Academic literature on the topic 'GOOGLE – INTERNET – MONOPOLIST - NETWORK'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'GOOGLE – INTERNET – MONOPOLIST - NETWORK.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "GOOGLE – INTERNET – MONOPOLIST - NETWORK"

1

Wittenburg, Peter, Christophe Blanchi, Claus Weiland, et al. "The Vision of the FAIR Digital Object Machine and Ubiquitous FDO Services." Research Ideas and Outcomes 8 (October 12, 2022): e95268. https://doi.org/10.3897/rio.8.e95268.

Full text
Abstract:
In addition to the previous intensive discussion on the "Data Deluge" with respect to enormous increase of available research data, the 2022 Internet-of-Things conference confirmed that in the near future there will be billions if not trillions of smart IoT devices in a very wide range of applications and locations, many of them with computational capacities. This large number of distributed IoT devices will create continuous streams of data that will require a global framework to facilitate their integration into the Internet to enable controlled access to their data and services, to name but a few aspects. This framework would enable tracking of these IoT devices to measure their resource usage for instance to globally address the UN Sustainable Development Goals. Additionally, policy makers are committed to define regulations to break data monopolies and increase sharing. The result will be an increasingly huge domain of accessible digital data which on the one hand allows addressing new challenges especially cross-sector ones. A key prerequisite for this is to find the right data across domain boundaries supporting a specific task.Digitisation is already being called the fourth industrial revolution and the emerging data and information is the 21<sup>st</sup> century's new resource. Currently this vision is mostly unrealised due to the inability of existing data and digital resources to be findable, accessible, interoperable, and reusable despite the progress in providing thematic catalogs. As a result, the capacity of this new resource is latent and mostly underutilized. There is no Internet level infrastructure that currently exists to facilitate the process by which all data and digital resources are made consistently and globally accessible. There are patchworks of localized and limited access to trusted data on the Internet created by specific communities that have been funded or directed to collaborate.To turn digital information into a commodity, description, access to, validation, and processing of data needs to become part of the Internet infrastructure we call the Global Integrated Data Space (GIDS). The main pillars of this approach require that data and services be globally identified and consistently accessed, with predictive descriptions and access control to make them globally findable.Currently researchers are relying partly on informal knowledge such as knowing the labs and persons to maximize the chance to access trustworthy data, but this method is limiting the use of suitable data. In the future data scenario, other mechanisms will become possible. In the public information space Google-like searches using specific key terms have become an accepted solution to find documents for human consumption. This approach however, does not work in the GIDS with large numbers of data contributors from a wide range of institutions, from millions of IoT devices worldwide, and where a wide range of data types and automatic data processing procedures dominate. Indeed, successful labs that apply complex models describing digital surrogates can automatically leverage data and data processing procedures from other labs. This makes the currently often operationally applied manual stitching of data and operations too costly both in time and resources to be a competitive option. A researcher looking for specific brain imaging data for a specific study has a few options:Rely on a network of colleagues.Execute Google-like searches in known registries looking for appropriate departments and researchers.Execute Google-like searches on suitable data.He/she engages an agent to execute profile matching in suitable sub-spaces.We assume that data creators will have the capability and be interested to create detailed metadata of different types and that the researchers, who are looking for specific data, will be able to specify precise profiles for data they are looking for. Two of the key characteristics of the future data space will be operations that can carry out profile matching at ultra-high speeds and that will lead to various subspaces according to some facets using self-organizing mechanisms. Of course, this poses high requirements on the metadata quality being used and that creators and potential consumers share knowledge about the semantic space in which they operate, and available semantic mappings used by brokers or self-provided. Metadata must be highly detailed and suitable schemas have been developed already in many communities. In addition to the usual metadata, potential users will need to specify their credentials in the form of trusted roles and their usage purposes to indicate access opportunities.Changing current metadata practices to yield richer metadata as presribed by the FAIR principles will not be simple, especially since we seem to be far away from formalizing roles and usage purposes in a broadly accepted way, but the pressure to create rich and standardized metadata will increase. It should be noted of course that for data streams created by IoT sensors, defining proper metadata is an action that is only requested once or a few times.Why are FDOs special in this automatic profile matching scenario? FDOs are bundling all information required for automatic profile matching in a secure way, i.e., all metadata information are available via the gloablly unique resolvable and persisten identifiers (PID) of the FDO and the PID security mechanisms are at the basis to establish trust. FDOs will be provided with a secure method that is capable of computing efficiently coded profiles representing all properties of an FDO relevant for profile matching. This would speedup profile matching enormously.We will address two major questions characterizing the "FDO Machine" we are envisioning:Which kinds of representations could make profile matching much more efficient?How could FDO-based mechanisms be used to efficiently create sub-spaces that would help the emerging layer of information brokers to offer specialized services addressing specialized needs as for example requested by UN's Sustainable Development Goals?Brokers might want to use specialized agents to create subspaces along many different important facets such as domains, trustworthiness, roles, etc. Such subspaces are ephemeral virtual structures on top of the huge global integrated data space.
APA, Harvard, Vancouver, ISO, and other styles
2

Kuzminov, Sergiy V., and Svitlana O. Gerashchenko. "PROBLEMS OF price REGULATION OF COMPETITION AND MONOPOLY IN THE XXI CENTURY." Європейський вектор економічного розвитку 1, no. 32 (2022): 38–46. http://dx.doi.org/10.32342/2074-5362-2022-1-32-4.

Full text
Abstract:
The article analyzes the peculiarities of the activities of five companies of technology giants, leading the world rankings, namely: Apple, Alphabet (Google), Microsoft, Amazon and Facebook in order to identify/refute possible threats of abuse of these companies their monopoly position in the market. A critical analysis of the assessment of the monopoly position of these entities in the relevant markets for goods / services based on the classical approaches to the interpretation of the monopolies. It has been established that due to the inconsistency of traditional approaches to antitrust regulation of the current state of affairs, modern market leaders often cannot even be identified as monopolists. However, there are possible threats to the activities of giant technology firms. In particular, they may be related to modern highspeed, often veiled ways of collecting, processing and storing information, certain personal data, etc., and the possibility of using them in certain interests. A significant number of benefits that society receives from the activities of technology giant companies have been studied. Firstly, is the provision of free services for the use of information resources. Secondly, it is not setting high prices for advertising services. In any case, they are lower than in the real sector of the economy. In addition, over time, for loyal customers, advertising prices are constantly declining, and the effectiveness of advertising on social networks and the Internet is quite high. Thirdly, it is an opportunity to significantly save consumers when buying goods on Internet sites. It is noted that the difficulty of applying the concept of monopoly in the traditional sense of the term is that modern technology companies - giants often do not overestimate the price of their products, but rather provide their products / services at low prices or even free. Accordingly, such firms have a whole army of supporters. This suggests the obsolescence of existing antitrust law, its inability to regulate the activities of modern high-tech firms and, consequently, the need to develop more modern antitrust law.
APA, Harvard, Vancouver, ISO, and other styles
3

MI, Muhamad Irsal, and Yuliarman Saragih. "PERANCANGAN JARINGAN FIBER TO THE HOME (FTTH) MENGGUNAKAN APLIKASI GOOGLE EARTH PRO." Aisyah Journal Of Informatics and Electrical Engineering (A.J.I.E.E) 5, no. 1 (2023): 49–57. http://dx.doi.org/10.30604/jti.v5i1.133.

