DEVELOPMENT OF BASIC CONCEPT OF ICT PLATFORMS DEPLOYMENT STRATEGY FOR SOCIAL MEDIA MARKETING CONSIDERING TECTONIC THEORY
Abstract
Keywords
Full Text:
PDFReferences
Klimek, P., Bayer, W., Thurner, S. (2011). The blogosphere as an excitable social medium: Richter’s and Omori’s Law in media coverage. Physica A: Statistical Mechanics and Its Applications, 390 (21-22), 3870–3875. doi: https://doi.org/10.1016/j.physa.2011.05.033
Shinyaeva, T. S., Tarasevich, Y. Y. (2016). Virtual network as excitable medium. Journal of Physics: Conference Series, 681, 012008. doi: https://doi.org/10.1088/1742-6596/681/1/012008
Szell, M., Grauwin, S., Ratti, C. (2014). Contraction of Online Response to Major Events. PLoS ONE, 9 (2), e89052. doi: https://doi.org/10.1371/journal.pone.0089052
Utsu, T., Ogata, Y., S, R., Matsu’ura (1995). The Centenary of the Omori Formula for a Decay Law of Aftershock Activity. Journal of Physics of the Earth, 43 (1), 1–33. doi: https://doi.org/10.4294/jpe1952.43.1
Yoo, S.-C., Shin, I. (2018). Digital Signage Media Creative : A Study for the Media Typology and Advertising Creative Strategy for Digital Signage. The Korean Journal of Advertising, 29 (6), 81–108. doi: https://doi.org/10.14377/kja.2018.8.31.81
Dunbar, R. I. M., Arnaboldi, V., Conti, M., Passarella, A. (2015). The structure of online social networks mirrors those in the offline world. Social Networks, 43, 39–47. doi: https://doi.org/10.1016/j.socnet.2015.04.005
Correig, A. M., Urquizú, M., Vila, J., Manrubia, S. C. (1997). Aftershock series of event February 18, 1996: An interpretation in terms of self-organized criticality. Journal of Geophysical Research: Solid Earth, 102 (B12), 27407–27420. doi: https://doi.org/10.1029/97jb02487
Dieterich, J. (1994). A constitutive law for rate of earthquake production and its application to earthquake clustering. Journal of Geophysical Research: Solid Earth, 99 (B2), 2601–2618. doi: https://doi.org/10.1029/93jb02581
Poniszewska-Maranda, A., Matusiak, R., Kryvinska, N., Yasar, A.-U.-H. (2019). A real-time service system in the cloud. Journal of Ambient Intelligence and Humanized Computing. doi: https://doi.org/10.1007/s12652-019-01203-7
De la Prieta, F., Bajo, J., Rodríguez, S., Corchado, J. M. (2016). MAS-based self-adaptive architecture for controlling and monitoring Cloud platforms. Journal of Ambient Intelligence and Humanized Computing, 8 (2), 213–221. doi: https://doi.org/10.1007/s12652-016-0434-8
Mladenow, A., Kryvinska, N., Strauss, C. (2012). Towards cloud-centric service environments. Journal of Service Science Research, 4 (2), 213–234. doi: https://doi.org/10.1007/s12927-012-0009-y
Kaddouri, A., Guezouri, M., Mbarek, N. (2017). A new inter-cloud service-level guarantee protocol applied to space missions. International Journal of Grid and Utility Computing, 8 (2), 152. doi: https://doi.org/10.1504/ijguc.2017.085909
Jiang, L., Feng, G., Qin, S. (2015). Content Distribution for 5G Systems Based on Distributed Cloud Service Network Architecture. KSII Transactions on Internet and Information Systems, 9 (11), 4268–4290. doi: https://doi.org/10.3837/tiis.2015.11.001
Krishna, M. (2019). User-Centric and Information-Centric Networking and Services. CRC Press, 310. doi: https://doi.org/10.1201/9781315207650
Molnár, E., Molnár, R., Kryvinska, N., Greguš, M. (2014). Web intelligence in practice. Journal of Service Science Research, 6 (1), 149–172. doi: https://doi.org/10.1007/s12927-014-0006-4
Peköz, Ü. G. (2018). Product Usage Data Collection and Challenges of Data Anonymization. Lecture Notes on Data Engineering and Communications Technologies, 117–136. doi: https://doi.org/10.1007/978-3-319-94117-2_6
Bauer, C., Kryvinska, N., Strauss, C. (2016). The Business with Digital Signage for Advertising. Lecture Notes in Information Systems and Organisation, 285–302. doi: https://doi.org/10.1007/978-3-319-28907-6_19
Korzh, R., Peleshchyshyn, A. (2013). Formalization of process of forming university’s information image in the social environments on the internet. Eastern-European Journal of Enterprise Technologies, 5 (3 (65)), 4–8.
