DEVELOPMENT OF BASIC CONCEPT OF ICT PLATFORMS DEPLOYMENT STRATEGY FOR SOCIAL MEDIA MARKETING CONSIDERING TECTONIC THEORY
This paper presents authors analytical view on social impacts as targeted advertisement into the network environment using Omori tectonic theory for description the processes of audience response evolution. This could be extremely important and useful in the modern world to realize desirable e-Gov informational policy in the circumstances of hybrid treats emergence that is especially relevant for the informational space and reaching a cyber-supremacy. Some mathematical and algorithmic basics were contributed for narrative description of information and communications technologies (ICT) architectural deployment could be used for outer regulation of audience response character by Social Media Marketing (SMM) principles. That could be performed by controlled distribution of specified digital content that contains respective key phrases, for example social advertisements and analyzing respective feed-backs. Some results of the empiric study of live audience response dependence on controlled impacts are discussed. Election processes data and recent media recordings for preliminary proof of the contributed concept feasibility have been analyzed. There were shown using gathered empiric data sets, that the extent of impacts to targeted audience response intensity could be the subject of outer regulation. The index has been contributed for assessment the efficiency of the impact’s propagation inside the audience by calculation of row correlation of keyword occurrence and audience response intensity. The approaches suggested in the article can be useful both for building effective interactive systems of state-society interaction and for detecting manipulative traits when influencing a specific audience
Klimek, P., Bayer, W., Thurner, S. (2011). The blogosphere as an excitable social medium: Richter’s and Omori’s Law in media coverage. Physica A: Statistical Mechanics and Its Applications, 390 (21-22), 3870–3875. doi: https://doi.org/10.1016/j.physa.2011.05.033
Shinyaeva, T. S., Tarasevich, Y. Y. (2016). Virtual network as excitable medium. Journal of Physics: Conference Series, 681, 012008. doi: https://doi.org/10.1088/1742-6596/681/1/012008
Szell, M., Grauwin, S., Ratti, C. (2014). Contraction of Online Response to Major Events. PLoS ONE, 9 (2), e89052. doi: https://doi.org/10.1371/journal.pone.0089052
Utsu, T., Ogata, Y., S, R., Matsu’ura (1995). The Centenary of the Omori Formula for a Decay Law of Aftershock Activity. Journal of Physics of the Earth, 43 (1), 1–33. doi: https://doi.org/10.4294/jpe1952.43.1
Yoo, S.-C., Shin, I. (2018). Digital Signage Media Creative : A Study for the Media Typology and Advertising Creative Strategy for Digital Signage. The Korean Journal of Advertising, 29 (6), 81–108. doi: https://doi.org/10.14377/kja.2018.8.31.81
Dunbar, R. I. M., Arnaboldi, V., Conti, M., Passarella, A. (2015). The structure of online social networks mirrors those in the offline world. Social Networks, 43, 39–47. doi: https://doi.org/10.1016/j.socnet.2015.04.005
Correig, A. M., Urquizú, M., Vila, J., Manrubia, S. C. (1997). Aftershock series of event February 18, 1996: An interpretation in terms of self-organized criticality. Journal of Geophysical Research: Solid Earth, 102 (B12), 27407–27420. doi: https://doi.org/10.1029/97jb02487
Dieterich, J. (1994). A constitutive law for rate of earthquake production and its application to earthquake clustering. Journal of Geophysical Research: Solid Earth, 99 (B2), 2601–2618. doi: https://doi.org/10.1029/93jb02581
Poniszewska-Maranda, A., Matusiak, R., Kryvinska, N., Yasar, A.-U.-H. (2019). A real-time service system in the cloud. Journal of Ambient Intelligence and Humanized Computing. doi: https://doi.org/10.1007/s12652-019-01203-7
De la Prieta, F., Bajo, J., Rodríguez, S., Corchado, J. M. (2016). MAS-based self-adaptive architecture for controlling and monitoring Cloud platforms. Journal of Ambient Intelligence and Humanized Computing, 8 (2), 213–221. doi: https://doi.org/10.1007/s12652-016-0434-8
Mladenow, A., Kryvinska, N., Strauss, C. (2012). Towards cloud-centric service environments. Journal of Service Science Research, 4 (2), 213–234. doi: https://doi.org/10.1007/s12927-012-0009-y
Kaddouri, A., Guezouri, M., Mbarek, N. (2017). A new inter-cloud service-level guarantee protocol applied to space missions. International Journal of Grid and Utility Computing, 8 (2), 152. doi: https://doi.org/10.1504/ijguc.2017.085909
Jiang, L., Feng, G., Qin, S. (2015). Content Distribution for 5G Systems Based on Distributed Cloud Service Network Architecture. KSII Transactions on Internet and Information Systems, 9 (11), 4268–4290. doi: https://doi.org/10.3837/tiis.2015.11.001
Krishna, M. (2019). User-Centric and Information-Centric Networking and Services. CRC Press, 310. doi: https://doi.org/10.1201/9781315207650
Molnár, E., Molnár, R., Kryvinska, N., Greguš, M. (2014). Web intelligence in practice. Journal of Service Science Research, 6 (1), 149–172. doi: https://doi.org/10.1007/s12927-014-0006-4
Peköz, Ü. G. (2018). Product Usage Data Collection and Challenges of Data Anonymization. Lecture Notes on Data Engineering and Communications Technologies, 117–136. doi: https://doi.org/10.1007/978-3-319-94117-2_6
Bauer, C., Kryvinska, N., Strauss, C. (2016). The Business with Digital Signage for Advertising. Lecture Notes in Information Systems and Organisation, 285–302. doi: https://doi.org/10.1007/978-3-319-28907-6_19
Korzh, R., Peleshchyshyn, A. (2013). Formalization of process of forming university’s information image in the social environments on the internet. Eastern-European Journal of Enterprise Technologies, 5 (3 (65)), 4–8.
