Problems of information society, 2015, №2 PROBLEMS OF INFORMATION

SOCIETY

AZERBAIJAN NATIONAL ACADEMY OF SCIENCES INSTITUTE OF INFORMATION TECHNOLOGY

Scientific-practice journal

PROBLEMS OF INFORMATION SOCIETY

PROCEEDINGS OF INSTITUTE OF INFORMATION TECHNOLOGY of National Academy of Sciences

Təsisçi: Azerbaijan National Aademy of Sciences Institute of Information Technology

Editor-in-Chief: Academic Rasim Alguliyev

Honorary Editor: Professor, Lotfi A. Zadeh

Editorial Board: Academic Ali Abbasov, Academic Isa Habibbayli, DrSc, professor Bakhtiyar Aliyev, DrSc, professor Azhdar Aghayev, DrSc, professor Rasim Hasanov, DrSc, professor Latif Huseynov, DrSc, professor Fuad Mammadov, DrSc, professor Rustam Mammadov, DrSc, professor Efendi Nasibov, DrSc, professor Masuma Mammadova, DrSc, professor Ilham Mammadzadeh, DrSc, professor Rena Mirzazadeh, DrSc, professor Ertekin Salamzadeh, DrSc, professor Vilayat Veliyev, DrSc Ramiz Aliguliyev, DrSc Nizami Gasilov, PhD, associated professor Zarifa Jabrayilova, PhD, associated professor Alireza Khastan, PhD, associated professor Shahin Amrahov, PhD, professor Seung-Woo Seo, professor Valentina Dagiene, PhD Rashid Alakbarov, PhD, associated professor Alovsat Aliyev, PhD Yadigar Imamverdiyev, PhD Norisma Binti Idris, Ph.D, assistant professor Raif Rustamov, PhD Asad Abdi, PhD Jasarat Valehov, PhD Farhad Yusifov.

Executive editor: Rasim Mahmudov

The journal was included into the "List of periodic scientific publications recommended for the publication of main contributions of theses in the Republic of Azerbaijan" by the decision of the Supreme Attestation Commission under the President of the Republic of Azerbaijan.

© Publishing of “INFORMATION TECHNOLOGY” Baku-2016 www.jpis.az 1

Problems of informationCONTENTS society , 2015, №2, 4-12

1. Rasim M. Alguliyev, Alovsat G. Aliyev Greening the economy as a new stage in the development of information society………………………………………………………. 3

2. Rashid Q. Alakbarov Azsciencenet science-computer network: stages of development, internet services and prospects………...... 11

3. Yadigar N. Imamverdiyev Big prospects and problems of big data technology………….. 21

4. Rasim M. Alguliyev, Rasim Sh. Mahmudov The internet as a driving force of the development of civilization……………………………………………………………….. 31

5. Bikas S. Aghayev, Shakir A. Mehdiyev, Tarlan S. Aliyev Electronic information carrier as an object of information security………………………………………………………… 41

6. Tahmasib Kh. Fataliyev Security provision issues of e-science………………………..… 50

7. Rasim M. Alguliyev, Saadat R. Aghayeva Online media monitoring: current state, problems and development prospects...... 56

8. Afruz M. Gurbanova Computational terminology: stages of formation and development tendencies…………………………………………………………………………………. 63

