Skip to main content

A Situation Evaluation System for Specific Events in Social Media

  • Conference paper
  • First Online:
Chinese Lexical Semantics (CLSW 2019)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11831))

Included in the following conference series:

  • 1532 Accesses

Abstract

With the widespread use of social media, social networks have become an important information carrier and platform for users to explore the world. Social networks not only reflect the hot events in society but also influence the trends and evaluation of events through user network behaviors. In this paper, a situation evaluation system is established for social event trends. We use web crawlers to collect multi-source data for a series of events of interest to form a basic knowledge base, and based on this, we extract statistical data and language features. Then, we use the Analytic Hierarchy Process (AHP) algorithm to calculate the weight of important features that can capture the development of the event situation and establish a hot social event situation evaluation system. Finally, we apply this system and stream computing technology to achieve situational awareness of events in real-time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Schuler, D.: Social computing. Commun. ACM 37(1), 28–29 (1994)

    Article  Google Scholar 

  2. Dryer, D.C., Eisbach, C., Ark, W.S.: At what cost pervasive? A social computing view of mobile computing systems. IBM Syst. J. 38(4), 652–676 (1999)

    Article  Google Scholar 

  3. WorldBank: World bank (2018). https://data.worldbank.org.cn/country/US

  4. Communique, S.: Statistical communique of the People’s Republic of China on 2017 national economic and social development (2018). http://www.gov.cn/xinwen/2018-02/28/content_5269506.htm

  5. Becker, H., Naaman, M., Gravano, L.: Beyond trending topics: real-world event identification on Twitter. In: ICWSM (2011)

    Google Scholar 

  6. Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of the 13th USENIX Conference on System Administration, pp. 229–238 (1999)

    Google Scholar 

  7. Porras, P.A., Fong, M.W., Valdes, A.: A mission-impact-based approach to INFOSEC alarm correlation. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 95–114. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36084-0_6

    Chapter  Google Scholar 

  8. Qu, G., Raghavendra, C.S., Dharmagadda, T., Hariri, S., Ramkishore, M.: Impact analysis of faults and attacks in large-scale networks. IEEE Secur. Priv. 1(05), 49–54 (2003). https://doi.org/10.1109/MSECP.2003.1236235

    Article  Google Scholar 

  9. General Administration of Quality Supervision, I., Quarantine of the People’s Republic of China, S.A.o.t.P.R.o.C.: Information security technology\(\_\)guidelines for the category and classification of information security incidents (2017)

    Google Scholar 

  10. Xun-xun, C., Bin-xing, F., Ming-zeng, H., Lei, L.: A new field in security of internet information and content-network information penetration detection technology. J. China Inst. Commun. 25(7), 185–191 (2004)

    Google Scholar 

  11. Bin-xing, F., Yun-chuan, G., Yuan, Z.: Information content security on the internet: the control model and its evaluation. Sci. China Ser. F Inf. Sci. 53(1), 30–49 (2010). https://doi.org/10.1007/s11432-010-0014-z

    Article  Google Scholar 

  12. Yuan, W.: Research on mining of internet public opinion based on semantic and statistic analysis. Ph.D. thesis, Wuhan University of Technology (2012)

    Google Scholar 

  13. Barroso, N., de Ipiña, K.L., Ezeiza, A., Hernández, C.: An ontology-driven semantic speech recognition system for security tasks. In: 2011 Carnahan Conference on Security Technology, pp. 1–6 (2011). https://doi.org/10.1109/CCST.2011.6095948

  14. Xiu-zhen, C., Qing-hua, Z., Xiao-hong, G., Chen-guang, L.: Quantitative hierarchical threat evaluation model for network security. J. Softw. 17(4), 885–897 (2006)

    Article  Google Scholar 

  15. Lei, L., Hui-qiang, W., Ying, L.: Evaluation method of service-level network security situation based on fuzzy analytic hierarchy process. J. Comput. Appl. 29(9), 2327–2331, 2335 (2009)

    Google Scholar 

  16. Hong-xing, C.: Research and simulation of network security evaluation based on AHP weights calculation. Comput. Simul. 30(8), 266–269 (2013)

    Google Scholar 

  17. Fu-yong, X., Jian, S., Jian-ying, L.: Study on comprehensive assessment method for network security based on Delphi and ANN. Microcomput. Dev. 15(10), 11–13, 15 (2005)

    Google Scholar 

  18. Saaty, T.L.: Decision making with the analytic hierarchy process. Int. J. Serv. Sci. 1(1), 83 (2008)

    Google Scholar 

Download references

Acknowledgements

This study was jointly supported by National Natural Science Foundation of China (No. 61772081), Scientific Research Project of Beijing Educational Committee (No. KM201711232014). We thank anonymous reviewers for their detailed and constructive comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruoyu Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, B., Chen, R., Zhang, Y. (2020). A Situation Evaluation System for Specific Events in Social Media. In: Hong, JF., Zhang, Y., Liu, P. (eds) Chinese Lexical Semantics. CLSW 2019. Lecture Notes in Computer Science(), vol 11831. Springer, Cham. https://doi.org/10.1007/978-3-030-38189-9_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-38189-9_46

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-38188-2

  • Online ISBN: 978-3-030-38189-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics