History and Social Psychology
Introduction
Social Psychology is a scientific discipline that mainly focuses on studying how their social circles influence people's psychological variables such as their thoughts, feelings, and behaviors. The discipline was realized even before the 20th century, for example, by the Islamic philosopher Al-Farabi but its practice and the use of modern social psychology mainly began in the 20th century. Contemporary Social Psychology was established primarily in the United States of America after the Second World War. The discipline majorly plays a significant role in creating an understanding of the social-psychological causes and the main motives of the humans and their behaviors in their social groups. Considerably, any discipline is mainly backed by theories, concepts, and models which are attributed as the key aspects which facilitate further researches and creates the ability to understand any given discipline (Myers, 2013, 24). This paper thus discusses the major concepts, models, and theories of the discipline that include the attributed method. It further discusses the historical influences in the field, which includes works and ancient philosophers and how they relate to the current theories, models, and concepts.
Part A: Major Theories, Models and Concepts in Social Psychology
Concepts
The discipline majorly concentrates on the interconnection of three significant aspects of human behavior, mental states, and social interactions. Social Psychology as a discipline majorly focuses on examining and creating an understanding of the factors or elements that causes the human behaviors to unfold in specific ways under the presence of their social groups that include friends and their community (Walter, 2017, 864). Considerably, social psychologists aim at creating an understanding and explaining the human behavior resulting from their social interactions or situations and their mental states that include their attitudes towards various aspects of the society.
Theories:
Attributed Theory
The attributed theory was a model invented by Fritz Heider in the early 20th century though it was later advanced by Harold Kelley and Bernard Weiner then in the century. This theory, which is within the field concentrates on how people describe or explain the behaviors of others within their groups or intergroup (Martinko, 2019, 524). The theory is mainly categorized into two. In the first category, people use their reasoning to create an understanding of the internal states, which include goals and future aspirations and the behavior of others. Secondly, people use the differences and regularities which are attributed to causing certain events, for example, their surrounds and events like weather to understand people's behaviors, for example, their personal traits and their attitudes.
Self-perception Theory
In this theory, people attribute others behaviors and attitudes by observing them within their groups or the inter groups. This includes how the people being perceived act in particular situations. The theory which was created by psychologist Daryl Bern, therefore, attributes people's behaviors to their personal traits and attitudes in that people are capable of inducing specific reactions to without necessarily accessing their internal cognition or their moods (Kyle, 2018, 363). In theory, Bern mainly suggested that people interpret their behaviors rationally in a similar way they explain the acts of others within their social groups.
Social Identity Theory
The social identity theory mainly resulted from the works of Henri Tajfel and John Turner in the 1960s and 1970s, respectively. The approach is considered the most significant and extensive theory within the social psychology discipline used in analyzing groups and intergroup in the classification of behaviors (Michael, 2016, 5). The theory is thus attributed to the identification of people's social identification, their evaluation, and definition of themselves and the members of their social groups. This includes the identification of people's behaviors such as discriminative, competitive, cooperative, prejudice, or stereotyping.
Cognitive dissonance
This is categorized as the most common theory within the field and its study in modern social psychology. The theory which was introduced by Leon Festinger in his work A Theory of Cognitive Dissonance (1957) mainly aims at explaining a variety of ordinary and the extraordinary events in our social lives. Festinger stated that people are prone to experience mental discomforts which are attributed to the person having two or more contradictory aspects, for example, their values, ideas or their beliefs (Chang, 2016, 268). Considerably, the theory attributes the mental discomforts to the person's feelings or values being contradictory to the new evidence on the same situation that differs from their beliefs or their values. The theory thus unveils the social differences while aiming at creating an understanding of the reasons why certain conditions occur, thus enabling people to develop future predictions.
Attachment Theory
The theory aims at explaining the dynamics of long term and short term interpersonal relationship in humans. The attachment theory is considered a general approach within the social psychology discipline since it encompasses interpersonal relationships, which are a common aspect of the behavioral identification of humans. The theory which was developed by John Bowlby explains the evolutions of bonds, the development of relationships, and the implication of the bonds which are attributed to the evolutionary pressures (Zeifman, 2019, 141). The attachment theory was developed from the tendency of human infants developing attachments to their caregivers while growing up and the contributions of the relationships in the success in their social and emotional development and majorly facilitating the ability of the infants to regulate their behaviors during their tender ages and even in their adulthood.
The Drive Theory
The drive theory mainly analyzes, defines, and classifies the psychological drives and their contributions to human behavior. Developed by psychologists Clark Hull and Kenneth Spence, the theory primarily concentrates on the psychological aspects that motivate people to act or relate in a certain way to others. This was an extension of the attachment theory since it mainly focused on explaining the early drive-in attachments of the infants and their caregivers. The theory thus concludes that humans are born with innate drives which are majorly psychological for example thirst, hunger, fear which due to their inability to orally communicate them can only be reduced or responded to by their caregivers. Considerably, through their drives and attention from their caregivers, they learn to interact with their caregivers in order to reduce their drives and bond. Thus infants depend on their psychological drives in their social interactions.