9. Irada Y. Alakbarova Wikipedia encyclopedia as a manipulative tool in social media …... 69

10. Rasim Sh. Mahmudov About features of social media……………………………………. 78

2 www.jpis.az

Problems of information society, 2016, №1, 3-10

Rasim M. Alguliyev1, Alovsat G. Aliyev2 1,2Institute of Information Technology of ANAS, Baku, Azerbaijan [email protected], [email protected] GREENING THE ECONOMY AS A NEW STAGE IN THE DEVELOPMENT OF INFORMATION SOCIETY The article analyzes the essence of green economy in the information society and relevant initiatives and appeals in this field . It clarifies principles of green economy are clarified and sheds light on the process of greening as a new stage in the economic development of society. The necessity of transition to formation of green thinking and lifestyle in all spheres of society and economic activity is predicated. The current situation in Azerbaijan regarding the formation of green economy is analyzed and recommendations on the measures of prevention of the harmful aspects are put forward. Key words: green economy, green thinking, greening technologies, green economy initiatives. Introduction Although the modernization, innovative development, the increase of competitiveness, and the maintenance of energy efficiency are mainly directed towards economic growth in Azerbaijan against the backdrop of global economic crisis, the primary goal is the improvement of living standards of each individual and the maintenance of decent and sustainable living standards of future generations by the elimination of oil-gas resource dependence, and development of non-oil sector. This issue has been specified as the provision of sustainable development based on the principles of Information Society economy, which is currently under formation. This, in turn, necessitates the world-andcountrywide realization of production and consumption on the basis ecological balancing. The main program characterizing the environmental protection in overall development of the country – the National Program on ecologically sustainable socio-economic development in Republic of Azerbaijan, was adopted in 2003 [1, 2]. As a logical continuation of this program, the “Azerbaijan 2020: the vision of future” development concept [3] adopted in 2012, as well as “The National Strategy on development of Information society in Republic of Azerbaijan in 2014-2020 years” [4], aim at the achievement of ecologically sustainable socio-economic development. During the period covered by the concept, the greening of the economy and utilization of alternative (non-renewable) energy sources will accelerate the processes. At present, economic growth is accompanied with negative repercussions such as environmental degradation, increase of pollution levels, exhaustion of natural resources, biosphere disturbance and climate changes. This harms human health and impedes the normal development of future generations. In other words, the economy serving to increase the human welfare hinders the improvement of the life standards and does not guarantee the health. Hence, the modernization must be directed toward the progressive innovative technologies, maintaining economic growth in order to protect and improve the productivity and favorableness of natural environment. In such case, ecological security becomes a prominent factor for both economic growth and the better and healthier human existence. Reasons, Tasks and Principles of Transition to Greening the economy in Information society The concept of formation and development of green economy encompasses several directions such as resource-oriented economy, environmental economy, green technologies and etc. The “brown economy”, in contrast to green economy, is based on extensive use of resources, low energy efficiency, dependence upon non-sustainable energy sources and high-level climate risk.

www.jpis.az 3 Problems of information society, 2016, №1, 3-10

The international organizations such as Organization of Economic Cooperation and Development (OECD) and Environmental Program of United Nations consider “green development” or “green economy” as a process contemplating the production and consumption of goods and services providing ecological security, as well as the investments into green development and technologies [5]. In this view, the factors such as economic development, profitability, employment and poverty reduction are considered in detail, while maintaining environmental sustainability. The establishment of green economy is mostly regarded as one of the promising directions for escape from the global financial-economic crisis. The concept of green economy is not fully superseded by the sustainable development concept. However, the achievement of sustainability is dependent upon the correct formation of economy. During the past decades, new wealth had been created, based on the brown economy, by the humanity. The greening of the world economy is necessary for the development of sustainable economy. At present, the signs of establishment of new economic model are observed in individual countries. Global economic recession has also necessitated the establishment of green economy. Ecological component already occupies one of the significant places in anti-crisis programs developed by several governments. At present, there is no a holistic concept, which specifies the coverage of green economy. Individual countries adopt this process in slightly different forms. Actually, the differentiation of appropriate measures taken in economy from country to country is acceptable. Because, great differences, in terms of quality, exist between the human capital of -developed countries and developing or newly industrialized countries, and these differences are also reflected in measures related to green economy of respective countries. The necessity of transition to green economy is emerged from three main reasons [6]: 1. Enlargement and intensification of human impact on environment within a limited area is impossible. The increase in impact opportunities due to the space and the vast of ocean depths is quite limited in the current state and near future. 2. Non-renewable natural resources on the Earth are not inexhaustible. Growing population and their growing needs pose big problems in terms of their satisfaction of these needs and fair distribution of existing goods. 3. It must be considered that any negative process occurring in any corner of the Earth, as a result of human activity, will have an impact on other areas as well within some time period. Therefore, it becomes clear that new approaches must be applied for the solution of ecological, social and economic problems faced by the humanity in a modern world. Thus, it can be thought that “green” labor activity, “green” economy, “green” production, “green” thinking and “green” lifestyle must become one of the main components of our future life. The transition to green economic system encompasses three periods [7]:  First period – covers the period untill 2020, which include educating population and the development of human capital.  Second period – covers 2020-2030 years, which considers the formation of elements of green economic system.  Third period – covers 2030-2050 years. The benefits of green economic system are reaped and sustainable development is maintained in this period. Greening the economy divides the existing problems in the society into four main categories: ecological, intellectual, political and ethical. Favorable conditions and situation must be established for the transition to green economy. National legal-regulatory acts, policies, material aid and incentives, world market, legal infrastructure, goods turnover and financial aid, and etc. are encompassed herein. In the United Nations Environment Program (UNEP) Report titled “Transition methods to green economy, sustainable development and poverty elimination”

