The development of information and communication technologies and the digitalization of the media space create new opportunities for the popularization of scientific knowledge. There is an objective ...need to study popular science journalism as an activity that develops a multimedia network format and various media content distribution channels. The work is aimed at analyzing the features of the development of popular science journalism on the Internet in the context of cross-media. The study employed general scientific methods (analysis and synthesis), a method of studying documents with elements of content analysis, a comparative method that includes a comparison of different types of content, as well as data from social network and messenger analytics services. The authors studied media channels and ways to promote media content, its ideological, thematic, and structural characteristics, the features of its transformation on high citation index ratings scientific-oriented platforms Nplus1.ru and Naked-science.ru. As a result of the conducted research, it was discovered that the audience involved in the studied online media is carried out through a differentiated cross-media presence, the use of rewriting, and reposting processes. Particular attention was focused on the comparative analysis of the media content of official websites, accounts in the social network VKontakte, and Telegram messenger.
Issues of the environmental media agenda are acute in the media space and particularly relevant for the image of environmentally vulnerable territories. The impact of the environmental agenda on ...youth audiences of these territories is poorly studied, which actualizes the research topic. The purpose of the work is to study the impact of the environmental agenda on the image of the environmentally vulnerable region and youth audiences using eye-tracking technologies aimed at measuring the audience’s unconscious reactions. It is the first time when the topic is studied theoretically and empirically from the standpoint of a cognitive approach and the use of eye-tracking technologies aimed at analyzing the audience’s cognitive and affective reactions to the environmental agenda. It is established that messages of negative content, such as air pollution, waste management, and pollution of water bodies, predominate (74%) among the selected issues of the environmental agenda. These data are consistent with the results of eye-tracking studies, which show that the patterns of the audience attention are concentrated on these issues and a negative attitude is formed towards the territory image. The results obtained will make it possible to adjust the media ecovoice to neutralize conflictogenicity.
The paper presents the results of using eye-tracking technologies to study news materials on environmental topics collected as stimulus material and classified according to their impact on audience ...perception. The empirical material of the study came from news websites covering environmental issues. For objectivity, we compared two regional media resources – 74.ru (Chelyabinsk) and Aktobe Times2. We present our analysis of participants’ response to the studied materials and the degree of their influence on the participants’ emotional state and behavioral reactions. The paper also supplements the data obtained from content analysis in previous studies and expands the understanding of this issue. The chosen quantitative and qualitative approach to content research allowed us to determine the semantic and stylistic features of constructing ecotexts, determine their connotative characteristics, and classify them by groups, topics, and categories. The paper also contains survey data contributing to a deeper study of the stated problem and focusing on a detailed study of the audience’s behavioral responses. The survey data allowed us to confirm the expressed hypotheses and highlight the active areas of interest of the youth readership. Alongside the presented conclusions and points of discussion, we expressed the main assumptions highlighting the features of the formation of environmental texts in the news media.
SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications are designed to provide authentication based on a public key certificate, as well as generating a secure session key ...and traffic privacy based on a symmetric key. Today, a large number of e-commerce applications such as stock trading, banking, shopping and gaming rely on the robustness of the SSL/TLS protocol. Recently, a potential threat known as a Man-in-the-Middle or main-in-the-middle (MITM) attack has been used by attackers to attack SSL/TLS-enabled web applications, especially when users want to connect to an SSL/TLS-enabled web server. SSL/TLS. The current article discusses the Man-in-the-Middle attack threat for SSL/TLS-enabled web applications. The existing solution space for countering a MITM attack on SSL/TLS-enabled applications is also considered, and an effective solution is proposed that can resist a MITM attack on SSL/TLS-enabled applications. The proposed solution uses a soft token approach for user authentication in addition to SSL/TLS security features. The proposed solution is claimed to be safe, effective and user-friendly compared to similar approaches.
The article, being a part of a major study into fake news phenomenon, fact checking and information verification, analyzes the issues related to journalism education in the context of the increasing ...amount of fake news. The topicality of the study is determined by the fact that journalism education is failing to comply with the ever-changing requirements of the mass media market. Moreover, in the current era of information wars, post-truth, and social media regarded as sources of news, teaching future journalists to check facts and verify information is one of the primary demands of the mass media market. The study involved interviewing lecturers, students and specialists in media industry; the original results of the study add to its scientific novelty. The authors aimed at searching for cutting-edge practices to train skills of fact checking and verification. The results of the study indicate the necessity of introducing these practices into the academic process of training journalists, contribute to the research database in the field of journalism and the education, and provide for bridging the gap between universities and the media in terms of professional requirements for journalists.
