Filters








989 Hits in 9.1 sec

Battling the Internet Water Army: Detection of Hidden Paid Posters [article]

Cheng Chen, Kui Wu, Venkatesh Srinivasan, Xudong Zhang
2011 arXiv   pre-print
We initiate a systematic study to help distinguish a special group of online users, called hidden paid posters, or termed "Internet water army" in China, from the legitimate ones.  ...  On the Internet, the paid posters represent a new type of online job opportunity.  ...  Xudong Zhang's internship at the University of Victoria.  ... 
arXiv:1111.4297v1 fatcat:4b2hsjvlpvh47ju7whqx3kkikm

Battling the internet water army

Cheng Chen, Kui Wu, Venkatesh Srinivasan, Xudong Zhang
2013 Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining - ASONAM '13  
These messages come from a special group of online users, called online paid posters, or termed "Internet water army" in China, represents a new type of online job opportunities.  ...  Online paid posters get paid for posting comments or articles on different online communities and websites for hidden purpose, e.g., to influence the opinion of other people towards certain social events  ...  ACKNOWLEDGEMENTS The two-year graduate study in the University of Victoria is a fascinating experience for me.  ... 
doi:10.1145/2492517.2492637 dblp:conf/asunam/ChenWSZ13 fatcat:ly4zk55i3vdnvjlaobdgeokw3m

Seminar Users in the Arabic Twitter Sphere [article]

Kareem Darwish, Dimitar Alexandrov, Preslav Nakov, Yelena Mejova
2017 arXiv   pre-print
parts of the world and in other languages.  ...  In our case study, we found that 25% of the users engaged in the topic are in fact seminar users and their tweets make nearly a third of the on-topic tweets.  ...  Internet Research ( ), -( ) . Chen, C., Wu, K., Srinivasan, V., Zhang, X.: Battling the Internet Water Army: detection of hidden paid posters.  ... 
arXiv:1707.07276v1 fatcat:kj7t6bjfurh43akssglhs735cq

An Avid New Audience for Preprints—Extremists

Michelle Z Donahue
2021 BioScience  
technology to influence their own circles of interest.  ...  In the "proof is in the preprint" lineup: artificial intelligence.  ...  Take a moment to follow the arXiv link to the paper, "Battling the Internet Water Army: Detection of Hidden Paid Posters," and a headscratcher emerges.  ... 
doi:10.1093/biosci/biab090 fatcat:lhpgw4q4wbelljwtyzwegy7sk4

The Deterrent Effect of the Death Penalty? Evidence from British Commutations During World War I

Daniel L. Chen
2016 Social Science Research Network  
Using this result, I identify the effect of executions on subsequent desertions.  ...  During World War I, the British military condemned over 3,000 soldiers to death, but only executed 12% of them; the others received commuted sentences, unbeknownst to soldiers at the time.  ...  hidden from public (Katz et al. 2003).  ... 
doi:10.2139/ssrn.2740549 fatcat:isi2bgtnofhmzdaseovqtff7xq

"Fake News" Legislation in Thailand: The Good, the Bad and the Ugly

Robert Smith, Mark Perry
2020 Athens Journal of Law  
Probably a greater threat to personal freedom is individuals and organisations that surf the internet looking for posts that conflict with their point of view and then take legal action so that the supposed  ...  The amended legislation also created a computer data screening panel, which monitors the internet for "fake news".  ...  posters account.  ... 
doi:10.30958/ajl.6-3-3 fatcat:mql7uhcytrbvtajyqjw7zfqpiu

Works Cited [chapter]

2021 Julius Caesar and the Roman People  
In any other man, such talents and accomplishments would form the centerpiece of his legacy to posterity, but in Caesar's case, they are overshadowed by his achievements in military and political life.  ...  The books of the corpus of Caesar's works are counted  ...  The Chronology of Caesar's Campaigns Kurt A. Raaflaub and John T. Ramsey  ... 
doi:10.1017/9781108943260.012 fatcat:qwvnr44vrngdxpav4mjrfndi4a

Miscellaneous Surveillance: Computers [chapter]