Full text
Abstract:
ABSTRACT&#x0D; Currently the public's need for internet network access for voice, data and video services continues to increase, to run these services requires very high bandwidth and internet speed. Fiber To The Home (FTTH) is a telecommunications service architecture that utilizes optical network transmission media that supports transmission at bandwidth and internet speeds of up to 100 Mbps. Therefore, it is necessary to develop the FFTH network for areas that do not have internet network access such as the Royal Residence Karawang housing, the development of the FFTH network requires a good design in order to determine the number of devices needed and minimize the use of costs. To design the FTTH Network, the Google Earth Pro application is used to determine the area of ​​the Polygon, the coordinates of the Optical Distribution Point, Poles and Optical Distribution Cabinet. In designing, determining the number of devices and the coordinates of the devices to be installed.&#x0D; Keywords: FTTH; Google Earth Pro; Telecommunication&#x0D; &#x0D; &#x0D; ABSTRAK&#x0D; Saat ini kebutuhan masyarakat akan akses jaringan internet untuk layanan suara, data dan video terus meningkat, untuk menjalankan layanan tersebut membutuhkan bandwidth dan kecepatan internet yang sangat tinggi. Fiber To The Home (FTTH) adalah arsitektur layanan telekomunikasi yang memanfaatkan media transmisi jaringan optik yang mendukung transmisi pada bandwidth dan kecapatan internet mencapai 100 Mbps. Oleh karena itu perlu dilakukan pengembangan jaringan FFTH untuk daerah yang belum memiliki akses jaringan internet seperti perumahan Royal Residence Karawang, pengembangan jaringan FFTH memerlukan desain yang baik agar dapat menentukan jumlah perangkat yang dibutuhkan dan meminimalkan penggunaan biaya. Untuk merancang Jaringan FTTH, digunakan aplikasi Google Earth Pro untuk menentukan luas Polygon, koordinat Optical Distribution Point, Tiang dan Optical Distribution Cabinet. Dalam melakukan perancangan dilakukan penentuan jumlah perangkat dan koordinat perangkat yang akan dipasang.&#x0D; Kata Kunci: FTTH; Google Earth Pro; Telekomunikasi
APA, Harvard, Vancouver, ISO, and other styles
4

Habibullah, Romadlon, Fahrurozi Fahrurozi, and Rahayu Lestari Putri. "Pembelajaran PAI dengan Menggunakan Media Google Classroom pada Masa Pandemi di Sekolah Menengah Atas." Scaffolding: Jurnal Pendidikan Islam dan Multikulturalisme 4, no. 2 (2022): 292–303. http://dx.doi.org/10.37680/scaffolding.v4i2.1432.

Full text
Abstract:
This study describes PAI learning through Google Classroom media during the Covid-19 pandemic at SMAN 4 Bojonegoro. This research is descriptive and qualitative. The population and sample are students of class X SMAN 4 Bojonegoro. Research data was obtained through interviews, observation, and documentation. The results showed that the implementation of PAI learning in class X SMAN 4 Bojonegoro during the pandemic season was by using Google Classroom media. The steps taken include; planning, implementation, organization, and evaluation of learning. The supporting factors for learning are; Google Classroom is learning media workshops for teachers and students, a strong network and internet, students having smartphones, and enthusiastic parents. While the inhibiting factors for learning are; the existence of a wrong internet network due to natural conditions, resulting in students' concentration being easily disturbed, and the application of blended learning being less than optimal.
APA, Harvard, Vancouver, ISO, and other styles
5

Kahar, Abd, Syahrir L, Usman M, and Syamsunir Syamsunir. "The Use of Google Classroom As A Blended Learning Method For Eighth Grade English Learners SMP Muhammadiyah Rappang." La Ogi : English Language Journal 9, no. 2 (2023): 120–30. http://dx.doi.org/10.55678/loj.v9i2.1023.

Full text
Abstract:
In this study, Google Classroom's use as a web-based teaching tool for 8th-grade English courses at SMP Negeri Muhammadiyah Rappang is investigated. The research employed a qualitative descriptive approach to examine Google Classroom-related problems faced by teachers and students. In-depth interviews, questionnaires, and unbiased observation were used to gather the data. The outcomes demonstrated that students had favorable perceptions of utilizing Google Classroom. The study's first dimension was on how simple it was to utilize, download lessons, and send assignments. The majority of respondents—about 68%—agreed that Google Classroom improved learning productivity for eighth-graders. The effectiveness of Google Classroom was the second factor, and 44% of respondents concurred that it was simple to use. The third dimension addressed Google Classroom usage challenges such as slow internet connections, media availability limitations, and student aptitudes. Concerning network connection restrictions, 24 respondents (47.1%) agreed while 29.4% disagreed. The fourth dimension concentrated on internet quota and network-related solutions. The majority of respondents concurred that developing new networks, asking for support from the school or parents, or all three might aid in overcoming these obstacles
APA, Harvard, Vancouver, ISO, and other styles
6

Anjani, Nesya Salsabila Puti. "Efektivitas google meet sebagai media komunikasi belajar online bagi mahasiswa Rantau di desa Hegarmanah kabupaten Sukabumi." Komunika: Journal of Communication Science and Islamic Dakwah 6, no. 2 (2022): 21–32. https://doi.org/10.32832/komunika.v6i2.7106.

