Home  >  Article  >  WeChat Applet  >  Big data can still be used in this way, did you know?

Big data can still be used in this way, did you know?

phpcn_u1852
phpcn_u1852Original
2017-08-08 16:10:391823browse

In recent years, the situation of telecommunications network cases has become increasingly severe, showing the characteristics of industrial chainization, groupization, and non-contact. Especially as the industry of personal information privacy leakage gradually matures, telecommunications network behavior can accurately design traps for personal information, the probability of success increases exponentially, and the scope of the victimized group becomes wider and wider. At the same time, the means of telecommunications network behavior are constantly being renovated with the development of technology. From the initial lottery winnings, rent remittances, to online banking upgrades, to impersonating public officials such as public prosecutors, prosecutors, and law enforcement, fabricating online wanted orders, and receiving scholarships, the types of telecommunications network behaviors have expanded. There are dozens of them, making it difficult for the public to guard against them.

Under the high-intensity offensive of telecommunications network activities, those young people and middle-aged and elderly people who lack awareness of prevention are particularly vulnerable to being breached.

According to the 2016 "Survey Report on Internet Behavior and Habits of Chinese Teenagers", the frequency of teenagers using tools or platforms such as email, social networks, online games, and online chats has been increasing day by day, and the proportion of teenagers going online has increased. Nearly 80%. The increase in the frequency of Internet access has given relevant personnel more opportunities to attack young people who have neglected to take precautions. At the same time, due to their immature psychology, the psychological impact on young people after encountering losses is much more serious, and there are even many incidents. Extreme cases of teenagers committing suicide after being deceived (such as the Xu Yuyu case).

According to the "2016 Mobile Payment Security Survey Report" released by China UnionPay: last year, one-quarter of the respondents said they had experienced fraud and losses on telecommunications networks, and middle-aged and elderly people over 50 years old Become a disaster area. For middle-aged and elderly people, due to their lack of understanding of the Internet and high technology, as well as their concern for their children, their need for communication and care, and their need for health and longevity, they frequently become targets of telecommunications network elements.

Can the simple act of marking a phone number by an individual prevent fraud?

In fact, whether it is a fraudulent phone call, text message, website, plug-in software, etc., as long as the fraud is committed, There will inevitably be crimes and traces left behind, and these will become part of the big data and will become clues and favorable evidence for their arrest.

The more data there is, the stronger the big data analysis technology will be, and the more beneficial it will be for the prevention, discovery and crackdown on telecommunications behavior. This not only requires public security departments, operators, banks, etc. to unite and centralize big data to form a joint force. More and more people need to mark phone calls, text messages, and website addresses during fraud, provide feedback on some behaviors, and even provide consultation on related issues, which can become big data for anti-deception.

In order to solve the increasingly serious problem of telecommunications network fraud, the Jiuyan intelligent filtering system was born. Jiuyan intelligent filtering system meets the needs of Internet content processing and integrates natural language understanding, network search and text mining technologies. It is a content intelligent filtering system for complex text big data, which can intelligently identify the pronunciation, deformation and splitting of keywords in real time. common variants, and achieves accurate semantic disambiguation. The system has built-in the most comprehensive knowledge base in China, which is suitable for intelligent filtering and discovery of uncivilized information content in multiple scenarios.

Technical support makes nationwide fraud prevention simple and easy to implement. For ordinary people, it only takes a little effort to contribute to combating telecommunications network behavior. The more people participate and report, an increasingly dense "protective net" will be formed, preventing them from finding any opportunities to take advantage of.


The above is the detailed content of Big data can still be used in this way, did you know?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn