Home Page >  News List >> Tech >> Tech

Is the implementation of big data 'anti pornography' initiated? There are such characteristics that need to be noted, you may be "involved in pornography"

Tech 2023-05-13 04:17:50 Source: Network
AD

Before the millennium, ordinary people would not have imagined that the development of the internet would be so rapid, occupying half of the country's territory in various fields, to the extent that within twenty years, every corner of Chinese social life had the "figure" of the internet. The development of emerging industries is based on network derivatives, such as the emergence of artificial intelligence, IoT technology, big data, and other technologies

Before the millennium, ordinary people would not have imagined that the development of the internet would be so rapid, occupying half of the country's territory in various fields, to the extent that within twenty years, every corner of Chinese social life had the "figure" of the internet. The development of emerging industries is based on network derivatives, such as the emergence of artificial intelligence, IoT technology, big data, and other technologies.

The term big data is familiar to young people after the millennium, regardless of whether they understand its specific content or not, but its frequency in daily life is not low. So, what is big data?

1 At the beginning, the term 'big data' was actually proposed for the development of enterprises. During the growth process, enterprises will continuously generate a large amount of unstructured historical data, which is always accumulating and will serve as an important decision-making basis for the company at a certain stage. Unlike before the millennium, company decision-making is more based on the long-term experience and business acumen accumulated by the company's management.

But with the rapid development of network technology, various fields are constantly integrating with network technology, such as express delivery services, takeout, transportation, financial management, and even household appliances. Twenty years ago, who would have thought that a vacuum cleaner could decide where to clean on their own? In this context, the term 'big data' has also been given a completely different meaning by people.

An increasing number of hardware devices, software interfaces, and various types of users are connected to network links, and these "individuals" that are connected to the network generate data from the network every minute and second. The 'network user behavior data' accumulated by these individuals in the network is a massive amount of data.

The scale of online user behavior data is not simple and can be described by "MB" or "GB". According to IBM research, the entire content generated by the world's internet in a day can be engraved onto nearly 200 million DVD discs and about 300 billion emails per day, which is beyond the description of "massive" data.

These behavioral data generated by online users are collected and used as a basis for various business needs or areas of concern, and then screened and organized through scientific mathematical modeling, ultimately applied internally in various fields.

For example, you often search for keywords such as "computer", "tablet", "digital screen", etc. in some shopping apps, and these generated "behavioral data" will appear. It will be collected by the app, mobile phone, or other unknown programs, and these collected data will be collected, organized, analyzed, modeled, and filtered through other applications before being used for you. Therefore, when you open your phone again, even if it is not in the same application, the phone will continuously push you advertisements and photos related to "computers" and "tablets", that is, accurate big data push.

Use user behavior data to analyze their user characteristics, such as when you often log in, which section you stay in the longest, and which content you click on the most. These materials may not have any unique features when viewed separately, but after a long period of accumulation and comprehensive analysis of these materials, over 90% of your characteristics as a user can be fully analyzed. Finally, utilizing each user's characteristics and personalized push, it is precisely because of this that everyone can always see what they want to see online.

Coincidentally, big data has brought development potential to various industries, but it also brings many hidden dangers, such as privacy leaks, telecommunications fraud, and improved concealment of pornography, gambling, and drugs.

But these potential dangers are also slowly being overcome, such as using legislation to ensure data security and privacy, and using big data to eliminate pornography. Big data anti pornography is also a typical example in big data applications. Those who possess these types of 'user characteristics' may be identified as' yellow related'.

1 User time characteristics, such as a certain account that has hardly been used, but each time it is used, it is a large fund transaction within a night period, and the amount of each fund transaction may not have changed.

2 The characteristics of user sensitive words, such as the presence of sensitive words that can only be recognized in the field of pornography, gambling, and drug trafficking in a certain account, accompanied by financial transactions, are undoubtedly key targets in network supervision.

Big data brings convenience to various industries, and so does anti pornography and public security.

Using big data to eliminate pornography can first save costs, while network monitoring can save a lot of police force and avoid frequent police calls.

Secondly, network monitoring is also more efficient, and the accuracy of network monitoring recognition based on user characteristics is relatively high.

conclusion

The development potential of big data is not limited to these, but the various hidden dangers it causes also require people's attention. Continuously improving policies and laws and regulations are reliable guarantees for its healthy development. At the same time, as' network users', we also need to take responsibility for the generated behavioral data and protect our own privacy.


Disclaimer: The content of this article is sourced from the internet. The copyright of the text, images, and other materials belongs to the original author. The platform reprints the materials for the purpose of conveying more information. The content of the article is for reference and learning only, and should not be used for commercial purposes. If it infringes on your legitimate rights and interests, please contact us promptly and we will handle it as soon as possible! We respect copyright and are committed to protecting it. Thank you for sharing.(Email:[email protected])

Mobile advertising space rental

Tag: pornography be Is the implementation of big data anti

Unite directoryCopyright @ 2011-2024 All Rights Reserved. Copyright Webmaster Search Directory System