Part B: Historical Influences of Social Psychology
The first historical influencers of the discipline are Plato and Aristotle. Plato was a Greek philosopher within various disciplines who lived between 428/427 and 424/423 to 384/347 BC. Considerably, Plato attributed individual behaviors during his time as an influence of the state activities. He believed that the control of the state on people majorly contributed to the personality traits and behaviors of the people, for example, the regulation and oversight on taxes which encouraged social responsibilities and the social context of people within the community. Aristotle, on the other hand, was a Greek Philosopher whose work mainly generated from Plato's philosophies (Charles, 2019, 9). Aristotle, who lived between 384-322 BC, believed human were created as social creatures. This is thus a necessity which enables humans to live together in society. The two formed a foundation for building an understanding of modern psychology, for example, the human’s behaviors and attitudes which are as a result of their interrelations within the community with others.
Secondly, Georg Wilhelm Friedrich Hegel also played a major role historically in ‘influencing the modern-day Social Psychology. Hegel, who lived between 1770 and 1831 was a German philosopher who played a major role in the modern political situation of the country through his model of German idealism (Kivela, 2017, 76). Through his idealism theory, he stated that society inevitably provides links for the development of the human mind. This introduced the idea of a group mind, which is the most important study in social Psychology in understanding the influence of groups and intergroup in human behaviors and attitudes.
Philosophers Lazarus and Steinthal also contributed to the development of the social psychology discipline through their idea of a collective mind. The two emphasized the notion that a person’s character is mainly developed due to the cultural and community influences in their lives. Considerably, the community or and the cultural values and beliefs, especially the language expectation of the community is implemented in the early lives of the children and adopted to their later stages in life. This encourages a person to have a specific perspective on some world view issues. The idea further encourages people to have specific social thoughts on other individuals. Their idea led to the creation of researches on cultural influences such as the language and its influence on social beings, which contributed to the development of the social psychology discipline.
Additionally, works of McDougall in his book An Introduction to Social Psychology in 1908 laid a foundation for future researchers to conduct more methodological studies in the field developing modern-day social psychology. This was the first English book published in the field. In his work, McDougall, which consisted of chapters such as sentiment and emotions, morality, character, and religion, he believed that social behavior in humans was innate. As much as his beliefs are no longer upheld in the modern social psychology, his beliefs encouraged thorough research in creating an understanding and learning the influence of the social interactions by a human in determining their behavior, attitudes and personality traits (William, 2013, 23).
Considerably, Allport’s work of 1924 extensively underpins modern social psychology to a greater extent compared to other works in the same period. In his work, Allport believed that social behavior in humans results from the interactions with other people within society.
Through his methodological studies, he considered the field as a science discipline. He introduced the study of the behavior of people in stimulating other individuals and as the primary influencer on the behavior of others (William, 2016, 34). His works concentrated insignificant issues which are relatable to the modern social psychology field, which include aspects of emotions and the effects of an audience on others within the same group.
Murchison's work published in 1935 is also a significant consideration in the development of modern social psychology. Murchison majorly focused on finding the relations between social context and personality development. His work, which is considered ‘as the first handbook in the discipline majorly unfolded the contributions of the social interactions in an individual's behaviors. This was through the extensive research projects carried out on a thousand participants, thus summarizing the findings. Considerably, modern education systems depend on the results of his work in developing an understanding of human behavior and its environmental contributions.
Conclusion
Modern social psychology is as a result of initial ideas developed by writers and psychologists on social interactions and their influence on people's behavior. The scientific discipline mainly focuses on creating an understanding of how the psychological variables such as thoughts and feelings are influenced by people's social interactions. Through-out the years and primarily in the 20th century, many theories or models have been introduced in creating an understanding of the field. This includes the significant theories of; cognitive dissonance, social identity theory, self-perception theory, attributed theory and the attachment theory which majorly create an understanding of how social interactions contribute to people's perception of others and their own judgments in life. Considerably, modern social psychology could not have been a success without the intuitive studies in the ancient centuries. Philosophers such as Aristotle and Plato who were the Greek philosophers created a foundation for the discipline through their works in understanding how the social aspects such as political control of a state enabled people to act in a certain way.
References
Chang Y. Tom, D. H. (2016, February ). Looking for Someone to Blame: Delegation, Cognitive Dissonance, and the Disposition Effect. The Journal of Finance, 71(1), 267-302.
Charles, L. (2019, January ). Aristotle and distributed language: capacity, matter, structure, and languaging. Language Sciences, 53(A), 8-20.
Kivela, A. (2017, June 14). Toward a modern concept of schooling: A case study on Hegel.
Educational Philosophy and Theory, 50(1), 72-82.
Kyle M. Woosnam, J. D. (2018, February ). Applying self-perception theory to explain residents' attitudes about tourism development through travel histories. Tourism Management, 64, 357-368.
Martinko J. Mark, J. D. (2019, June 17). Attribution theory: An introduction to the special issue.
Journal of Organizational Behaviour, 40(5), 523-527.
Michael, H. A. (2016). Social Identity Theory. Understanding Peace and Conflict Through Social Identity Theory, 3-17.
Myers, D. (2013). Introducing Social Psychology. In Social Psychology (p. 24). McGraw-Hill Education (1828).
Walter G. Stephan, C. W. (2017, December 13). Intergroup Threat Theory. Intergroup Communication Theories, Issues, and Concepts, 113(4), 862-886.