Full text
Abstract:
This research is based on communication media as a means of communication for overseas students in Hegarmanah village, Sukabumi regency which is used during the pandemic during online learning, the media used is the Google Meet application. This study aims to determine the effectiveness of the Google Meet communication media as a means of online learning for overseas students in Hegarmanah village, Sukabumi regency. This study uses a qualitative descriptive method, with data collection using several techniques to obtain complete data including literature studies and interviews. The results of this study, namely the Google Meet communication media as a means of communication for students in Hegarmanah village, Sukabumi regency can be said to be quite effective. The internet network is one of the causes of quite effective communication which makes the delivery of learning and communication between lecturers and students not optimal. If the policy of increasing the renewal of the internet network is implemented, it will provide benefits for the realization of effective communication.AbstrakPenelitian ini berlatar belakang dari media komunikasi sebagai sarana komunikasi mahasiswa rantau di Desa Hegarmanah Kabupaten Sukabumi yang digunakan pada masa pandemi selama melakukan pembelajaran online, media yang digunakan yaitu aplikasi Google Meet. Penelitian ini bertujuan untuk mengetahui efektivitas media komunikasi Google Meet sebagai sarana pembelajaran online mahasiswa rantau di desa Hegarmanah kabupaten Sukabumi. Penelitian ini menggunakan metode deskriptif kualitatif, dengan pengumpulan data menggunakan beberapa teknik untuk memperoleh data yang lengkap diantaranya adalah studi literatur dan wawancara. Hasil penelitian ini yaitu media komunikasi Google Meet sebagai sarana komunikasi mahasiswa di desa Hegarmanah kabupaten Sukabumi dapat dikatakan cukup efektif. Jaringan internet menjadi salah satu penyebab komunikasi cukup efektif yang menjadikan penyampaian pembelajaran dan komunikasi antara dosen dan mahasiswa tidak maksimal. Jika kebijakan menambah pembaharuan jaringan internet diterapkan, maka akan memberikan manfaat terwujudnya komunikasi yang efektif.
APA, Harvard, Vancouver, ISO, and other styles
7

Guijarro, Luis, Jose Vidal, Vicent Pla, and Maurizio Naldi. "Economic Analysis of a Multi-Sided Platform for Sensor-Based Services in the Internet of Things." Sensors 19, no. 2 (2019): 373. http://dx.doi.org/10.3390/s19020373.

Full text
Abstract:
A business model for sensor-based services is proposed where a platform creates a multi-sided market. The business model comprises a platform that serves as an intermediary between human users, app developers, and sensor networks, so that the users use the apps and the apps process the data supplied by the sensor networks. The platform, acting as a monopolist, posts a fee for each of the three sides so as to maximize its profit. This business model intends to mimic the market-creating innovation that main mobile apps platforms have generated in the smartphone sector. We conduct an analysis of the profit maximization problem faced by the platform, show that optimum prices exist for any parameter value, and show that these prices always induce an equilibrium in the number of agents from each side that join the platform. We show that the relative strength of the value that advertisers attach to the users determines the platform price structure. Depending on the value of this relative strength, two alternative subsidizing strategies are feasible: to subsidize either the users’ subscription or the developers’ registration. Finally, all agents benefit from an increase in the population at any of the three sides. This result provides a rationale for incentivizing not only the user participation, but also the entry of developer undertakings and the deployment of wireless sensor network infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
8

Çepik, Hilal, Ömer Aydın, and Gökhan Dalkılıç. "Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device." Proceedings 74, no. 1 (2021): 1. http://dx.doi.org/10.3390/proceedings2021074001.

Full text
Abstract:
With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.
APA, Harvard, Vancouver, ISO, and other styles
9

Awaludin, Muryan, Verdi Yasin, and Fitria Risyda. "The Influence of Artificial Intelligence Technology, Infrastructure and Human Resource Competence on Internet Access Networks." Inform : Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi 9, no. 2 (2024): 111–20. http://dx.doi.org/10.25139/inform.v9i2.8109.

Full text
Abstract:
The influence of artificial intelligence technology, infrastructure, and human resource competence on Internet access networks has been examined in a scientific publication, which is the outcome of a literature review in the information systems sector. The purpose of this study is to generate an influence hypothesis related to factors that can be applied in further investigations. The research's subjects include academic media, Google Scholar, Mendeley, and online libraries. Publicly accessible e-books and e-journals are the source of the research methodology that makes use of library institution searches. The following is a descriptive qualitative analysis of this article's findings: The influence of artificial intelligence technology on networks for Internet access, the influence of infrastructure on networks for Internet access, and the Influence of HR Competency on Internet Access Networks. Research findings regarding the impact of advances in infrastructure, human resource competence, and artificial intelligence technology on internet network access include improving user experience, extensive network scalability, increasing network efficiency and security, as well as increasing human resource knowledge and developing network architecture research findings regarding the impact of advances in infrastructure, human resource competence, and artificial intelligence technology on internet network access include improving user experience, extensive network scalability, increasing network efficiency and security, as well as increasing human resource knowledge and developing network architecture.
APA, Harvard, Vancouver, ISO, and other styles
10

Wulandari, Retno, Suwarto Suwarto, and Novaliyosi Novaliyosi. "Upaya Meningkatkan Pemahaman Konsep Geometri Ruang pada Pembelajaran Daring dengan Model Discovery learning." Plusminus: Jurnal Pendidikan Matematika 1, no. 2 (2021): 197–206. http://dx.doi.org/10.31980/plusminus.v1i2.1224.

Full text
Abstract:
Online learning or what is called online learning is learning that requires an internet network by utilizing applications such as social media, google classroom, google meet, zoom. The learning process that focuses on students being able to solve problem-solving, to develop knowledge and skills is a discovery learning model. This study intends to analyze the online learning process using the discovery learning model. The conclusion obtained is that the use of online learning is still experiencing problems, such as unstable internet networks, difficulties for students in joining google meet, lack of student discipline in activating the camera. Although it has obstacles in online learning, the discovery learning model can be applied well, this can be seen from the results of students' work in answering questions well.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "GOOGLE – INTERNET – MONOPOLIST - NETWORK"

1

Бондаренко, А. М. "Історія походження назви Google". Thesis, Сумський державний університет, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Krišica, Ondřej. "Využití obsahové sítě v rámci internetové reklamy - zhodnocení faktorů její úspěšnosti." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-162830.

Full text
Abstract:
The thesis is concerned with a content network within the scope of online advertising and evaluation of factors of its success within online campaigns. The introductory part deals with the most common revenue models of online marketing and categorizing methods of online advertising regarding their specifics. The body of the paper describes metrics and a method of targeting applied in contemporaneous practice and furthermore introduces evaluation indicators in online marketing for content networks used in final analysis. The thesis presents and compares advertising systems for targeting in a content network. The goal of the paper is to show impact evaluation of chosen settings of advertising campaigns on their success, more specifically on possibilities of targeting and formulation of recommendations for their management.
APA, Harvard, Vancouver, ISO, and other styles
3

Walczak, Nathalie. "La protection des données personnelles sur l’internet.- Analyse des discours et des enjeux sociopolitiques." Thesis, Lyon 2, 2014. http://www.theses.fr/2014LYO20052/document.

