Randomized Experiment with Diabetic Patients. Inter-American Development Bank, dicembre 2010. http://dx.doi.org/10.18235/0011195.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
This paper summarizes a randomized experiment to study the effects of an Internet-based intervention on type 2 diabetes patients in Montevideo, Uruguay. A specially designed website and electronic social network allowed participants to navigate freely, download materials, and interact with other diabetics and specialists. No significant impact was found on participants' knowledge, behavior, or health outcomes. Only a minority of patients logged on to the website, and most were only reached by email and mobile text (SMS). Patients' gender, marital status, and education influenced their participation on the website.
7

Hinnant, Laurie, Sara Hairgrove, Heather Kane, Jason Williams e Jessica Duncan Cance. Social Determinants of Health: A Review of Publicly Available Indices. RTI Press, novembre 2022. http://dx.doi.org/10.3768/rtipress.2022.op.0081.2212.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In recent years, the number of publicly available tools and indices assessing social determinants of health (SDOH) has grown exponentially. While many of these indices have been developed to assist researchers and practitioners with identifying vulnerable communities, it is difficult to determine the most appropriate measure, index, or combination of indices to use given the research question of interest. This paper presents an overview of the most commonly included indices, highlights commonalities, and identifies some differences in what they measure. We also discuss challenges with using these measures, including the use of state level data to examine local level issues and how the use of atheoretical indices challenges the application of SDOH measurement. Findings are intended to provide researchers and practitioners with information about SDOH data available through these common indices to inform how they are applied based on the needs of their work.
8

Slater, Rachel. Researching Capacities to Sustain Social Protection in Protracted Crises. Part 2: Early Findings. Institute of Development Studies, marzo 2024. http://dx.doi.org/10.19088/basic.2024.002.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Despite significant attention and interest in shock-responsive social protection, a knowledge gap exists when it comes to our understanding of how to sustain capacity to deliver existing social programmes and systems in situations of climate and/or conflict crisis. BASIC Research is using a new tool that we have developed – the Capacity Cube – to explore this question and identify ways in which external actors might support the resilience of those systems and programmes. An explanation of the Capacity Cube framework is provided in an accompanying briefing (Slater 2024). The current briefing focuses on early findings emerging from research using the tool in Nigeria, Iraq, and Syria.
9

Rudyk, Myroslava. Нові ролі і функції соціальних медіа у волонтерській діяльності в період російсько-української війни з 24 лютого 2022 року. Ivan Franko National University of Lviv, marzo 2023. http://dx.doi.org/10.30970/vjo.2023.52-53.11739.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The article studies social media as a communication platform during the war. The set of mass communication tools to meet the audience’s information needs, coordination of volunteer activities, popularization of the volunteer movement, and involvement of the Internet community in helping the Armed Forces were analyzed. During the Russian-Ukrainian war, social media became the platform where the exchange of information takes place much faster; good analytics could be found quickly, which were pushed out of the information space. Also, social media have taken on the role of a platform where you can coordinate work, unite society around important issues, organize assistance to the army, and report on the needs of the Armed Forces. That is why the presentation of volunteering in social media is considered a relevant research topic because the presentation of volunteering in social networks has generally changed the content of blogging. Stars of show business, politicians, people of art, and educational and scientific fields have done incredible things with social media’s help in organizing military aid. We believe that the volunteer movement through social media has expanded the functions and role of these communication platforms, demonstrating the importance of Internet communication and the effectiveness of using the latest media tools in wartime. The historiography of the study covers the works of Ukrainian and foreign scientists. Among them are L. Horodenko, V. Hvozdiev, B. Potiatynyk, G. Synorub, A. Rohulskyi, D. Rashkoff, and others. The war situation in Ukraine has opened up new requests for blogging activities, exceptional support, and initiation of volunteering. The content of bloggers is now 80 percent filled with the topic of war. The presentation of volunteer work is considered individually and collectively on behalf of foundations and public organizations. We believe that a significant advantage of an active volunteer movement in social networks is fast communication, which contributes to the rapid resolution of crucial tasks. Keywords: social media, volunteering, information, war.
10

Collyer, Michael, Dolf te Lintelo, Thabani Mutambasere e Tahir Zaman. Moving Targets: Social Protection as a Link Between Humanitarianism, Development and Displacement. Institute of Development Studies, giugno 2022. http://dx.doi.org/10.19088/basic.2022.017.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Despite the widespread concern with social protection in the field of development, it has had little impact on displacement until very recently. UNHCR has had a Social Protection Unit since 2009, but social protection is barely mentioned in either the Global Compact on Refugees or the Global Compact for Safe, Orderly and Regular Migration, both agreed in 2018. The period since 2018 has seen a growth of research interest and new policy development. This represents the latest appearance of the humanitarian-development nexus in the field of displacement. This nexus is a long-standing one and is inherent in the term ‘durable solution’ as the only effective end of displacement. Unfortunately, there are few recognised successes, and durable solutions are enjoyed by only a tiny proportion of the growing number of displaced people in the world today. This makes renewed attention to the humanitarian-development nexus all the more urgent. In this paper we review the relationship between a humanitarian response to initial displacement and longer-term development planning, as well as the recent range of research and policy responses in this field. These demonstrate significant potential of social protection. We go on to consider six areas of developing theorisation in order to inform what would constitute success in the expanding inclusion of displaced people in social protection programmes or systems. We conclude with four suggestions where further research in this area can help to determine how and if the potential for social protection to offer more sustainable responses to displacement is being realised.

Vai alla bibliografia