Showing 1,261 - 1,280 results of 1,364 for search '"social network"', query time: 0.12s Refine Results
  1. 1261

    UKRAINIAN MEDIALANDSCAPE IN THE TIME OF WAR (2022–2024): TRANSFORMATION, RESPONSE TO THE WAR, DYNAMICS OF MEDIA CONSUMPTION by Svitlana Bezchotnikova, Nina Zrazhevska

    Published 2024-12-01
    “…Increased news consumption through social networks was noted, with high trust in official sources like the President and Armed Forces. …”
    Get full text
    Article
  2. 1262

    Médecines créoles guyanaise et haïtienne face au Covid-19 by Marc-Alexandre Tareau, Guillaume Odonne

    Published 2023-12-01
    “…This faith in plants, in prevention as well as in care, while the risks linked to disease are minimized, while the side effects of vaccines are exaggerated, is very much relayed by certain social networks. One of the explanations may be this perception of the non-newness of the disease taken as a set of already understood symptoms, as well as the strong preventive valence of Creole phytotherapies.…”
    Get full text
    Article
  3. 1263

    The social determinants of migrant domestic worker (MDW) health and well-being in the Western Pacific Region: A Scoping Review. by Jamie Chan, Georgia Dominguez, Antonia Hua, Melissa Garabiles, Carl A Latkin, Brian J Hall

    Published 2024-01-01
    “…In addition, randomized control trials and public health intervention studies are needed to improve women's health outcomes and address proximal health determinants to reduce health inequalities. Leveraging social networks and community facing non-governmental organizations (NGOs) are promising directions to overcome access to care for this population.…”
    Get full text
    Article
  4. 1264

    The extent of western lowland gorilla social relationships within and between groups. by Kristena Cooksey, Jake Funkhouser, Crickette Sanz, Jean Marie Massamba, Thierry Fabrice Ebombi, Prospère Teberd, Gaston Abea, Gaeton Mbebouti, Kathryn Judson, Sean Brogan, Colleen Stephens, David Morgan

    Published 2025-01-01
    “…To do so, we compiled all-occurrence social interaction and silverback nearest neighbor social networks from data collected during daily group follows conducted over several years. …”
    Get full text
    Article
  5. 1265
  6. 1266

    Psychological and legal aspects of cyberbullying by O. L. Matsiuk, I. V. Maslyanikova

    Published 2023-12-01
    “…The following methods were used to study the problem of cyberbullying: theoretical method (analysis and systematization of scientific literature, scientific papers, professional publications), empirical method (content analysis, observation, survey), statistical method (using methods of mathematical statistics), content analysis (used in the normative analysis of the legal framework and analysis of social networks). The research has shown that cyberbullying is an urgent problem not only in Ukraine but also in other countries. …”
    Get full text
    Article
  7. 1267

    تطبیقات الهواتف الذکیة والخصوصیة المعلوماتیة : دراسة تحلیلیة مقارنة by د. حسام الدین محمد رفعت

    Published 2020-09-01
    “…In recent years there has been alegislative response at different levels for the sake of this protection, and thejudiciary has followed it with a remarkable response in favour of the jurisprudenceof the private life of individuals that is of paramount importance to both theindividual and the community.This coincided with the increasing vulnerability of the right to privacy tothe digital environment through e-mail and chat sites Networks or communicationsites, which have become a hoot of the modern era and a wide electronic space,in which we put all the references about us and our lives, as well as our privacy.The purpose of this study is to diagnose the reality of the work of Google Playapplications that work on the smart phone environment, especially with regard togathering information or allowing access to personal data and users’ information,by identifying the nature of data and information collected or allowed access to,monitoring the nature of the risks of using these applications.To do so, the researcher studied and analyzed licensing agreements forthe use of 80 applications of smart phones in areas commonly used in the digitalenvironment, such as social networking applications, Online banks Applications,antivirus applications, web search applications, news and press applications,educational applications, web applications, travel and tourism applications. …”
    Get full text
    Article
  8. 1268

    The challenges and opportunities of women working in weaving cultural clothes at Bahir-Dar City, Bahirdar, Ethiopia by Tatek Getachew, Chekol Alemu, Habitamu Wudu

    Published 2025-01-01
    “…Despite these obstacles, there are opportunities for improvement through institutional support, training programs, and social networking. Ultimately, these women benefit from income generation, work flexibility, skill development, and enhanced social satisfaction, positively impacting their lives and their families' livelihoods. …”
    Get full text
    Article
  9. 1269

    Typical investigative situations in the initial phase of a war-related sexual violence investigation by O. O. Naumkin

    Published 2024-03-01
    “…Algorithms of corresponding actions have been developed, which are reflected in a procedural form through the prism of the intellectual activity of an official, in particular, an inspection of the scene of the incident, questioning of the victim or witnesses, taking biological samples of a person, appointing forensic experts, taking measures to ensure criminal proceedings in the form of temporary access to things and documents for the purpose of extracting photo or video material in digital form, using OSINT technologies to identify the rapist through social networks Instagram, Facebook, VK, etc., conducting covert investigative (search) actions and operational-search activities in order to establish the location the suspect, etc.…”
    Get full text
    Article
  10. 1270

    Cyberbullying: Violence in the digital world by Mijatović Marina D.