Full text
Abstract:
Cette thèse, dans le cadre des Sciences de l'Information et de la Communication, aborde la question de la protection des données personnelles sur l’internet à travers l’étude des discours de quatre acteurs concernés par ce sujet : les entreprises de l’internet, les instances régulatrices, la population française et la presse nationale. L’objectif est de comprendre comment, à travers les discours de chacun de ces acteurs, se dessinent la question du brouillage des sphères privée et publique sur l’internet. C’est une question qui prend de l’ampleur avec le développement de l’internet, notamment avec la multiplication des réseaux socionumériques, qui offrent aux internautes différentes possibilités pour afficher leur extimité. La multiplication des dispositifs de mise en relation interpersonnelle s'accompagne alors d'une nouvelle dialectique contemporaine entre le privé et le public, pas toujours maîtrisée par les personnes concernées.Cette interaction entre le public et le privé induit un déplacement de la frontière qui sépare les deux sphères et peut entraîner certaines dérives de la part des entreprises spécialisées, telles Google ou Facebook, par rapport à l'agrégation des données personnelles des internautes. En effet, les bases de données sont au cœur du système économique de ces entreprises et ont acquis une valeur marchande liée à des enjeux essentiels par rapport à leur fonctionnement. Or, l’utilisation commerciale des ces données n’est pas nécessairement connue par l’utilisateur et peut être réalisée sans son accord, du moins de manière explicite. Ce double questionnement lié au brouillage des sphères privée et publique, c'est-à-dire, premièrement, l’aspect individuel où l’internaute est incité à dévoiler de plus en plus d’éléments personnels, et, deuxièmement, l’aspect lié à la marchandisation des données par les entreprises de l’internet, engendre alors la question de la confidentialité des données et des libertés individuelles. Les instances régulatrices, que ce soit à l’échelle de la France ou de l’Union Européenne, tentent d’apporter des réponses afin de protéger l’internaute en mettant en place des actions concernant le droit à l’oubli ou en poursuivant juridiquement Google, par exemple, lorsque l’entreprise ne se conforme pas aux lois en vigueur sur le territoire concerné.Les différents angles d’approche ainsi que la diversité des acteurs étudiés ont nécessité la constitution d’un corpus multidimentionnel afin d’avoir une approche comparative des différents représentations. Ce corpus comprend à la fois des textes inscrits comme les discours politiques, les discours des instances régulatrices, les discours des entreprises de l’internet, plus spécifiquement Google et Facebook ou les discours de presse qui occupent une position méta-discursive puisqu’ils se font l’écho des discours des acteurs précédemment énoncés. Il comprend aussi des discours oraux constitués d’entretiens spécialement réalisés dans le cadre de cette recherche auprès d’individus pris au hasard de la population française. Une analyse quantitative des discours entre 2010 et 2013, période contemporaine à la thèse, a permis d’effectuer un premier tri et de ne sélectionner que les discours les plus pertinents par rapport à nos hypothèses. L’analyse qualitative qui a suivi a été basée sur le cadre théorique précédemment élaboré afin de croiser les représentations des acteurs à propos des données personnelles et mettre en évidence les différentes visions inhérentes à cette question<br>This thesis, in Communication and Information Sciences, raises the question of the internet personal data protection through the discourses analysis of four actors concerned with this subject: internet companies, authorities regulating, French population and national press. The objective is to understand how, through the discourses of each one of these actors, the question of the jamming of the spheres private and public about the Internet takes shape. It is a question which increases with the development of the Internet, in particular with the multiplication of the social digital network, which gives to the Internet users various opportunities to display their privacy. The multiplication of the interpersonal relationship devices connection is then accompanied by a contemporary dialectical between private and public spheres, not always controlled by concerned people.This interaction between private and public leads to a transfert of the border wich separates the two spheres and can involves some drifts on behalf of specialized companies, such Google and Facebook, toward the aggregation of personal data contents. Indeed, databases are central in the economic system of these companies and gained a commercial value. However, the commercial use as of these data is not necessarily known by the user and can be realized without its agreement, at least in an explicit way. This double questioning related to the jamming of the private and public spheres, i.e., firstly, the individual aspect where the Internet user is incited to reveal personal elements more and more, and, secondly, the related aspect with the selling of the data by the Internet companies, then generates the question of the individual freedom and data confidentiality. The regulating authorities, in France or in European Union, try to provide answers in order to protect the Internet users by setting up actions relating to the right to be forgotten or by prosecuting Google, for example, when the company does not conform to the laws in force on the territory concerned. The various angles of incidence as well as the diversity of the studied actors required the constitution of a multidimentional corpus in order to have a comparative approach of the different representations. This corpus includes texts registered like political discourses, regulating authorities speeches, companies of the Internet speeches, specifically Google and Facebook, or press speeches which occupy a meta-discursive position since they repeat speeches of the actors previously stated. It includes also oral speeches made up of talks especially recorded for this research with some persons taken randomly in the French population. A quantitative analysis of the discourses between 2010 and 2013, contemporary period with the thesis, permit to carry out a first sorting and to select only the most relevant speeches compared to our hypothesis. The qualitative analysis which followed was based on the theoretical framework previously elaborate in order to cross the representations of the actors in connection with the personal data and to highlight the various visions about this question
APA, Harvard, Vancouver, ISO, and other styles
4

Zháněl, Jiří. "Realizace internetového obchodu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2010. http://www.nusl.cz/ntk/nusl-222661.

Full text
Abstract:
The thesis deals with the analysis of selling method for special literature and suggests the solution how to realize electronic commerce in condition of minimal costs. It concentrates on the offer propagation using online tools and social networks, and gives the instruction how to deal with the solution of selling on the internet.
APA, Harvard, Vancouver, ISO, and other styles
5

Schneigansz, Elize. "Web-based social media and museums in South Africa." Diss., University of Pretoria, 2014. http://hdl.handle.net/2263/41321.