A quantitative analysis of environmental content was carried out in the profile groups of social networks of regional Internet media, specifically in the social network VKontakte, popular among young ...people. An attempt to measure the degree of involvement of the media audience in the environmental issues of the region is presented, an assessment of social reflection on environmental texts is given. The dynamics (through likes, reposts and comments) of social well-being, typical for the audience of regional online media, has been revealed. The most popular resources were used as empirical material - the online publications “74.ru” and “1obl.ru.” A theoretical review of sources on the issue under study, including the work of domestic and foreign scientists of various specialties, is presented. Qualitative results have been achieved: linguistic features of text construction, reflecting the audience's reaction to environmental events, have been identified. The novelty of the study lies in the chosen approach and perspective of the problem, in the combination of methods used to collect data, in particular, a comparative analysis of the presentation of environmental information in official media sources and their representation in social networks was carried out. The main conclusion obtained in the course of the study is that the ecotexts of an environmentally problematic region do not provide high user involvement, while they indirectly express behavioral intentions, audience reactions, including social well-being.
Abstract
Article is devoted to the development of free program services for video conferencing. Proposed system eliminates security flaws found in other developments. Analysis of security model ...development using elliptic curves and secret key transfer using Diffie–Hellman algorithm is carried out. Currently, video communication software is used everywhere. Main task of such software applications is help to people communicate with colleagues, relatives and friends at great distances. However, it is very important that their conversation remains confidential, otherwise any information said can get to third parties, and then – cost of leaking personal information can change from damage done to one person to damage done to entire states. Therefore, it is so important to use only software products that have passed certification process when communicating where information with limited access will be used. Software tool has been developed that allows creating secure video conferences with ECIES encryption algorithm on elliptic curves, which allows holding conferences without fear of being compromised. Thus, proposed application significantly increases users security, their personal data, as well as confidentiality of their conversations. Developed software product can be used to conduct secure video conference.
Abstract
Problem of safety ensuring of children and underage adolescents in Web–space is becoming increasingly acute. Younger generation information security is the state of children and adolescents ...protection, in which there is no risk associated with harm to their health and (or) physical, mental, spiritual, moral development from destructive information. This article describes the development of new software product that allows analyzing text from files, Web sites, pages, applications, etc. Analog programs were reviewed; modern text recognition algorithms were described. Screenshots and flowchart of software parts designed functioning for semantic text analysis in Web space are presented. Any Web page is file with extension, and after analyzing, it is possible to evaluate the information and classify it by topics, as well as to determine whether there is destructive content. In the presented study, the software tool was developed for semantic analysis and formalization of text. Exact trigger points from 26 to 30 times evaluate the algorithm functioning. With accuracy of up to 80%, it can be argued that algorithm is suitable for determining the orientation of article and content of ideas expressed in it, taking into account duality of model.
Abstract
This article discusses the issues related to the possibility of realization of collision cyberattacks (based on hash collisions). Since post–quantum cryptography has become relevant, ...classical cryptosystems do not provide the sufficient resistance to the modern quantum cyberattacks. Systems based on outdated hashing algorithms become vulnerable to cyberattacks with hash collision. As replacement for unreliable algorithms, such as various modifications of MD5 and SHA–1, new algorithms have been created, for example, SHA–3 standard based on the Keccak function and AES–based hashing. This article discusses modern collision cyberattacks and possible methods of their detection. Because of this study, theoretical description of cyberattacks with hash collision was considered; modern cyberattacks on hash collisions and possible ways of detecting and countering them (weak hash detection) are described; software tool that detects vulnerable and unreliable hash is implemented; software testing is carried out. Based on the conducted research, it can be concluded that the main advantages of implementing software tool are effective detection of vulnerable hash, the ability to generate new hash protected from collisions, convenient and user– friendly interface, small memory requirements and small size of the program code.
The image of Russia in Russian Satirical Drawings in France.
Mikhail Drizo (pseudonym MAD), who emigrated to Paris in 1920, was one of the first Russian caricaturists to evoke in exile the image of ...Russia. In his satirical sketches, as in the works of his numerous colleagues such as M. Linsky, F. Rozhankovsky, A. Alexandrov and many others, whose satirical drawings were published in numerous Russian-language periodicals in France, there are always two Russias. First, there is the Russia that existed before the Revolution, the country known as “ Holy Russia”. Then there is the other Russia, the “ Soviet” one that emerged after the Revolution. In our article we analyse the ways in which the Russian caricaturists in exile depicted the country they had lost, how they illustrated that country’s past and present, and portrayed its politics and its values. Discussing images frequently used by exiled Russian caricaturists to describe their country, such as the bear, the woman, or the death and destruction spread by the Soviets, we will attempt to answer the following questions : what were the aims of the Bolsheviks and those who emigrated ? Who served the people ? And who used them ?