William, M. (2013). Chapter 1: Social Psychology. An Introduction to Social Psychology Kindle Edition (pp. 1- 57). Dover Publications.
William, R. (2016, December ). Hans Eysenck: Personality theorist. Personality and Individual Differences, 103, 32-39.
Zeifman, D. M. (2019, February ). Attachment theory grows up: a developmental approach to pair bonds. Current Opinion in Psychology, 25, 139-143.
Philosophy
↳ Political Philosophy
Comparing Political Philosophy Theories
Social contract is the theory that is explained the civilian society can give some in which the rightness and extent of the government’s control and power over the society. The government draft for the constitution is a classic example of social contract theory.
According to Thomas Hobbs whom was a book philosopher he presented his very own topic, which he believed that individuals are a social and non-political which is directly reflected to the type of environmental actions which were things like living in a society of poverty and war. Social Contract is an agreement that is between individuals who are willing to make and unconditional and irrevocable transfer of right and power to the sovereign for the sake of peace.
Political philosophy and social contract which was a theory and or model that originated during the Age of Enlightenment that was the origin of the society which was in a state of nature. With political philosophy it seeks to find the form of any political existence. Classical Liberalism is a political philosophy that protects the freedom of individuals. Philosopher John Stuart Mill was a classical liberalist which he was a thinker that was well known for his work in liberalism. Liberalism is the political thought cost the independence of a citizen’s freedom of market and press and or religion that is spoken through speech and government. There are two major political philosophies which were liberalism and Marxism, which are the demise of the Soviet communism.
“Marxism” is the socialist philosophy of Karl Marx (1818–1883). Liberalism is Latin from the word “liberty” which is the philosophy well expressed by John Stuart Mill (1806–1873) in which his treatise On Liberty was that “The sole end for which mankind are warranted, individually or collectively, in interfering with the liberty of action of any of their number, is to prevent harm to others. His own good was either physical or moral, is not a sufficient warrant.” This was a critical approach to human sciences which he proposed through a system of political and economic development.
Communitarians were critics that hold a common good that is defined by the society. According to Rawls he wanted to guarantee that people will have the right to purse their own ends which was the extent that they do not interfere with the rights of other people trying to pursue their own independence within the society. “If a society is to be well ordered, its members must determine by rational reflection what are to be their principles of justice, said Rawls.”
Nussbaum focused on the capabilities approach which was desired on the outcome rather than any specific ideas within the research. Capabilities approach denies the social justice the secure the mutual advantage of many key desideratum of contract theories “(for example) the ability to live a life of normal length in good health and with the freedom to move about safe from violent assault, to be able to exercise one’s mental, physical, imaginative, and creative powers, and to be able to laugh and play and enjoy recreational opportunities.” Nussbaum she was a professional philosopher that spoke widely on many different approached that explained her different in capabilities.
Conclusion
All of these theories are similar because they are the effects of our society. Though these theories are individually collected they are similar to how we perceive society. They are different from each other because they display different views on each theory. The theory that stood out most for me was the Social Contract that Thomas Hobbs presented a very special idea that was surrounded around the society. Which was poverty and war which is something that will never end and individuals among our society, they will either encounter it or they will endure it. Poverty is not something that people choose to be among sometimes it is just something that happens. The contract he presented delivers people from the evils of the natural state to a more civil society and state of peace. Which peace is something that I am among I feel if the society was more equal and less poverty driven than the society will be a much better place to live.
Reference
http://phoenix.vitalsource.com/#/books/1259602176/cfi/6/26[vnd.vst.idref=chap06]
http://phoenix.vitalsource.com/#/books/1259602176/cfi/6/38[vnd.vst.idref=chap11]
http://phoenix.vitalsource.com/#/books/1259602176/cfi/6/40[vnd.vst.idref=chap12]
How social determinants are impacting the health of the patient
Advocacy Paper
Social determinants of health are the complicated situations wherein people are born and live that affect their wellbeing and health. Socioeconomic, cultural, and political constructs are examples of intrinsic factors. On the other hand, place-based circumstances include easily available health-care, education systems, secure environmental circumstances, well-designed neighborhoods, and the affordability of nutritious food options. The ability to work is an essential SDOH because it offers significant benefits in terms of financial stability, self-efficacy, support networks, and socioeconomic class (Chung et al., 2016). In several nations, health insurance provided by an employer is also available to the majority of the population. In this case, the critical social determinants of health include employment status whereby the patient is not employed, therefore has no insurance.
The second social determinant of health is educational opportunities. The evidence demonstrating the value of education as a health determinant is one of the most captivating in the field. Health outcomes such as average lifespan, mortality, and health behaviors are highly linked with education. Academic achievement has a significant impact on health by influencing opportunities, job growth, and income. In this scenario, the patient has completed school through the 8th grade. Due to a lack of proper education, the patient has a long-standing history of alcohol and tobacco abuse and has developed chronic pancreatitis. The final SDOH that the patient is experiencing is the inability to obtain housing. The connection between housing and health is well established, according to scientific proof. Housing stability, reliability, security, and affordability, as well as the social and physical features of neighborhoods, all impact health related results. Housing's effects on health are currently being regarded mainly by policymakers, which is a positive development. Housing is one of the well-researched SDOH (Gold et al., 2017). Studies have found that certain housing initiatives for low-income individuals can enhance health results while also lowering health-care expenses in some cases. Numerous health care organizations, payers, as well as government agencies are pursuing to understand better the entirety of the wellness and housing literature to identify where they can most successfully intervene on behalf of their people. In this case, the patient has no house. He is putting up at a friend's place and sleeping on a couch.