Full text
Abstract:
This study set out to establish an informed framework for the use of social network services in South African museums. Social network services are utilised by a wide demographic spectrum so they offer a cost-effective way to engage with communities and with existing and new stakeholders. The Standard of Generally Recognised Accounting Practice on Heritage Assets, or GRAP 103, and the draft National Policy on Digitisation of Heritage Resources imply that museum collections get documented and managed in digital form. It will coincidentally also enable museums to embrace the use of social network services and share the collections in their custody with many South Africans who are yet to experience the value of museums in the country. Museums are institutions in the service of society which acquires, conserves and communicates the tangible and intangible heritage of people and their environment. During the twentieth century museums have had to reinvent themselves from being unapproachable custodians of heritage to being part of society, willing to engage in discourses and be transformed to remain relevant to the communities they serve. The 2011 Census has found that about 18.2 million of 51.7 million South Africans have had access to the Internet before. Active Internet users however, are about half that figure because it is expensive, the broadband and telecommunications network is not efficient or because people have not yet experienced the value it offers. Government regulations compel Information and Communication Technology (ICT) enterprises to spend 1.5% net profit after tax on socio economic development initiatives. This presents an opportunity for museums as educational institutions to engage with such enterprises to expand Internet access and engage with local communities. The social network service field offers various ways to communicate collections and engage with communities through text, photographs, video and location-based technologies. Various notable local and international initiatives were discussed in this study. For example the Kulturpool which allows visitors to create cyber collections from digitised museum objects and contribute to the knowledge of such objects by allowing them to submit and share information for others to read. SAHRIS, the digital database offered by the South African Heritage Resources Agency, holds the key to similar ventures that museums could pursue. The regulative framework involves privacy, copyright and ethical issues which museums should abide by. Because of the pervasiveness of ICTs museums should take note of these regulations even if they decide not to pursue social network initiatives. ICT skills in museums are insufficient and should be improved upon. Social network services offer training and guidelines on how to use them, which could be a great help provided the reader has a good command of the English language. Cognisance must be taken of an overview social network services and their uses, and of the ethical and regulative framework for museums to benefit from using social network services to engage with communities. This way, communities may benefit from having access to the museum online.<br>Dissertation (MHCS)--University of Pretoria, 2014.<br>gm2014<br>Historical and Heritage Studies<br>unrestricted
APA, Harvard, Vancouver, ISO, and other styles
6

Vu, Xuan Truong. "User-centered and group-based approach for social data filtering and sharing." Thesis, Compiègne, 2015. http://www.theses.fr/2015COMP2179/document.

Full text
Abstract:
Les médias sociaux occupent un rôle grandissant dans de nombreux domaines de notre vie quotidienne. Parmi d'autres, les réseaux sociaux tels que Facebook, Twitter, LinkedIn et Google+ dont la popularité a explosé ces dernières années, attirent des millions d'utilisateurs qui se communiquent, publient et partagent des informations et contenus à un rythme sans précédent. Outre les avantages reconnus, les réseaux sociaux ont également soulevé des problèmes divers. Nous sommes particulièrement intéressés par deux problèmes spécifiques : surcharge d'information et cloisonnement de données. Ces deux problèmes empêchent les utilisateurs d'exploiter pleinement et efficacement la richesse des informations poussées sur les réseaux sociaux. Les utilisateurs ont des difficultés pour filtrer tous les contenus reus, pour découvrir de nouveaux contenus au-delà de leurs réseaux personnels, et surtout pour partager les contenus intéressants avec leurs différents groupes d'intérêt. Pour aider les utilisateurs à surmonter ces difficultés, nous proposons une Approche centrée sur utilisateur et basée groupe pour filtrer et partager des données sociales. Cette nouvelle approche a un double objectif : (1) permettre aux utilisateurs d'agréger leurs données sociales en provenance de différents réseaux sociaux, d'en extraire des contenus de leur intérêt et (2) organiser et partager les contenus au sein de différents groupes. Les membres d'un groupe sont en outre en mesure de choisir quelle partie de leurs données à partager avec le groupe et définir collectivement les sujets d’intérêt de ce dernier. Pour implémenter l'approche proposée, nous spécifions une architecture de système comprenant plusieurs modules extensibles, et nous développons un prototype fonctionnel basé Web, appelé SoCoSys. Les résultats expérimentaux, obtenus des deux tests différents, valident les valeurs ajoutées de notre approche<br>The social media have played an increasingly important role in many areas of our every day life. Among others, social network sites such as Facebook, LinkedIn, Twitter and Google+ have recently exploded in popularity by attracting millions of users, who communicate with each other, share and publish information and contents at an unprecedented rate. Besides the recognized advantages, social network sites have also raised various issues and challenges. We are particularly interested in two of them, information overload and "walled gardens". These two problems prevent the users from fully and efficiently exploiting thewealth of information available on social network sites. The users have difficulties to filter all incoming contents, to discover additional contents from outside of their friend circles, and importantly to share interesting contents with their different groups of interest. For helping the users to overcome such difficulties, we propose a User-centered and group- based approach for social data filtering and sharing. This novel approach has a twofold purpose : (1) allow the users to aggregate their social data from different social network sites, and to extract from those data the contents of their interest, and (2) organize and share the contents within different groups. The members of a group are moreover able to choose which part of their social data to share with the group, and collectively define its topics of interest. To achieve the proposed approach, we define a modular system architecture including a number of extensible modules, and accordingly build a working Web-based prototype, called SoCoSys. The experimental results, obtained from the two different tests, confirm the added values of our approach
APA, Harvard, Vancouver, ISO, and other styles
7

Pipková, Linda. "Doba dohledového kapitalismu." Master's thesis, 2020. http://www.nusl.cz/ntk/nusl-412312.

Full text
Abstract:
The theme of this diploma theses is surveillance capitalism. Its aim is to provide comprehensive insight into the key aspects of this phenomenon that has a significant impact on the global economy and society as a whole. The first part of the thesis deals with the topic of information society and its transformational effect on the economical sphere and surveillance system. It reveals some of the key issues following this new state of society and postmodern surveillance practices as well. The second part of the thesis aims to define what is meant by surveillance capitalism, to uncover the principles and the economic imperatives that dominate various stages of the development and finally to outline the threats and ethical problems this new logic of assimilation has brought in.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "GOOGLE – INTERNET – MONOPOLIST - NETWORK"

1

Brogan, Chris. Google+ for business: How Google's social network changes everything. 2nd ed. Que, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brogan, Chris. Google+ for business: How Google's social network changes everything. Que, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stay, Jesse. Google+ for dummies. Wiley, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

E, Rosch Mark, ed. Google for lawyers: Essential search tips and productivity tools. Law Practice Management Section, American Bar Association, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cooke, Lisa Louise. Genealogy gems: Ultimate research strategies from season one of the Genealogy Gems Podcast. L. Cooke, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Google Business Solutions Allinone For Dummies. For Dummies, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brogan, Chris. Google+ for Business: How Google's Social Network Changes Everything. Que, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brogan, Chris. Google+ for Business: How Google's Social Network Changes Everything. Que, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Roberts, Ralph. Google Plus First Look: A Tip-Packed, Comprehensive Look at Google+. Packt Publishing, Limited, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Google plus first look: A tip-packed, comprehensive look at Google+. Packt Publishing, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "GOOGLE – INTERNET – MONOPOLIST - NETWORK"

1

Kumar, Anil, Abhay Bhatia, Arun Kashyap, and Manish Kumar. "LSTM Network." In Advances in Social Networking and Online Communities. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6909-5.ch007.