    Published 2024-01-01
    “…Cyberbullying can be defined as intentional abuse or harassment of an individual through social networks, e-mail, phone calls or messages, electronic media, which is repeated over time. …”
    Get full text
    Article
  11. 1271

    Schoolscaping in a Multilingual Area: An Example of a Hungarian College in Western Ukraine by Váradi Krisztián, Hires-László Kornélia, Máté Réka

    Published 2024-12-01
    “…In addition, the official website and the social networking sites of the Transcarpathian Hungarian College were analysed briefly as part of a virtual schoolscape analysis. …”
    Get full text
    Article
  12. 1272
  13. 1273

    Social Media and Urticaria - A Data Audit of Facebook®, LinkedIn®, and Twitter® Posts by Himel Mondal, Arunima Dhabal, Shaikat Mondal, Indrashis Podder

    Published 2024-01-01
    “…Materials and Methods: An in-depth data audit of the three most commonly used social networks viz. Facebook®, LinkedIn®, and Twitter® were done on a single day, as posts may change or lose relevance over time. …”
    Get full text
    Article
  14. 1274

    From On-Air Rebelliousness to the Cult of Positivity: Mediated Identities and Technological Change in Pump Up the Volume (1990) and Eighth Grade (2018) by Andrea Sofía Regueira Martín

    Published 2025-01-01
    “…As a consequence, although both films reflect on the relationship between adolescent identities and their performances on social media, they place an emphasis on different aspects of social networks that are specific to each film’s socio-historical context. …”
    Get full text
    Article
  15. 1275

    Reversible data hiding scheme based on enhanced image smoothness by Jinghan WANG, Hui ZHU, Helin LI, Hui LI, Xiaopeng YANG

    Published 2022-06-01
    “…With the prosperity of Internet technology and the popularity of social networks, reversible data hiding technology has been widely adopted in concealed information transmission of medical and military fields with its advantages on secret information recovery.Traditional reversible data hiding schemes mainly focus on the enhancement of embedding capacity and the reduction of the distortion rate of stego image, but pay less attention to the understanding of image details with the human eyes.Thus, it is difficult to resist hidden information detection methods.To solve the above challenge, a reversible data hiding algorithm was proposed, which ensured the visual quality of the stego image in the process of data hiding through the image visual smoothness enhancement.Specifically, the original image was divided into reference area and non-reference area.The secret data was embedded through the translation of the difference, which was calculated according to the predicted pixel value and the original pixel value of the non-reference area.To guarantee the visual quality of the image, smoothing mechanism was constructed, in which a Gaussian filter was utilized as a template to filter the predicted value and to add the filter difference into the cover image without loss.The pixel value of the reference region was used as edge information for lossless restoration of the original image.The filtering coefficient in Gaussian function was exploited as the embedded key to ensure the security of secret information.Simulation results regarding a large number of classical image data sets illustrated that the visual smoothness of stego image processed by this scheme was effectively enhanced with lower distortion rate, higher embedding rate, and higher embedding and extraction efficiency.In a typical circumstance, the similarity between the generated stego image and the Gaussian filter image can reach 0.9963.The PSNR and the embedded capacity can be up to 37.346 and 0.3289 BPP, respectively.…”
    Get full text
    Article
  16. 1276

    Features of social intelligence of cadets trained in institutions of higher education with specific learning conditions by S. V. Kharchenko

    Published 2018-12-01
    “…Among the factors that negatively affected the level of development of the abilities of social intelligence of the study participants, the author has distinguished the following: changes in child-parent communication; change in the content of education and attitudes towards children in secondary schools; reduction of the intensity of direct friendship communication and increase of the importance of communication in social networks. The author has proved the necessity to improve the educational and pedagogical conditions aimed at developing the abilities of social intelligence of modern professionals in the law enforcement sphere.…”
    Get full text
    Article
  17. 1277

    Essence and prospects of media criticism research in contemporary Russia by R.P. Bakanov

    Published 2017-06-01
    “…Media criticism has been gaining popularity on the Internet in the form of thematic forums, blogs, groups, and messages on personal pages in social networks. Here the speeches of professional critics coexist with the texts of so-called amateur critics – those who, for the first time, decided to publicly express their attitude to a particular program, the conduct of a guest or guest in the studio, the quality of a certain article, etc. …”
    Get full text
    Article
  18. 1278

    Study on a New Method of Link-Based Link Prediction in the Context of Big Data by Chen Jicheng, Chen Hongchang, Li Hanchao

    Published 2021-01-01
    “…In the present world of social media, this concept has taken root, and its application is seen through numerous social networks. A typical example is 2004, 4 February “TheFeacebook,” currently known as just Facebook. …”
    Get full text
    Article
  19. 1279

    INTERNATIONAL RELATIONS AND DIPLOMATIC SERVICE: RETROSPECTIVE ANALYSIS AND PROSPECTS OF THE NEW WORLD ORDER by E. V. Ohotskii

    Published 2016-04-01
    “…Attention is drawn to the increasing importance in international Affairs information and communication technologies and social networks, expanding the access of citizens to discuss government decisions on international issues. …”
    Get full text
    Article
  20. 1280

    Solving the Fragment Complexity of Official, Social, and Sensorial Urban Data by Hui Liu, Jingqing Jiang, Yaowei Hou, Jie Song

    Published 2020-01-01
    “…Sources of urban data are generally categorized as one of the three types: official, social, and sensorial, which are from the government and enterprises, social networks of citizens, and the sensor network. These types typically differ significantly from each other but are consolidated together for the smart urban services. …”
    Get full text
    Article