Identify a theory and apply it
Environmental Theory by Nightingale
According to Florence Nightingale's Environmental Concept, nursing is described as "the act of using the client's environment to aid him in his healing process." A nurse's intervention to set up environmental settings suitable for the progressive recovery of the patient's condition and that external forces affiliated with the client's environs impact the client's life, as well as his progression, are essential components of this process. In her writings, Florence Nightingale asserted that nursing "should signify the appropriate use of fresh air, warmth, light, quiet, cleanliness, and the appropriate choice and administering of diet, all done to cause the client the least possible loss of vital strength." It was in her declaration that she mirrored the art of nursing. The art of nursing, as it is currently practiced, appears explicitly constituted to destroy what God had created disease to be," which she defined as "a reparative process." in terms of environment, Nightingale highlights the physical environs whereby she mirrors a public health framework whereby all that surrounds people is regarded concerning the health status (Mughal & Ali, 2017). According to Nightingale, in terms of bed and bedding, an individual in good health breathes out approximately three pints of moisture via the skin and lungs throughout a 24-hour period. Organic material finds its way into the sheets and remains there unless the bedding is changed and ventilated regularly. She assumed that the bed should be positioned in the brightest area of the room, close to a window so that the client could see out of it while sleeping. She also did remind the caretaker not to lean against, sit on, or shake the patient's bed needlessly, as this could cause injury. In terms of personal hygiene, similarly, just as it is worth replacing the air around a sick individual regularly to transport morbid effluvia from the skin and lungs, by trying to maintain free air circulation, it is also essential to keep skin pores free of all obstructing excrements (Mughal & Ali, 2017). In this scenario, the environment of the patient is not conducive to recovery. For instance, he is presently sleeping on the couch in his friend's apartment. He is extremely thin, dejected, and untidy in appearance.
How a nurse practitioner can promote social justice
Due to a significant shortage of primary care doctors in rural areas, inhabitants in these areas frequently have restricted access to primary care doctors. In rural areas, APRN's who have complete autonomy in their practice, like inpatient diagnosis and medication prescriptions, can improve access to health and care outcomes for their patients (Browne & Tarlier, 2018).
According to a recent study released in Health Affairs, 25 % of Americans have two or many chronic ailments, like high blood pressure and diabetes. The management of these diseases, on the other hand, is disorganized and accounts for approximately 75% of total health care spending. A patient-centered method to care by APNs, like adult-geriatric nurse practitioners (AGNP), can help patients with multiple diseases minimize their medical expenses and enhance the health of those suffering from those illnesses (Browne & Tarlier, 2018).
Identify what screening tests/procedures you would recommend
When a patient presents right upper quadrant pain, ultrasonography is the first diagnostic procedure performed. Computed tomography (CT) is preferred when there is lower quadrant pain in either the right or left lower quadrant; computed tomography (CT) is preferred. Traditional radiography has restricted diagnostic value in the evaluation of most people with abdominal pains who present the condition. Patients' interaction with ionizing radiation is being raised due to the massive use of CT scans (Kothari et al., 2018).
Complete Blood Count
A complete blood count is a type of blood examination that can evaluate whether or not a disease is present within the body. Whenever an infection occurs, the production of specific blood cell type's increases and the existence of infection could indeed aid in determining the nature of the disease (Kothari et al., 2018).
Occult Stool Test
When someone has blood in their stool, they should have this test done. It is not an ordinary discovery. Even though blood in the stool cannot be viewed with naked eyes, it can indicate an issue with the upper digestive system (Kothari et al., 2018).
References
Browne, A. J., & Tarlier, D. S. (2018). Examining the potential of nurse practitioners from a critical social justice perspective. Nursing Inquiry, 15(2), 83-93.
Chung, E. K., Siegel, B. S., Garg, A., Conroy, K., Gross, R. S., Long, D. A., & Fierman, A. H. (2016). Screening for social determinants of health among children and families living in poverty: a guide for clinicians. Current problems in pediatric and adolescent health care, 46(5), 135-153.
Gold, R., Cottrell, E., Bunce, A., Middendorf, M., Hollombe, C., Cowburn, S., & Melgar, G. (2017). Developing electronic health record (EHR) strategies related to health center patients' social determinants of health. The Journal of the American Board of Family Medicine, 30(4), 428-447.
Kothari, D., Babineau, M., Hall, M., Freedman, S. D., Shapiro, N. I., & Sheth, S. G. (2018). Preventing hospitalization in mild acute pancreatitis using a clinical pathway in the emergency department. Journal of clinical gastroenterology, 52(8), 734-741.
Mughal, F. B., & Ali, B. H. I. (2017). Enhancing patient wellbeing: Applying environmental theory in nursing practice. Annals of Nursing and Practice, 4(3), 1085.