Full text
Abstract:
The world wide web (WWW) is an advanced system with an unmatched amount of digital data. Today's internet usage is accessible through common search engines like Google and Yahoo. Cybercriminals have become more assertive on social media. As a result, numerous commercial and trade websites are hacked, leading to forced trafficking of women and children as well as a number of other cybercrimes. Due to this, it is important to identify social media crimes as soon as possible in order to avoid them. To do this, a machine learning technique to detect crimes early must be proposed. Long short-term memory networks are a type of recurrent neural network that can pick up order dependency in problems involving prediction of sequence.
APA, Harvard, Vancouver, ISO, and other styles
2

Tung Chien-Ming and Wu Hsuan-Yi. "An Internet-Connected World: Google's Platform Strategies to Network Industry." In Ambient Intelligence and Smart Environments. IOS Press, 2013. https://doi.org/10.3233/978-1-61499-286-8-201.

Full text
Abstract:
In this Internet-connected world across the globe surrounded by mobile phones, social media, cloud computing and contents, these information resources are owned by the five big technology fiefs &amp;ndash; Apple, Amazon, Facebook, Google, and Microsoft. In this study, we focus on Google's platform strategies on how to manage and utilize its platform to deliver information from core business to partners of its ecosystem (Government/Companies, Innovators, Advertisers/Consumers, Software/Application Developers, Media Companies/Individuals), based on the concepts of platform dominance, dynamic capabilities, cross-platform integration and coopetition. We aim to generate unique strategies to extend Google's business models and its mission &amp;ldquo;to organize the world's information and make it universally accessible and useful&amp;rdquo; for future Internet-connected world.
APA, Harvard, Vancouver, ISO, and other styles
3

Perros, Harry G. "QoS Architectures for the IP Network." In Advances in Computer and Electrical Engineering. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7598-6.ch095.

Full text
Abstract:
When we call someone over the internet using a service such as Skype or Google talk, we may experience certain undesirable problems. For instance, we may not be able to hear the other person very well, or even worse, the call may be dropped. In order to eliminate these problems, the underlying IP network has to be able to provide quality of service guarantees. Several schemes have been developed that enable the IP network to provide such guarantees. Of these schemes, the multi-protocol label switching (MPLS) and the differentiated services (DiffServ) are the most widely used. In this chapter, some of the salient features of MPLS and DiffServ are reviewed.
APA, Harvard, Vancouver, ISO, and other styles
4

Perros, Harry G. "QoS Architectures for the IP Network." In Encyclopedia of Information Science and Technology, Fourth Edition. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2255-3.ch573.

Full text
Abstract:
When we call someone over the Internet using a service such as Skype or Google talk, we may experience certain undesirable problems. For instance, we may not be able to hear the other person very well, or even worse, the call may be dropped. In order to eliminate these problems, the underlying IP network has to be able to provide quality of service guarantees. Several schemes have been developed that enable the IP network to provide such guarantees. Of these schemes, the Multi-Protocol Label Switching (MPLS) and the Differentiated Services (DiffServ) are the most widely used. In this article, some of the salient features of MPLS and DiffServ are reviewed.
APA, Harvard, Vancouver, ISO, and other styles
5

Kerr, Orin. "The Carpenter Adjustment." In The Digital Fourth Amendment. Oxford University PressNew York, NY, 2024. http://dx.doi.org/10.1093/9780190627102.003.0010.

Full text
Abstract:
Abstract This chapter considers how courts should interpret Carpenter v. United States (2018), the Supreme Court’s blockbuster ruling that cell-site location records are protected under the Fourth Amendment. Carpenter is the Supreme Court’s equilibrium-adjustment for noncontent network information: it recognizes that some network metadata is new and that the translation from physical space to network environments should treat some metadata differently. The question is, Which Internet data qualifies? This chapter develops a three-part test to apply Carpenter to Internet information. It then applies the test to a few important types of Internet information, such as Internet protocol addresses, trip information, and Google search terms.
APA, Harvard, Vancouver, ISO, and other styles
6

Upadhyay, Divya, and Ayushi Agarwal. "Smart Bin." In Revolutionizing Industrial Automation Through the Convergence of Artificial Intelligence and the Internet of Things. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-4991-2.ch009.

Full text
Abstract:
The 21st century is the era of the digital world and advanced technologies. This chapter contributes to the Swachh Bharat mission by presenting the concept of smart bin using IoT. The Smart bin presented in this chapter is GPS-enabled and comprises sensors and a camera. A prototype for the proposed model is analysed, and network architecture is designed to communicate the critical information. The proposed system will update the status and condition of the bin to the nearest authority to improve the city's pollution and cleanliness. The prototype is deployed using a microcontroller Raspberry Pi and Google Maps to obtain the bins' real-time location. IoT fill-level sensors will help the garbage carrying truck in identify the nearest empty container without wasting time and resources. Google Maps will help in sensing the optimised routes to the drivers. The microcontroller will be used to integrate the different devices and cameras to provide real-time bin collection, overflowing/under flowing state and tracking information, and suggestions and notifications for effective disposal.
APA, Harvard, Vancouver, ISO, and other styles
7

Rinceanu, Johanna. "The Changing Role of Internet Service Providers." In Criminalizing Intimate Image Abuse. Oxford University PressOxford, 2024. http://dx.doi.org/10.1093/oso/9780198877813.003.0018.

Full text
Abstract:
Abstract This chapter addresses the regulatory framework that governs unlawful online content, including harassment, racism, extremism, and other illegal online content, with a special focus on cyberviolence and online ‘hate speech’—including non-consensual nudity sharing (commonly referred to as revenge porn)—against women. In addition to independent efforts undertaken by Internet Service Providers to combat online criminality by means of self-imposed Community Guidelines or Terms of Use, regulations have been introduced in order to more effectively combat hate and incitement as well as extremism on the Internet. In this respect, this chapter provides an overview on international conventions and action plans, recommendations, resolutions, EU directives, guidelines, and regulations––particularly on the recent enactment of the EU’s Digital Service Act (DSA)––as well as on Germany’s Act to Improve Enforcement of the Law in Social Networks (Network Enforcement Act, NetzDG), as an example of a national regulatory model. NetzDG requires Internet Service Providers with more than two million registered users in Germany (e.g. those on the scale of Google, Facebook, YouTube, X (formerly, Twitter), and Instagram) to set up a transparent complaints management system as private actors in order to efficiently handle complaints about illegal content as defined in NetzDG. The Act imposes on Internet Service Providers the responsibility of balancing human rights and fundamental freedoms against each other, thereby changing the role of these private actors—against their will—and making them gatekeepers at the threshold of fundamental and human rights.
APA, Harvard, Vancouver, ISO, and other styles
8

Tay, Yen Pei, Vasaki Ponnusamy, and Lam Hong Lee. "Big Data in Telecommunications." In Big Data. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9840-6.ch036.