Korzh, R., Fedushko, S., Peleshchyshyn, A. (2015). Methods for forming an informational image of a higher education institution. Webology, 12 (2).
Korzh, R., Peleshchyshyn, A. (2016). Forming University’s Information Image Based on Image Information Generator. Journal of Multidisciplinary Engineering Science and Technology, 3 (1), 3621–3624.
Witten, I., Frank, E., Hall, M., Pal, C. (2011). Data mining. Burlington, MA: Morgan Kaufmann.
Lehtonen, J. (2011). Characterizing the deep Web. University of Turku.
Cadwalladr, C., Graham-Harrison, E. (2019). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. Available at: https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
Alsaedi, N., Burnap, P. (2015). Arabic Event Detection in Social Media. Lecture Notes in Computer Science, 384–401. doi: https://doi.org/10.1007/978-3-319-18111-0_29
Burnap, P., Williams, M. L., Sloan, L., Rana, O., Housley, W., Edwards, A. et. al. (2014). Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining, 4 (1). doi: https://doi.org/10.1007/s13278-014-0206-4
Pravo na vladu season 6 issue 39 online on 1+1 video (2019). Available at: https://www.youtube.com/watch?v=AyfZ9EO9qEM
Pravo na vladu season 6 issue 36 online on 1+1 video (2019). Available at: https://1plus1.ua/1plus1video/pravo-na-vlast/6-sezon/36-vypusk-pravo-na-vladu-za-4-lipnya-2019-roku#player
Narayanan, A., Shmatikov, V. (2008). Robust De-anonymization of Large Sparse Datasets. 2008 IEEE Symposium on Security and Privacy (sp 2008). doi: https://doi.org/10.1109/sp.2008.33
Salas, J., Domingo-Ferrer, J. (2018). Some Basics on Privacy Techniques, Anonymization and their Big Data Challenges. Mathematics in Computer Science, 12 (3), 263–274. doi: https://doi.org/10.1007/s11786-018-0344-6
Weber, R. H. (2010). Internet of Things – New security and privacy challenges. Computer Law & Security Review, 26 (1), 23–30. doi: https://doi.org/10.1016/j.clsr.2009.11.008
Klymash, M., Demydov, I., Beshley, M., Shpur, O. (2016). Features of the cloud services implementation in the national network segment of Ukraine. Information and Telecommunication Sciences, 1, 31–38. doi: https://doi.org/10.20535/2411-2976.12016.31-38
Yu, Q., Huo, H.-W. (2011). Algorithms Improving the Storage Efficiency of Deep Packet Inspection. Journal of Software, 22 (1), 149–163. doi: https://doi.org/10.3724/sp.j.1001.2011.03724
Copyright (c) 2019 Ivan Demydov, Najm Ahmad Baydoun, Mykola Beshley, Mykhailo Klymash, Oleksiy Panchenko
This work is licensed under a Creative Commons Attribution 4.0 International License.
Our journal abides by the Creative Commons CC BY copyright rights and permissions for open access journals.
Authors, who are published in this journal, agree to the following conditions:
1. The authors reserve the right to authorship of the work and pass the first publication right of this work to the journal under the terms of a Creative Commons CC BY, which allows others to freely distribute the published research with the obligatory reference to the authors of the original work and the first publication of the work in this journal.
2. The authors have the right to conclude separate supplement agreements that relate to non-exclusive work distribution in the form in which it has been published by the journal (for example, to upload the work to the online storage of the journal or publish it as part of a monograph), provided that the reference to the first publication of the work in this journal is included.