Christians' Duty to Address Social Issues and Injustices
Response to Courtney Medlin
Indeed, Christians cannot solely choose to follow only the gospel and overlook other social issues and injustices that go against them. By using the teachings of the gospel, Christians are required to control social aspects that they regard as righteous. The assertion that Christians are part of the social issue occasionally is of relevance in this discussion since they are also humans who should take an active part and act as role models in solving such controversial issues. Therefore, it would be inappropriate for a Christian to be after the gospel only and leave out social issues affecting the society where they belong. In her statement, I believe Madeleine referred to the role humans have in taking care of all aspects of God's creation. In this light, Christians, as the role models and proponents of the gospel, have the mandate of taking an active part in the gospel and its spread and social issues that are part of their lives and part of God's creation issues.
Response to Jade Delong
Everyone would most definitely agree with Writer Madeleine's statement. And from her statement, it is succinct that no one would be listening and adhering to the gospel, and at the same time, choose not to attend and pay attention to the social issues rampant in social contexts. Instead, Christians ought to participate in social controversies, pointing out their understanding and stances from the gospel teachings. When I fathom this Writer's message, it tries to imply that Christians need to use the gospel teachings in solving social issues.
Additionally, it is the role of humankind to take good care of God's creation. In this light, Christians are the champions who must act as role models in God's creation, including social issues. Therefore, it would be impossible and rather ridiculous for any Christian to give a deaf ear on social issues and choose to concentrate on the gospel only. Instead, they should use the gospel's teachings to shape social issues rampant in societies where they live.
Information Science and Technology
↳ Artificial Intelligence
Use of artificial neural networks to identify fake profiles
Introduction
Social media platforms are a place where everyone can remain in touch with their friends, share their latest news, and interact with others who share their interests. Online Social Networks utilize advantage of front side technology to enable permanent accounts in conjunction with getting to know one another in the. Facebook and Twitter are evolving alongside people in order to keep in touch with one another (Liu et al. 2018). Online activities welcome individuals with similar activities, making it easy for users to meet present pals. The online activities welcome individuals with similar activities together, making it easy for users to meet current pals. Gaming and entertainment websites with more followers usually have a larger fan base and higher ratings. Ratings motivate online account users to learn fresh strategies in order to compete better effectively with their peers.
Research Aim
According to studies, between 20% and 40% of profiles from internet artificial networks such as Facebook are fraudulent. As a consequence, the identification of false accounts through neural network sites leads toward a solution based on structures.
Research Objective
To understand the application of neural networks on real life problems
To know the implementation process of neural networks for fake profile detection
To detect fake profiles on social media through python programming and neural networking algorithms
Research Question
What is the major role of data identification?
How to avoid a fake status on a neural network platform?
What types of problems face an artificial neural network?
How to create an image on an ANN neural network?
Research Significant
Implementation would be a strategy for classifying an item based on the classification collected data that has been used to build a classification model. Apart from that, the project is included in the advance process that helps in the implementation of the security function in the network site. Another project tried to solve this problem but the number of fake account profiles gradually increased. Therefore this project uses Python (Yang et al. 2019). As well as programing based is highly strongest. The categories from validation data are removed as well as left therefore for a knowledgeable classifier to determine. Using “Artificial Neural Networks” for detecting fake profiles throughout this study, researchers employ “Artificial Neural Networks” to determine if the profile data provided are from authentic or bogus individuals.
Theories and Models
Vector Machine
Some fraudulent profiles are used to spread disinformation and create agendas. The identification of a fraudulent account is critical. Machine learning-based technologies were employed to detect bogus profiles that might mislead users. The information is pre-processed using several Python libraries, as well as a comparison model being produced in order to find a viable solution that is appropriate for the current information (Hayes et al. 2019). Machine Learning Classifiers are used to detect bogus information through social media networks. For the identification of bogus accounts, the segmentation abilities of the methods Variational Land, Neural Network, as well as Support Vector Machines were employed.
Technology Acceptance Model
TAM is amongst the most prominent models of adoption of technology, including two main elements affecting an individual's inclination to employ new technology: considered facilitating conditions of utility. An elderly individual who views online content as too complicated to perform or a pointless exercise will be less inclined to adopt this advanced technologies, whereas an older person who views digital content as providing required mental stimulation including being simple to learn would be more probable to even want to understand about using online content.
Research Approach
This deductive approach may be described using hypotheses that can be generated from the theory's assertions. To put it another way, the deductive method is concerned about deducing results from assumptions or assertions. Therefore, the primary purpose of this study is to assess the consequences of fraudulent profile pages on Facebook (Altman et al. 2019). To accomplish this, researchers devised a thorough data harvesting approach, conducted a social engineering study, and examined connections between phony profiles as well as actual users in order to eventually undercut Facebook's economic model. Furthermore, qualitative methods are used to examine privacy concerns.
Research Design
Initially, the researcher constructed six bogus Facebook profiles across three age categories, half of which were female as well as half of which were male. Furthermore, they developed a profile that depicted an animated cat rather than a real person and revealed nothing identification information even really. They established additional fake profiles depicting a teenage girl who friended every one of the false accounts in their experiment to induce social connections (Zhou et al. 2019). Unlike the accounts used in previous sociable experiments, which attempted to keep the profiles as basic as possible, researchers produced realistic and complicated profiles to ensure a high level of social appeal. They did this by looking at the Seagate Labs online social study.