Full text
Abstract:
The meteoric rise of smart devices in dominating worldwide consumer electronics market complemented with data-hungry mobile applications and widely accessible heterogeneous networks e.g. 3G, 4G LTE and Wi-Fi, have elevated Mobile Internet from a ‘nice-to-have' to a mandatory feature on every mobile computing device. This has spurred serious data traffic congestion on mobile networks as a consequence. The nature of mobile network traffic today is more like little Data Tsunami, unpredictable in terms of time and location while pounding the access networks with waves of data streams. This chapter explains how Big Data analytics can be applied to understand the Device-Network-Application (DNA) dimensions in annotating mobile connectivity routine and how Simplify, a seamless network discovery solution developed at Nextwave Technology, can be extended to leverage crowd intelligence in predicting and collaboratively shaping mobile data traffic towards achieving real-time network congestion control. The chapter also presents the Big Data architecture hosted on Google Cloud Platform powering the backbone behind Simplify in realizing its intelligent traffic steering solution.
APA, Harvard, Vancouver, ISO, and other styles
9

Tay, Yen Pei, Vasaki Ponnusamy, and Lam Hong Lee. "Big Data in Telecommunications." In Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8505-5.ch004.

Full text
Abstract:
The meteoric rise of smart devices in dominating worldwide consumer electronics market complemented with data-hungry mobile applications and widely accessible heterogeneous networks e.g. 3G, 4G LTE and Wi-Fi, have elevated Mobile Internet from a ‘nice-to-have' to a mandatory feature on every mobile computing device. This has spurred serious data traffic congestion on mobile networks as a consequence. The nature of mobile network traffic today is more like little Data Tsunami, unpredictable in terms of time and location while pounding the access networks with waves of data streams. This chapter explains how Big Data analytics can be applied to understand the Device-Network-Application (DNA) dimensions in annotating mobile connectivity routine and how Simplify, a seamless network discovery solution developed at Nextwave Technology, can be extended to leverage crowd intelligence in predicting and collaboratively shaping mobile data traffic towards achieving real-time network congestion control. The chapter also presents the Big Data architecture hosted on Google Cloud Platform powering the backbone behind Simplify in realizing its intelligent traffic steering solution.
APA, Harvard, Vancouver, ISO, and other styles
10

Lee-Post, Anita, and Ram Pakath. "Cloud Computing." In Advances in Business Information Systems and Analytics. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5788-5.ch001.

Full text
Abstract:
Cloud Computing refers to providing computing and communications-related services with the aid of remotely located, network-based resources without a user of such resources having to own these resources. The network in question typically, though not necessarily, is the Internet. The resources provisioned encompass a range of services including data, software, storage, security, and so on. For example, when we use a mail service such as Gmail, watch a movie on YouTube, shop at Amazon.com, or store files using DropBox, we are using cloud-based resources (The Google Chrome Team, 2010). In this chapter, the authors examine the evolution of Cloud Computing from its early roots in mainframe-based computing to the present day and also explain the different services rendered by Cloud Computing in today’s business and personal computing contexts. This chapter provides a comprehensive view of the rapidly flourishing field of Cloud Computing and sets the stage for more in-depth discussions on its security, trust, and regulatory aspects elsewhere in this compendium.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "GOOGLE – INTERNET – MONOPOLIST - NETWORK"

1

Mok, Ricky K. P., Hongyu Zou, Rui Yang, Tom Koch, Ethan Katz-Bassett, and K. C. Claffy. "Measuring the network performance of Google cloud platform." In IMC '21: ACM Internet Measurement Conference. ACM, 2021. http://dx.doi.org/10.1145/3487552.3487862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chin, Cheng Siong, Teck Kai Chan, and Tong Rui Peng. "Intelligent Urban Noise Mapping by Google API Network Edge Device." In 2020 International Conference on Internet of Things and Intelligent Applications (ITIA). IEEE, 2020. http://dx.doi.org/10.1109/itia50152.2020.9312241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ramadan, Dadan Nur, Sugondo Hadiyoso, and Ahmad Rizaldi Sakti. "Internet of Things: Roboboat for Water Area Monitoring using 4G network and Google Firebase." In 2019 International Conference of Artificial Intelligence and Information Technology (ICAIIT). IEEE, 2019. http://dx.doi.org/10.1109/icaiit.2019.8834532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Feifei, Qian Li, Xin Li, Lucheng Huang, and Xiaoli Wang. "Dynamic Network Analysis of Inter-Firm R&D Cooperation Based on Internet Information: A Case Study of Google." In 2017 Portland International Conference on Management of Engineering and Technology (PICMET). IEEE, 2017. http://dx.doi.org/10.23919/picmet.2017.8125262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dantas, Ícaro, Li Weigang, and Ahmed Saleh. "Construção de Micro Rede Social Acadêmica para Análise a Influência dos Artigos e Autores." In IV Brazilian Workshop on Social Network Analysis and Mining. Sociedade Brasileira de Computação - SBC, 2015. http://dx.doi.org/10.5753/brasnam.2015.6794.

Full text
Abstract:
O Google Acadêmico e outras redes de pesquisa por materiais acadêmicos disponibilizam grande quantidade de informação na Internet. Em diversos casos não é possível fazer consulta e análise mais detalhada das informações. Esta pesquisa propõe utilizar Follow Model como ferramenta para categorizar os nós de uma rede. Como o Follow Model apresenta grande potencial para trabalharmos com redes sociais online, ele foi adaptado para podermos fazer classificação de nós, assim como os modelos do PageRank, e InventorRank, no estudo da MRSA. O estudo demonstra como o Follow Model é robusto e como podemos melhorar consultas de material acadêmico.
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Shengming, Yuanchen Zhang, and Chuding Chen. "Integration of Big Data Analysis and Computation on the Assessment of User Experience in Cultural Curation Based on Co-occurrence Network of Google Search in the 2023 Taiwan Hakka Expo." In 2024 IEEE 4th International Conference on Electronic Communications, Internet of Things and Big Data (ICEIB). IEEE, 2024. http://dx.doi.org/10.1109/iceib61477.2024.10602645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Silva, Kéthlyn C., Lucas José de Faria, Deborah S. A. Fernandes, Márcio Giovane C. Fernandes, and Fabrízzio Soares. "Relacionamento estatístico entre indicadores de dados de internet em língua portuguesa e bolsa de valores." In Escola Regional de Informática de Goiás. Sociedade Brasileira de Computação, 2022. http://dx.doi.org/10.5753/erigo.2022.227683.

