首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 33 毫秒
1.
电子邮件已渐渐在网络通信中扮演极其重要的角色,成为构建Internet的基石之一。本文在对垃圾邮件做了简单介绍的基础上,分析了垃圾邮件在我国肆意泛滥的严重危害,并论述了现今被广泛使用的几种主流反垃圾邮件过滤技术。  相似文献   

2.
After reviewing some of the difficulties caused by spam and summarizing the arguments of its defenders, this paper will focus on its present legal status. It will then dwell on spam from a moral point of view and address some of the ethical implications associated with transmitting this unsolicited commercial e-mail. It will attempt to sort out the conflicting rights involved and develop a viable case that even if we prescind from its social costs, spam is ethically questionable under certain conditions. Moreover, given the current volume of spam and its negative impact on the Internet environment, the transmission of spam can also be characterized as an asocial act primarily because of the significant externalities which it generates. As a result, spam cannot be justified from the perspective of duty-based moral philosophies that emphasize the need to conform to the legitimate norms of the community.  相似文献   

3.
全球互联网的快速发展,电子邮件的使用已与人们的日常生活密不可分.随之泛滥的垃圾电子邮件侵蚀着网络社会的互信与资源,引发了诸多的法律问题.而我国目前还没有直接规范垃圾电子邮件的法律法规.法律法规的欠缺是垃圾电子邮件泛滥的重要原因之一.因此通过对国外反垃圾邮件立法借鉴,结合我国实际,提出规制垃圾电子邮件的立法建议,以求遏制垃圾电子邮件的泛滥趋势.  相似文献   

4.
赵静娴 《现代情报》2016,36(4):57-61
定义垃圾评论边界,利用智能算法有效识别垃圾评论。对垃圾评论进行内部细分,构建评价指标体系,并提出一种改良决策树方法对垃圾评论进行智能评估,并提供可读性规则。基于Matlab语言实现,通过实证研究,验证所构建的垃圾评论识别模型能够达到较高预测精度。提供了一种高效的多在线评论多分类智能识别方法,为垃圾评论的分类监管治理提供技术支持。  相似文献   

5.
李爽 《科技通报》2012,28(4):180-181
针对传统的朴素贝叶斯算法对垃圾邮件的过滤率不高等问题,提出了一种基于最小风险贝叶斯网络垃圾邮件信息过滤技术,提出的最小风险贝叶斯能够减少正常邮件判为垃圾邮件的风险,最后实验表明,与传统的算法相比较,本文提出的方法过滤效果有较大的提高。  相似文献   

6.
朱娟 《现代情报》2017,37(5):166-171
[目的/意义] 对在线虚假评论的现有研究进行梳理,分析研究现状,明确未来研究发展方向。[方法/过程] 以CNKI和Web of Science文献为研究对象,从文献分析的视角,采用定性与定量分析相结合的方法,从虚假评论的识别方法、特征提取以及防治策略的角度,对国内外虚假评论研究的现状进行了分析,总结和概括了本领域研究的热点和存在的问题。[结果/结论] 研究表明,在虚假评论的识别方法上,需加强对半监督和无监督学习的研究;在特征提取上,可考虑本体技术的应用;在防治策略上,要考虑多学科多领域的合作。  相似文献   

7.
Spam in recent years has pervaded all forms of digital communication.The increase in user base for social platforms like Facebook, Twitter, YouTube, etc., has opened new avenues for spammers. The liberty to contribute content freely has encouraged the spammers to exploit the social platforms for their benefits. E-mail and web search engine being the early victims of spam have attracted serious attention from the information scientists for quite some time. A substantial amount of research has been directed to combat spam on these two platforms. Social networks being quite different in nature from the earlier two, have different kinds of spam and spam-fighting techniques from these domains seldom work. Moreover, due to the continuous and rapid evolution of social media, spam themselves evolve very fast posing a great challenge to the community. Despite being relatively new, there has been a number of attempts in the area of social spam in the recent past and a lot many are certain to come in near future. This paper surveys the recent developments in the area of social spam detection and mitigation, its theoretical models and applications along with their qualitative comparison. We present the state-of-the-art and attempt to provide challenges to be addressed, as the nature and content of spam are bound to get more complicated.  相似文献   