Data Collection Process
The bulk of businesses rely on data collection methods to forecast future probabilities and trends. After acquiring data, the data organization step must be finished. The secondary data collecting process is used to gather this study to the variable source. That should help with the implementation of the project. Apart from that, properly define the variable technique in the implementation of the software as well as the operational function which is helpful to the implementation of ANN.
Software Requirements
It is believed that once the study is completed, the project's comparability would increase dramatically. In this case, we may also leverage the contact with the client to clear up any uncertainty and determine which criteria are more critical than others. This procedure often includes multiple graphical representations about the processes, due to differential types of entities, including their relationships (Yang et al. 2018). The graphical approach may aid in the discovery of inaccurate, inconsistent, absent, or excessive requirements. Flowchart, entity- relationship visualizations, database design, state-transition diagrams, and other models fall under this category.
Analysis
In recent days social media is ruling the globe in a variety of manners. The amount of people utilizing digital platforms is rapidly expanding. The biggest benefit of digital social networking sites is that they allow us to link with people more readily and interact with them more effectively. This opened up a new avenue for a prospective assault, including phony identification, misleading data, and so on. The primary goal of this study is to identify fraudulent users. In this research, the "gradient boosting" method is utilized to effectively identify bogus users. The fact that digital networking sites are saturated with incorrect material and adverts makes it difficult to detect these bogus profiles.
The primary coding language used here is Python. This is employed to identify fake accounts in the dataset. This includes a variety of techniques including libraries which aid in the detection of fake profiles with extreme accuracy. Python and Python's standard libraries such as “Numpy”, “Pandas”, “Matplotlib”, “Scipy”, and “Sklearn” were utilized.
Uploading the dataset: The collection of examples has been a dataset as well as when operating with python or machine learning a few datasets must be needed for various purposes.
Training dataset: The dataset which is fed into the programming algorithm for training the model.
Testing dataset: The dataset which is employed to validate the model’s accuracy but has not been utilized for training the model might be called the dataset of validation.
Dataset pre-processing: This is an essential phase to identify fake profiles. In this phase, the data has been processed in an appropriate manner that could be inputted to detect the procedure. The useful data which could be derived from that directly influenced the capability of the model for learning. Hence, this is very vital to pre-process the information and the data before feeding this within the model. The dataset is widely used to demonstrate guided Python programming, which involves training a system to forecast the diagnoses. It shall be disregarded for the sake of showing uncontrolled detection methods.
The "random forest" is a model composed of several "decision trees". During training and testing the model employing the "Random Forest '' method, every tree derives from a randomized selection of the pieces of data, as well as the sampling selected with replacement are called bootstrap, where certain values are utilized in many instances within a particular tree.
To start such explorative study, load libraries as well as create methods to chart data using "matplotlib". Not all charts would be created based on the information.
Then the next step is to classify the algorithms. Based on the performing the algorithms the dataset will be run as well as will give an appropriate output regarding the issue. Correlation matrix, scatter plot, distribution graph and many other materials will be obtained as output. For a particular dataset, the overall efficiency of identifying fake profiles is shown to be greater when utilizing the "Random Forest Algorithm", trailed by the "Neural Networks Algorithm".
Future Work
The main issue has been that someone can have several Facebook accounts, which allows them to create fraudulent profiles as well as accounts inside online communities. The goal is to connect an Id card information when opening an account hence, that they can restrict the amount of accounts created and eliminate the possibility of fraudulent profiles anywhere at any time. The main issue has been that an individual can have several Online profiles, which allows them to create fraudulent profiles as well as logins in social networking websites (Echizen et al. 2019). Apart from that all steps are handled privately. That should help with implementation to the network site.
Conclusion
All sorts of controlled fake profiles in several platforms in literature review work. The critical evaluation also demonstrates that the python programming function that helps ANN may be adjusted using a variety of approaches. Artificial intelligence-based technologies are employed in a wide range of businesses, including computational linguistics, online databases, human speech interpretation, and image recognition. According to study guidelines, secondary resources must always be used while doing secondary research. They are not required to employ primary approaches unless the dissertation specifically requests that their findings be consistent with previously published research.
Reference List
Lau, E.T., Sun, L. and Yang, Q., 2019. Modeling, prediction and classification of student academic performance using artificial neural networks. SN Applied Sciences, 1(9), pp.1-10.
Shu, K., Mahudeswaran, D., Wang, S., Lee, D. and Liu, H., 2018. Fake Newsnet: A data repository with news content, social context and spatial temporal information for studying fake news on social media. arXiv preprint arXiv:1809.01286.
Devlin, M.A. and Hayes, B.P., 2019. Non-intrusive load monitoring and classification of activities of daily living using residential smart meter data. IEEE transactions on consumer electronics, 65(3), pp.339-348.
Torng, W. and Altman, R.B., 2019. Graph convolutional neural networks for predicting drug- target interactions. Journal of chemical information and modeling, 59(10), pp.4131-4149.
Singh, J., Hanson, J., Paliwal, K. and Zhou, Y., 2019. RNA secondary structure prediction using an ensemble of two-dimensional deep neural networks and transfer learning. Nature communications, 10(1), pp.1-13.
