A PROPOSED FRAMEWORK TO CONTROL RUMOUR PROPAGATION ON TWITTER FOR CRITICAL NATIONAL INFORMATION INFRASTRUCTURE (CNII) ORGANISATIONS
Journal Title: International Journal of Software Engineering and Computer Systems - Year 2016, Vol 2, Issue 1
Abstract
Critical National Information Infrastructure (CNII) organisations in Malaysia consist of many crucial sectors that not solely effect on national e-sovereignty, but also on economy, social and politic matters. Due to the widely usage on social media especially on Twitter, harmful rumour can easily propagate without any restrictions on any CNII organisations. For instance, the harmful rumour can damage the function of affected CNII such as reputation, perception and even worse can lead to disability to function. Up to this moment, there is no proper control to stop rumour propagation on Twitter for CNII. Therefore, this paper proposes a framework on controlling rumour propagation on Twitter for Malaysian CNII.
Authors and Affiliations
Nor Faiz Muhammad Noor, Omar Zakaria, Puteri N. E. Nohuddin
AN EVALUATION OF IMPROVED CLUSTER-BASED ROUTING PROTOCOL IN AD-HOC WIRELESS NETWORK
In this paper we presents a performance comparison of Dynamic Source Routing (DSR), Ad hoc On Demand Vector (AODV), Cluster Based Routing Protocol (CBRP) and Improved Cluster Based Routing Protocol (i-CBRP) routing proto...
A SURVEY OF MEDICAL IMAGE PROCESSING TOOLS
A precise analysis of medical image is an important stage in the contouring phase throughout radiotherapy preparation. Medical images are mostly used as radiographic techniques in diagnosis, clinical studies and treatmen...
MULTI-FACTOR ATTENDANCE AUTHENTICATION SYSTEM
Taking attendance in classes is a cumbersome task which can benefit from smartphone innovation. This study identifies the vulnerabilities of the technology and proposes a technique to identify cheating. Several smartphon...
INDONESIAN TEXT-TO-SPEECH SYSTEM USING DIPHONE CONCATENATIVE SYNTHESIS
In this paper, we describe the design and develop a database of Indonesian diphone synthesis using speech segment of recorded voice to be converted from text to speech and save it as audio file like WAV or MP3. In design...
KNOWLEDGE MAPPING PROCESS MODEL FOR RISK MITIGATION IN SOFTWARE MANAGEMENT
As software organizations try to mitigate operational and technical risk that occurs when using software, there is need to develop a knowledge intensive system to assist team members in mitigating both operational and te...