7 research outputs found

    Use of social networking in the Middle East: student perspectives in higher education

    Get PDF
    This study aims to determine the benefits, risks, awareness, cultural factors, and sustainability, allied to social networking (SN) use in the higher education (HE) sector in Middle Eastern countries, namely Jordan, Saudi Arabia, and Turkey. Using an online survey, 1180 complete responses were collected and analyzed using the statistical confirmatory factor analysis method. The use of SN in the Middle Eastern HE sector has the capacity to promote and motivate students to acquire professional and personal skills for their studies and future workplace; however, the use of SN by tertiary students is also associated with several risks: isolation, depression, privacy, and security. Furthermore, culture is influenced by using SN use, since some countries shifted from one dimension to another based on Hofstede's cultural framework. The study new findings are based on a sample at a specific point in time within a culture. The study findings encourage academics to include SN in unit activities and assessments to reap the benefits of SN, while taking steps to mitigate any risks that SN poses to students. Although other studies in the Middle East examined the use of Learning Management System and Facebook in, HE as a means of engaging students in discussions and communications, however, this study contributes a better understanding of the benefits and risks, awareness, culture, and sustainability, associated with the use of SN in the HE sector in the Middle East. Finally, the paper concludes with an acknowledgment of the study limitations and suggestions for future research

    Influence Analysis for Online Social Networks

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Diffusion, Infection and Social (Information) Network Database

    Get PDF
    Research to analyze diffusive phenomena over large rich datasets has received considerable attention in recent years. Moreover, with the appearance and proliferation of online social network services, social (information) network analysis and mining techniques have become closely intertwined with the analysis of diffusive and infection phenomena. In this dissertation, we suggest various analysis and mining techniques to solve problems related to diffusive and infection phenomena over social (information) networks built from various datasets in diverse areas. This research makes five contributions. The first contribution is about influence analysis in social networks for which we suggest two new centrality measures, Diffusion Centrality and Covertness Centrality. Diffusion Centrality quantifies the influence of vertices in social networks with respect to a given diffusion model which explains how a diffusive property is spreading. Covertness Centrality quantifies how well a vertex can communicate (diffuse information) with (to) others and hide in networks as a common vertex w.r.t. a set of centrality measures. The second contribution is about network simplification problems to scale up analysis techniques for very large networks. For this topic, two techniques, CoarseNet and Coarsened Back and Forth (CBAF), are suggested in order to find a succinct representation of networks while preserving key characteristics for diffusion processes on that network. The third contribution is about social network databases. We propose a new network model, STUN (Spatio-Temporal Uncertain Networks), whose edges are characterized with uncertainty, space, and time, and develop a graph index structure to retrieve graph patterns over the network efficiently. The fourth contribution develops epidemic models and ensembles to predict the number of malware infections in countries using past detection history. In our fifth contribution, we also develop methods to predict financial crises of countries using financial connectedness among countries

    Reshaping Higher Education for a Post-COVID-19 World: Lessons Learned and Moving Forward

    Get PDF
    No abstract available

    From random failures to targeted attacks in network dismantling

    No full text
    It is well-known that real-world systems, modeled as complex networks, are mostly robust against random failures but susceptible to targeted attacks. In this study, we propose a novel perspective to solve the network dismantling problem. Instead of designing an effective attack from scratch, we show how knowledge extracted from random failures in the network leads to extremely effective attacks. This observed connection between random failures and targeted attacks is striking on its own. Experiments on a wide range of networks show the efficacy of our novel method for network dismantling, providing an excellent trade-off between attack quality and scalability. We believe that our contribution also stimulates research in related domains, including social network influence analysis, spreading dynamics in networks, and efficiency considerations.This study is supported by the National Natural Science Foundation of China (Grants No. 61861136005, No. 61851110763).Peer reviewe
    corecore