Hanson, J., Paliwal, K., Litfin, T., Yang, Y. and Zhou, Y., 2018. Accurate prediction of protein contact maps by coupling residual two-dimensional bidirectional long short-term memory with convolutional neural networks. Bioinformatics, 34(23), pp.4039-4045.
Nguyen, H.H., Yamagishi, J. and Echizen, I., 2019. Use of a capsule network to detect fake images and videos. arXiv preprint arXiv:1910.12467.
Oshikawa, R., Qian, J. and Wang, W.Y., 2018. A survey on natural language processing for fake news detection. arXiv preprint arXiv:1811.00770.
Bondielli, A. and Marcelloni, F., 2019. A survey on fake news and rumour detection techniques. Information Sciences, 497, pp.38-55.
Information Science and Technology
↳ Modern Technology
Use of artificial neural networks to identify fake profiles
Introduction
Social media platforms are a place where everyone can remain in touch with their friends, share their latest news, and interact with others who share their interests. Online Social Networks utilize advantage of front side technology to enable permanent accounts in conjunction with getting to know one another in the. Facebook and Twitter are evolving alongside people in order to keep in touch with one another (Liu et al. 2018). Online activities welcome individuals with similar activities, making it easy for users to meet present pals. The online activities welcome individuals with similar activities together, making it easy for users to meet current pals. Gaming and entertainment websites with more followers usually have a larger fan base and higher ratings. Ratings motivate online account users to learn fresh strategies in order to compete better effectively with their peers.
Research Aim
According to studies, between 20% and 40% of profiles from internet artificial networks such as Facebook are fraudulent. As a consequence, the identification of false accounts through neural network sites leads toward a solution based on structures.
Research Objective
● To understand the application of neural networks on real life problems
● To know the implementation process of neural networks for fake profile detection
● To detect fake profiles on social media through python programming and neural networking algorithms
Research Question
● What is the major role of data identification?
● How to avoid a fake status on a neural network platform?
● What types of problems face an artificial neural network?
● How to create an image on an ANN neural network?
Research Significant
Implementation would be a strategy for classifying an item based on the classification collected data that has been used to build a classification model. Apart from that, the project is included in the advance process that helps in the implementation of the security function in the network site. Another project tried to solve this problem but the number of fake account profiles gradually increased. Therefore this project uses Python (Yang et al. 2019). As well as programing based is highly strongest. The categories from validation data are removed as well as left therefore for a knowledgeable classifier to determine. Using “Artificial Neural Networks” for detecting fake profiles throughout this study, researchers employ “Artificial Neural Networks” to determine if the profile data provided are from authentic or bogus individuals.
Theories and Models
Vector Machine
Some fraudulent profiles are used to spread disinformation and create agendas. The identification of a fraudulent account is critical. Machine learning-based technologies were employed to detect bogus profiles that might mislead users. The information is pre-processed using several Python libraries, as well as a comparison model being produced in order to find a viable solution that is appropriate for the current information (Hayes et al. 2019). Machine Learning Classifiers are used to detect bogus information through social media networks. For the identification of bogus accounts, the segmentation abilities of the methods Variational Land, Neural Network, as well as Support Vector Machines were employed.
Technology Acceptance Model
TAM is amongst the most prominent models of adoption of technology, including two main elements affecting an individual's inclination to employ new technology: considered facilitating conditions of utility. An elderly individual who views online content as too complicated to perform or a pointless exercise will be less inclined to adopt this advanced technologies, whereas an older person who views digital content as providing required mental stimulation including being simple to learn would be more probable to even want to understand about using online content.
Research Approach
This deductive approach may be described using hypotheses that can be generated from the theory's assertions. To put it another way, the deductive method is concerned about deducing results from assumptions or assertions. Therefore, the primary purpose of this study is to assess the consequences of fraudulent profile pages on Facebook (Altman et al. 2019). To accomplish this, researchers devised a thorough data harvesting approach, conducted a social engineering study, and examined connections between phony profiles as well as actual users in order to eventually undercut Facebook's economic model. Furthermore, qualitative methods are used to examine privacy concerns.
Research Design
Initially, the researcher constructed six bogus Facebook profiles across three age categories, half of which were female as well as half of which were male. Furthermore, they developed a profile that depicted an animated cat rather than a real person and revealed nothing identification information even really. They established additional fake profiles depicting a teenage girl who friended every one of the false accounts in their experiment to induce social connections (Zhou et al. 2019). Unlike the accounts used in previous sociable experiments, which attempted to keep the profiles as basic as possible, researchers produced realistic and complicated profiles to ensure a high level of social appeal. They did this by looking at the Seagate Labs online social study.
Data Collection Process
The bulk of businesses rely on data collection methods to forecast future probabilities and trends. After acquiring data, the data organization step must be finished. The secondary data collecting process is used to gather this study to the variable source. That should help with the implementation of the project. Apart from that, properly define the variable technique in the implementation of the software as well as the operational function which is helpful to the implementation of ANN.
Software Requirements
It is believed that once the study is completed, the project's comparability would increase dramatically. In this case, we may also leverage the contact with the client to clear up any uncertainty and determine which criteria are more critical than others. This procedure often includes multiple graphical representations about the processes, due to differential types of entities, including their relationships (Yang et al. 2018). The graphical approach may aid in the discovery of inaccurate, inconsistent, absent, or excessive requirements. Flowchart, entity- relationship visualizations, database design, state-transition diagrams, and other models fall under this category.