4 www.jpis.az

Problems of information society, 2016, №1, 3-10

[5], 10 main sectors of the green economy, where it is neccessary to invest in, were specified: agriculture, construction, energy supply, fishery, forestry, energy effectiveness, tourism, transport, waste management, water resources management. Economic Mechanisms and Conditions of the Transition to Green Economy Following points can be considered as the mechanisms of transition to establishment and developement stage of the green economy:1) evaluation in accordance with sustainable development principles; 2) relevant amendments to taxation system, transition from labor power taxation to pollution taxation by considering ecological principles; 3) the government procurement policy considering the production of ecological products; 4) the increase in volume of government investments in ecological infrastructure complying with sustainable development principles; 5) state support to research and development on establishment of ecologically clean technologies; 6) social strategies directed toward the maintenance of compliance among economic strategies. Moreover, UNEP has prepared recommendations related to transition policy and conditions of transition to green economy. The terms include [8,9]: 1) creation of efficient legal- regulatory principles of transition; 2) the priority of government investments and spendings in sectors stimulating the greening of economic sectors; 3) cost reduction in sectors exhausting natural capital; 4) the application of taxes and other market mechanisms for encouragement of green investments and innovations; 5) investments in development of training and education; 6) strengthening the international cooperation. These terms affirm the necessity of strengthening the role of government during transition to green economy and improvement of government policy once again. Evidently, the international cooperation and aid have a significant role among the conditions of transition to green economy. Hence, international ecological agreements ease and stimulate the transition to green economy. It can play a prominent role in solution of global ecological problems, of economic activity and in multilateral ecological agreements. The UN convention on climate change can pose a greater impact on the process of transition to green economy than all international ecological agreements [8]. The Process of Greening as a New Stage in Development of Society and Economy Number of problems are posed to the ICT and IS, the sectors constituting the basis of knowledge and skills in maintenance of development based on human potential, which is a priority of the 21st century. A prominent direction of modern times is the training of citizens serving to development based on knowledge, science and advanced technologies. Several tendencies observed in various parts of the world have demonstrated that life conservation and the maintenance of long-term development require the formation of new priorities in human economic activity. The most prominent ones of those are green economy, green lifestyle, green thinking, green mind and green intellect that provide sustainable development. The establishment of green economy is the main instrument of provision of long-term development based on available natural resources and knowledge. The steps, taken by Azerbaijan in this direction, were initiated by ICT strategy approved by the national leader Heydar Aliyev [1]. At present, new tendencies and new appeals have emerged in sustainable and human potential-based development trend. These can be specified as “green economy”, “green lifestyle”, “green consumption” or “green behavior”. The green economy and green production implies the human activity in industry and agriculture, which considers laws of nature, features not negative impact on environment, and utilizes natural resources efficiently and economically [6-12]. At the current stage, “green” knowledge and skills bear a specific importance. Experts trained for the future labor market must respond to these appeals both as professionals and