Korzh, R., Fedushko, S., Peleshchyshyn, A. (2015). Methods for forming an informational image of a higher education institution. Webology, 12 (2).
Korzh, R., Peleshchyshyn, A. (2016). Forming University’s Information Image Based on Image Information Generator. Journal of Multidisciplinary Engineering Science and Technology, 3 (1), 3621–3624.
Witten, I., Frank, E., Hall, M., Pal, C. (2011). Data mining. Burlington, MA: Morgan Kaufmann.
Lehtonen, J. (2011). Characterizing the deep Web. University of Turku.
Cadwalladr, C., Graham-Harrison, E. (2019). Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach. Available at: https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
Alsaedi, N., Burnap, P. (2015). Arabic Event Detection in Social Media. Lecture Notes in Computer Science, 384–401. doi: https://doi.org/10.1007/978-3-319-18111-0_29
Burnap, P., Williams, M. L., Sloan, L., Rana, O., Housley, W., Edwards, A. et. al. (2014). Tweeting the terror: modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining, 4 (1). doi: https://doi.org/10.1007/s13278-014-0206-4
Pravo na vladu season 6 issue 39 online on 1+1 video (2019). Available at: https://www.youtube.com/watch?v=AyfZ9EO9qEM
Pravo na vladu season 6 issue 36 online on 1+1 video (2019). Available at: https://1plus1.ua/1plus1video/pravo-na-vlast/6-sezon/36-vypusk-pravo-na-vladu-za-4-lipnya-2019-roku#player
Narayanan, A., Shmatikov, V. (2008). Robust De-anonymization of Large Sparse Datasets. 2008 IEEE Symposium on Security and Privacy (sp 2008). doi: https://doi.org/10.1109/sp.2008.33
Salas, J., Domingo-Ferrer, J. (2018). Some Basics on Privacy Techniques, Anonymization and their Big Data Challenges. Mathematics in Computer Science, 12 (3), 263–274. doi: https://doi.org/10.1007/s11786-018-0344-6
Weber, R. H. (2010). Internet of Things – New security and privacy challenges. Computer Law & Security Review, 26 (1), 23–30. doi: https://doi.org/10.1016/j.clsr.2009.11.008
Klymash, M., Demydov, I., Beshley, M., Shpur, O. (2016). Features of the cloud services implementation in the national network segment of Ukraine. Information and Telecommunication Sciences, 1, 31–38. doi: https://doi.org/10.20535/2411-2976.12016.31-38
Yu, Q., Huo, H.-W. (2011). Algorithms Improving the Storage Efficiency of Deep Packet Inspection. Journal of Software, 22 (1), 149–163. doi: https://doi.org/10.3724/sp.j.1001.2011.03724
DOI: http://dx.doi.org/10.21303/2461-4262.2020.001101
Refbacks
- There are currently no refbacks.
Copyright (c) 2019 Ivan Demydov, Najm Ahmad Baydoun, Mykola Beshley, Mykhailo Klymash, Oleksiy Panchenko

This work is licensed under a Creative Commons Attribution 4.0 International License.
ISSN 2461-4262 (Online), ISSN 2461-4254 (Print)