Analysis
In recent days social media is ruling the globe in a variety of manners. The amount of people utilizing digital platforms is rapidly expanding. The biggest benefit of digital social networking sites is that they allow us to link with people more readily and interact with them more effectively. This opened up a new avenue for a prospective assault, including phony identification, misleading data, and so on. The primary goal of this study is to identify fraudulent users. In this research, the "gradient boosting" method is utilized to effectively identify bogus users. The fact that digital networking sites are saturated with incorrect material and adverts makes it difficult to detect these bogus profiles.
The primary coding language used here is Python. This is employed to identify fake accounts in the dataset. This includes a variety of techniques including libraries which aid in the detection of fake profiles with extreme accuracy. Python and Python's standard libraries such as “Numpy”, “Pandas”, “Matplotlib”, “Scipy”, and “Sklearn” were utilized.
1. Uploading the dataset: The collection of examples has been a dataset as well as when operating with python or machine learning a few datasets must be needed for various purposes.
Training dataset: The dataset which is fed into the programming algorithm for training the model.
Testing dataset: The dataset which is employed to validate the model’s accuracy but has not been utilized for training the model might be called the dataset of validation.
2. Dataset pre-processing: This is an essential phase to identify fake profiles. In this phase, the data has been processed in an appropriate manner that could be inputted to detect the procedure. The useful data which could be derived from that directly influenced the capability of the model for learning. Hence, this is very vital to pre-process the information and the data before feeding this within the model. The dataset is widely used to demonstrate guided Python programming, which involves training a system to forecast the diagnoses. It shall be disregarded for the sake of showing uncontrolled detection methods.
3. The "random forest" is a model composed of several "decision trees". During training and testing the model employing the "Random Forest '' method, every tree derives from a randomized selection of the pieces of data, as well as the sampling selected with replacement are called bootstrap, where certain values are utilized in many instances within a particular tree.
4. To start such explorative study, load libraries as well as create methods to chart data using "matplotlib". Not all charts would be created based on the information.
5. Then the next step is to classify the algorithms. Based on the performing the algorithms the dataset will be run as well as will give an appropriate output regarding the issue. Correlation matrix, scatter plot, distribution graph and many other materials will be obtained as output. For a particular dataset, the overall efficiency of identifying fake profiles is shown to be greater when utilizing the "Random Forest Algorithm", trailed by the "Neural Networks Algorithm".
Future Work
The main issue has been that someone can have several Facebook accounts, which allows them to create fraudulent profiles as well as accounts inside online communities. The goal is to connect an Id card information when opening an account hence, that they can restrict the amount of accounts created and eliminate the possibility of fraudulent profiles anywhere at any time. The main issue has been that an individual can have several Online profiles, which allows them to create fraudulent profiles as well as logins in social networking websites (Echizen et al. 2019). Apart from that all steps are handled privately. That should help with implementation to the network site.
Conclusion
All sorts of controlled fake profiles in several platforms in literature review work. The critical evaluation also demonstrates that the python programming function that helps ANN may be adjusted using a variety of approaches. Artificial intelligence-based technologies are employed in a wide range of businesses, including computational linguistics, online databases, human speech interpretation, and image recognition. According to study guidelines, secondary resources must always be used while doing secondary research. They are not required to employ primary approaches unless the dissertation specifically requests that their findings be consistent with previously published research.
Reference List
Journal
• Lau, E.T., Sun, L. and Yang, Q., 2019. Modeling, prediction and classification of student academic performance using artificial neural networks. SN Applied Sciences, 1(9), pp.1-10.
• Shu, K., Mahudeswaran, D., Wang, S., Lee, D. and Liu, H., 2018. Fake Newsnet: A data repository with news content, social context and spatial temporal information for studying fake news on social media. arXiv preprint arXiv:1809.01286.
• Devlin, M.A. and Hayes, B.P., 2019. Non-intrusive load monitoring and classification of activities of daily living using residential smart meter data. IEEE transactions on consumer electronics, 65(3), pp.339-348.
• Torng, W. and Altman, R.B., 2019. Graph convolutional neural networks for predicting drug- target interactions. Journal of chemical information and modeling, 59(10), pp.4131-4149.
• Singh, J., Hanson, J., Paliwal, K. and Zhou, Y., 2019. RNA secondary structure prediction using an ensemble of two-dimensional deep neural networks and transfer learning. Nature communications, 10(1), pp.1-13.
• Hanson, J., Paliwal, K., Litfin, T., Yang, Y. and Zhou, Y., 2018. Accurate prediction of protein contact maps by coupling residual two-dimensional bidirectional long short-term memory with convolutional neural networks. Bioinformatics, 34(23), pp.4039-4045.
• Nguyen, H.H., Yamagishi, J. and Echizen, I., 2019. Use of a capsule network to detect fake images and videos. arXiv preprint arXiv:1910.12467.
• Oshikawa, R., Qian, J. and Wang, W.Y., 2018. A survey on natural language processing for fake news detection. arXiv preprint arXiv:1811.00770.
• Bondielli, A. and Marcelloni, F., 2019. A survey on fake news and rumour detection techniques.
• Information Sciences, 497, pp.38-55.