Full text
Abstract:
Este trabalho apresenta uma análise estatística entre indicadores obtidos de dados de internet em língua portuguesa - sentimento de notícias e Google Trends - e dados sobre o mercado brasileiro de bolsa de valores através do coeficiente de correlação de postos de Spearman. A metodologia utilizada para coleta, pré-processamento e obtenção de cada indicador é detalhada. Foram obtidos dados dos anos de 2019 a 2021. Para a análise de sentimento das notícias foi adotado um modelo CNN (Convolutional Neural Network) o qual obteve um F1-score de 96%. Como resultados foram obtidas algumas correlações interessantes dentre as quais, uma correlação inversa caracterizada como moderada (segundo a escala de Cohen) entre o sentimento das notícias e preço de fechamento ajustado em 2019; entre volume de buscas e preço de fechamento, uma correlação negativa e “muito grande” e positiva e “grande” entre o volume de negociações e o volume de buscas. Tanto em 2020 como em 2021, constatou-se coeficientes negativos definidos como “grandes”, levando em conta o preço de fechamento e volume de negociações.
APA, Harvard, Vancouver, ISO, and other styles
8

Archvadze, Joseph, and Lia Kurkhuli. "Black and White Shades of Social Network: Political-Economic and Psychological Aspects." In V National Scientific Conference. Grigol Robakidze University, 2023. http://dx.doi.org/10.55896/978-9941-8-5764-5/2023-132-142.

Full text
Abstract:
The introduction of social networks (Facebook, Twitter, google+, Instagram, Youtube, Whatsapp, Tik Tok, Linkedin, etc.) is the largest transition in the history of mankind, in terms of dissemination of information since Gutenberg began printing. Its "passing pawns" are efficiency, mass character and instantaneous distribution. The behavior of people and their relationships social networks took on a strong "boarding". Before our eyes, a process is taking place when an increasing part of the population is changing the "Party of the TV" to the "Party of the Internet." Social networks have significantly narrowed, and in fact put an end to, the monopoly of television in the formation of public opinion. Moreover, they, in particular Facebook, having overcome the barriers of almost any censorship, have turned the globe into one "global village". This is actually the "agora" of the twenty-first century. They adequately continued the process of "levelling" between the rich and the poor in terms of access to news, entertainment, shows, provided earlier by traditional media (press, radio, television). The Internet began, and the social network accelerated an unprecedented language revolution, rooted or filled with new meaning in everyday life “traditional” words, terms or phrases: hashtag, selfie, trolling, ban, chat, blog, avatar, meme, gif, etc. Over-reliance on the Internet and social media has become a global disease that surpasses the most acute, formidable pandemics in human history in scale. This means that excessive dependence on social networks is too similar to gambling addiction - the repetition of the same actions for a long time and a weakened perception of time, the replacement of real life and activity with virtual ... The development of information technology is “encouraging” by stuffing more and more new functions and expanding the range of possibilities of smartphone functions, which further strengthens people's attachment to them and the social and psychological problems associated with it. At the same time, the development of dialectics suggests that the time is not far off when the opposite trend will also appear: the desire for liberation from excessive dependence on the Internet and gadgets, as a measure of true freedom. The time will come when such freedom will be as prestigious as owning a personal computer or a mobile phone a few decades ago... Keywords: Internet, Social network, Facebook, Information, Addiction.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Linxi, and Di Ma. "Evaluating Network Security Configuration (NSC) Practices in Vehicle-Related Android Applications." In WCX SAE World Congress Experience. SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2881.

Full text
Abstract:
&lt;div class="section abstract"&gt;&lt;div class="htmlview paragraph"&gt;Android applications have historically faced vulnerabilities to man-in-the-middle attacks due to insecure custom SSL/TLS certificate validation implementations. In response, Google introduced the Network Security Configuration (NSC) as a configuration-based solution to improve the security of certificate validation practices. NSC was initially developed to enhance the security of Android applications by providing developers with a framework to customize network security settings. However, recent studies have shown that it is often not being leveraged appropriately to enhance security. Motivated by the surge in vehicular connectivity and the corresponding impact on user security and data privacy, our research pivots to the domain of mobile applications for vehicles. As vehicles increasingly become repositories of personal data and integral nodes in the Internet of Things (IoT) ecosystem, ensuring their security moves beyond traditional issues to one of public safety and trust. To provide a view of the current vehicle apps security landscape, we delve into 122 vehicle-related apps, grouping them into three distinct categories: official car apps developed by manufacturers, general car-related apps, and OBD-II diagnostic tool apps. Our findings show that 68.85% of apps utilize NSC with varying degrees of NSC customization and security practices across these categories. Additionally, understanding that frequent updates often correlate with active maintenance and potential security patching, we analyze the update frequencies of the top ten downloaded apps in each category. The results provide valuable insight into app developers’ level of commitment to safety in the evolving automotive ecosystem. This research aims to drive awareness, underline existing security NSC practices, and pave the way for a more secure vehicular app environment.&lt;/div&gt;&lt;/div&gt;
APA, Harvard, Vancouver, ISO, and other styles
10

Umiati, Sri. "Systematic Review: Factors Associated with Implementation of Health Information Management in Community Health Centers." In The 7th International Conference on Public Health 2020. Masters Program in Public Health, Universitas Sebelas Maret, 2020. http://dx.doi.org/10.26911/the7thicph.04.48.

Full text
Abstract:
ABSTRACT Background: Community health center (puskesmas) management information system or often referred to as SIMPUS is a local health system aimed at providing health information at primary health care level. This health information systems have been implemented in many districts. However, their performance is yet to be improved caused by several factors such as a lack of human resources and hardware. This study aimed to investigate factors associated with implementation of health information management in community health centers. Subjects and Method: This was a systematic review by collecting published articles in open-access journals and proceedings from Directory of Open Access Journal, Elsevier, and Google scholar databases. “Health information system”, “implementation health information system”, and “evaluation health information system” were used as key findings. The selected articles were reviewed by meta-aggregate. Results: Previous studies reported that implementation of health information management in community health center faced several barriers, including (1) incomplete data, and (2) low monitoring and safety control. To implement health information management properly, the following components need to be fulfilled: (1) infrastructure availability (software, hardware, data safety, and internet network speed), (2) human source (user knowledge, experience, skill, accuracy), and (3) funds. Conclusion: Implementation of health information management in community health center is affected by infrastructure availability, internet network speed, user knowledge and experience, and funds. Keywords: health information management, community health center Correspondence: Sri Umiati. Masters Program in Public Health, Universitas Sebelas Maret. Jl. Ir. Sutami 36A, Surakarta, Central Java. Email: umi2374@gmail.com. DOI: https://doi.org/10.26911/the7thicph.04.48
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!