2000 Understanding Surveillance Technologies  
Securities Exchange Commission (SEC) -The SEC Division of Enforcement surveils securitiesrelated activities on the Internet.  ...  Membership is not open to private detectives or vendors. The organization sponsors an annual seminar and exhibition.  ...  The members of the Valera had abandoned ship and were rescued from the water by a small Coast Guard boat.  ... 
doi:10.1201/9781420038811-22 fatcat:zceparnonbgynhzl5braxfh6au

SOUTH AFRICAN POLICE SERVICE CAPACITY TO RESPOND TO CYBERCRIME: CHALLENGES AND POTENTIALS

Mmabatho Aphane, Jacob Mofokeng
2021 Journal of Southwest Jiaotong University  
In addition, as the study showed, the lack of a clear legal framework makes it difficult to investigate and prosecute crimes committed with the Internet, as the authorities are forced to rely on the Criminal  ...  For the police to successfully investigate and punish acts of crime, it is necessary to know and understand the operations of the perpetrators.  ...  Much attention is paid to analyses of crime patterns and trends and the application of intelligence-led policing to strategize responses and target resources [16] .  ... 
doi:10.35741/issn.0258-2724.56.4.15 fatcat:gsxc4zkhorhrvpaaihqydjow2q

Spring 2016

Editorial Board
2016 Cornell international affairs review  
"Until the Will of the People Reveres Heaven and Earth, There Will Not Be Beau- tiful Waters and Green Mountains." Poster located on the north side of Picai Hutong Rd, Beijing, China.  ...  by Volume IX Spring Figure 3 22 Figure 4 224 23 22 "Until the Will of the People Reveres Heaven and Earth, There Will Not Be Beautiful Waters and Green Mountains," Poster located on the north side of  ...  To develop the talks with the support of the governments of Cuba and Norway as guarantors and the governments of Venezuela and Chile as accompaniers.  ... 
doi:10.37513/ciar.v9i2.482 fatcat:xxdqva7vbzdi7c4j76sgrlhbgu

Female Portraits from Long Ago. Graphic Artworks in the Collection of the National Museum

Claudia M. Bonța, Melinda Mitu
2022 Acta Musei Napocensis. Historica  
, most of which belong to the artistic world of those times.  ...  The precise artistic investigation of the portraits accomplished in romantic or Biedermeier style is completed by the presence of some compositional portraits in the collections, which bring a note of  ...  conditions, with no rest, water or food.  ... 
doi:10.54145/actamn.58.06 fatcat:koyijk3qknbwnbfs47bhwe7yku

Special Issue Editorial: The Impact of Globalization for Adult Education and Higher Education

Mary Gene Saudelli, Dolana Mogadime
2013 Brock Education: a Journal of Educational Research and Practice  
As the editors of this special issue, we sought manuscripts that considered the question: How does globalization play out within the practice of teaching and research in adult and higher education?  ...  in the Faculty of Education's "Distinguished Speaker Lecture Series."  ...  The authors would like to thank the reviewers and editors for their insightful comments on earlier drafts of this paper.  ... 
doi:10.26522/brocked.v22i2.338 fatcat:n7hpxmqejjd3haro73nfzwpani

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
Finest Hour: The Battle of Britain (R 20 98) f Nick Atty addressed as "Mr.  ...  Internet voting is a disaster waiting to happen in light of the inadequate security of the Internet, personal computer systems, and subvertible servers.  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
Finest Hour: The Battle of Britain (R 20 98) f Nick Atty addressed as "Mr.  ...  Internet voting is a disaster waiting to happen in light of the inadequate security of the Internet, personal computer systems, and subvertible servers.  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
Finest Hour: The Battle of Britain (R 20 98) f Nick Atty addressed as "Mr.  ...  Internet voting is a disaster waiting to happen in light of the inadequate security of the Internet, personal computer systems, and subvertible servers.  ...  ef$ Water company software upgrade results in monster water bill and threats of penalties and interest (R 20 12) f British Gas blames SW for sending 15,000 customers false warnings (S 19 2:4) $f Marks&  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji
« Previous Showing results 1 — 15 out of 989 results