8.
赵凯 《科技通报》2012,28(6):85-86
电子邮件是人们交流的主要方式之一,但垃圾邮件的泛滥给使用者带来了很大的困扰。鉴于传统过滤技术的缺点,本文采用性能更优的Fuzzy-ID3方法对邮件进行分析,通过提取邮件的特征信息、数据预处理等步骤,得到一棵修剪后的模糊决策树,并转换为的邮件分类规则,使用这些规则可以提高邮件分类的准确性及效率。  相似文献   

9.
Blogging has been an emerging media for people to express themselves. However, the presence of spam blogs (also known as splogs) may reduce the value of blogs and blog search engines. Hence, splog detection has recently attracted much attention from research. Most existing works on splog detection identify splogs using their content/link features and target on spam filters protecting blog search engines’ index from spam. In this paper, we propose a splog detection framework by monitoring the on-line search results. The novelty of our splog detection is that our detection capitalizes on the results returned by search engines. The proposed method therefore is particularly useful in detecting those splogs that have successfully slipped through the spam filters that are also actively generating spam-posts. More specifically, our method monitors the top-ranked results of a sequence of temporally-ordered queries and detects splogs based on blogs’ temporal behavior. The temporal behavior of a blog is maintained in a blog profile. Given blog profiles, splog detecting functions have been proposed and evaluated using real data collected from a popular blog search engine. Our experiments have demonstrated that splogs could be detected with high accuracy. The proposed method can be implemented on top of any existing blog search engine without intrusion to the latter.  相似文献   

10.
胡琨  陈荣  吉久明 《现代情报》2017,37(7):144-150
中国高校的专利表现出了显著的重数量、轻维持的特征,非商业化的专利申请动机被认为是主要原因,有必要进行深入挖掘。本文探讨了商业化动机的概念,采用计量学方法,讨论了中国所有高校及华东理工大学、上海交通大学、东华大学3所高校的专利动机,并尝试主要以专利寿命为依据对商业化动机的强弱进行评估。研究发现,中国高校的专利不但平均寿命较短,而且在年费补贴结束时有大量的专利集中失效,反映了非商业化的动机广泛存在。改进考核评价体系,引入针对商业化的考核项目是可行的解决问题的方法。  相似文献   

11.
The problem of social spam detection has been traditionally modeled as a supervised classification problem. Despite the initial success of this detection approach, later analysis of proposed systems and detection features has shown that, like email spam, the dynamic and adversarial nature of social spam makes the performance achieved by supervised systems hard to maintain. In this paper, we investigate the possibility of using the output of previously proposed supervised classification systems as a tool for spammers discovery. The hypothesis is that these systems are still highly capable of detecting spammers reliably even when their recall is far from perfect. We then propose to use the output of these classifiers as prior beliefs in a probabilistic graphical model framework. This framework allows beliefs to be propagated to similar social accounts. Basing similarity on a who-connects-to-whom network has been empirically critiqued in recent literature and we propose here an alternative definition based on a bipartite users-content interaction graph. For evaluation, we build a Markov Random Field on a graph of similar users and compute prior beliefs using a selection of state-of-the-art classifiers. We apply Loopy Belief Propagation to obtain posterior predictions on users. The proposed system is evaluated on a recent Twitter dataset that we collected and manually labeled. Classification results show a significant increase in recall and a maintained precision. This validates that formulating the detection problem with an undirected graphical model framework permits to restore the deteriorated performances of previously proposed statistical classifiers and to effectively mitigate the effect of spam evolution.  相似文献   

12.
社会养老保险中的道德风险--兼与商业寿险道德风险比较   总被引:5,自引:0,他引:5  
道德风险成为社会养老保险制度运行低效率的重要致因。与商业寿险道德风险相比,社会养老保险道德风险发生机制更加复杂,表现更具隐蔽性,对制度的设计和执行具有更高的要求,规避社会养老保险道德风险应当成为提高制度运行效率的重要议题。  相似文献   

13.
陈雪溶 《科教文汇》2011,(11):24-26
我国中学的德育由于存在观念陈旧、内容片面复杂、教育手段单一生硬以及体系的不健全等问题,严重制约素质教育的发展。究其根源,除了时代大潮的冲击外,还存在自身理论研究滞后,对新时代学生的了解认识不足等原因。德育需要引起全社会的共同关注,重视转化观念,借鉴吸收国外先进经验,建立并保持本国特色德育观,摆正学生在德育中的主体地位,细化、量化德育内容,采取更自然、带有艺术性的教育手段,建成德育网络化、规模化的系统工程。  相似文献   

14.
陈娜娜 《科教文汇》2014,(14):12-12
在留守儿童的德育工作中,教师要改变传统僵化的德育模式,以情感人,以爱育人,学会欣赏学生,全力改进留守儿童德育工作模式。  相似文献   

15.
冯菊香 《大众科技》2011,(11):188-190
当下大学德育的一些现状令人堪忧,如新闻传播专业学生,作为未来的新闻传播预备人才,处在信息高度密集化、观念多元化的媒介环境中,很容易沉湎于表层信息而迷失方向,因此新闻传播专业学生的德育教育应引起高度重视。已有的关于非编实践教学论文多从技术层面展开研讨,文章试图从德育缺失的角度,对非编的选题策划、拍摄及使用设备、后期编辑、...  相似文献   

16.
Floridi and Sanders, seminal work, “On the morality of artificial agents” has catalyzed attention around the moral status of computer systems that perform tasks for humans, effectively acting as “artificial agents.” Floridi and Sanders argue that the class of entities considered moral agents can be expanded to include computers if we adopt the appropriate level of abstraction. In this paper we argue that the move to distinguish levels of abstraction is far from decisive on this issue. We also argue that adopting certain levels of abstraction out of context can be dangerous when the level of abstraction obscures the humans who constitute computer systems. We arrive at this critique of Floridi and Sanders by examining the debate over the moral status of computer systems using the notion of interpretive flexibility. We frame the debate as a struggle over the meaning and significance of computer systems that behave independently, and not as a debate about the ‘true’ status of autonomous systems. Our analysis leads to the conclusion that while levels of abstraction are useful for particular purposes, when it comes to agency and responsibility, computer systems should be conceptualized and identified in ways that keep them tethered to the humans who create and deploy them.  相似文献   

17.
The technology acceptance model (TAM) has proven to be one of the most powerful theories to explain user's technology adoption. Among many external variables incorporated into TAM, trust is considered to be an important factor that influences the user's online behavior, especially in the e-commerce context. This study conducts a meta-analysis based on the previous TAM studies in an attempt to make well-grounded statements on the role of trust. Furthermore, the paper examines those TAM studies by considering moderating effects of subject type (students or non-students) and context type (commercial or non-commercial). Results indicate a significant influence of trust on TAM constructs. Moderating effects are found for most pair-wise relationships. The findings yield implications for both researchers and service providers.  相似文献   

18.
电子商务模拟实验系统的商务模式构建   总被引:2,自引:0,他引:2  
张向先  魏革 《情报科学》2003,21(12):1307-1310
本文在系统分析电子商务模拟实验系统商务模式发展状况的基础上,深入研究了电子商务模拟实验系统商务模式的构建原则,提出了电子商务模拟实验系统的设计要求,并具体描述了该系统商务模式的功能模块。  相似文献   

19.
Computer-mediated communication (CMC) has become an integral part of scientific work. Based on interviews with academic scientists in four fields, we discuss the impacts of CMC on the organization of scientific work. We find evidence that CMC may be leading to new collaboration patterns, more communication within collaborations, and peripherality effects. However, these effects are heavily mediated by the nature of access and the social context into which CMC has been introduced.  相似文献   

20.
Computer-mediated communication (CMC) has become an integral part of scientific work. Based on interviews with academic scientists in four fields, we discuss the impacts of CMC on the organization of scientific work. We find evidence that CMC may be leading to new collaboration patterns, more communication within collaborations, and peripherality effects. However, these effects are heavily mediated by the nature of access and the social context into which CMC has been introduced.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号