www.jpis.az 5 Problems of information society, 2016, №1, 3-10 citizens. Sustainable and long-term development, serving to interests of future generations, can only be provided within the framework of expert training based on such principles. International Initiatives, Organizations and Practices on Formation of Green Economy The UN Environment Program has put forth with initiative on establishment of green economy several times. The “green economy”, targeting the formation of the economy of the future, is constructed upon three main principles [8,10]: 1) evaluation of natural services at national and international levels; 2) employment maintenance of population by creating “green” jobs; 3) implication of market mechanisms for provision of sustainable development. In 2010, “G20” country leaders proclaimed, in the Declaration in Toronto, that evaluation methods considering the social and ecological outcomes of economic development must be applied, from now on, for sustainable and more balanced development [13]. In the UN Conference on sustainable development (“Rio+20”), held at high level in 2012, “The green economy within the context of sustainable development and poverty reduction” was one of the main topics. In this case, the conduction of additional studies has been proposed for the specification of acceleration opportunities of transition process of “green” economy to sustainable development [13]. In the UN Sustainable Development Conference (“Rio+20”), the governments have agreed that the green economy is a main instrument for sustainable development. The “Rio+20” Declaration also mentions the pursuit of the green economic policy with information exchange and realization of potential opportunities. Around 60 international initiatives have been attempted to be realized on development of green economy thus far. Fourteen of them were attributed to international forums. Main targets of the platform in those forums were specified as information exchange, science and knowledge management, and global climate change. The following international organizations mainly operate in the field of the green economy [5]: 1) United National Environment Program (UNEP); 2) UN Development Program (UNDP); 3) UN Food and Agriculture Organization (FAO); 4) International Union for Conservation of Nature; 5) Worldwide Fund for Nature; 6) Green World Global, etc. The UN preserves a leading role in solution of biosphere protection-related issues. Besides, some primary institutions and specialized organizations of the UN carry out works related to green economy issues at some degree. In the “Global ecological perspective – 2000”, adopted with the participation of 850 UN experts and more than 30 environmental organizations at the beginning of 21st century, it has been decided that the solution of environmental problems in the new millennia is solely possible with joint efforts [8]. Primary initiators of green economy-related programs being carried out are the active countries such as Norway, Denmark, Australia, , and Sweden along with above- mentioned organizations. While mentioning the practice of separate countries in development of green economy, the implemented reforms and applied mechanisms must be considered. Therefore, each country has its own features. The following versions of mechanisms appropriate for use in development of green economy can be mentioned [14-16]: ecological tax reforms and tools (for instance, carbon tax, tax concessions and cuts); 2) penalties for intensive pollution; 3) green subsidies, grants and credits for financing ecological projects; 4) elimination of subsidy maintenance for ecologically harmful activities; 5) direct government spending (for instance, ecologically clean infrastructure for organization of research and development (R & D) for clean technology), indirect support (for example, public guarantees and etc.). In Great Britain, Feed-In Tariffs Scheme (FITs) concession tax is applied in direction of development of green economy [17]. In Germany, ecological tax (Eco Tax) reform is adopted for the development of green economy [18].

6 www.jpis.az

Problems of information society, 2016, №1, 3-10

While applying green subsidies as a tool, the factors of external environment (globalization, international competition, internal market conjuncture, consumer psychology and etc.) must be taken into consideration [19, 20]. The Current Situation in Formation of Green Economy in Azerbaijan The development of non-oil sector alongside with oil sector, the progress in regions, the integration to the global economic space and the increase in economic competitiveness have shaped an irreversible image. At present, a successful policy is being carried out in direction of green economy establishment as a component of sustainable development of Azerbaijan. There is a favorable basis for realization of comprehensive environmental policy in the country. In accordance with the decisions of the Rio+20 and Johannesburg Summits, Azerbaijan implements the upgrade of environmental policy and legislation [13]. Some tasks are accomplished in adoption of government programs and laws, application of new administration principles, enhancement of national park networks, improvement of water supply for people, waste management and environmental protection amongst environmental measures. The following principles of environmental legislation in Azerbaijan contemplate the development of the green economy [21]: 1) mutual solution of socio-economic, moral problems; 2) maintenance of sustainable utilization of natural resources; 3) provision and conservation of environmental balance; 4) ecosystematic approach in regulation of environmental protection and natural resources utilization; 5) sanctions related to environmental pollution; 6) paid use of nature; 7) maintenance of ecological balance in areas and the restoration of disturbed natural ecological systems; 8) efficient utilization and restoration of natural resources, the application of economic encouragement of nature utilization and environmental protection; 9) provision of protection of environmental biovariety; 10) the responsibility for the violation of environmental protection legislation; 11) evaluation of damage incurred to nature; 12) environmentally sustainable socio-economic development, the protection of human life and health; 13) joint participation of population and public unions in environmental protection; 14) international cooperation in environmental protection, the adaptation of ecological legislative framework to European legislation and international agreements [22, 23]. Agriculture is the main source of employment in Azerbaijan and is very important for economic diversification. Agriculture is also valued due to the fact that this sphere has a prominent role in terms of food security and poverty reduction in regions. Azerbaijan has extensive opportunities for the development of ecologically clean farming, and expansion of export of the products to the world and to European market in particular. The government of Azerbaijan supports the agriculture with subsidies, leasing services, concessional credits and tax policy and carries out large-scale melioration and irrigation measures.

www.jpis.az 7 Problems of information society, 2016, №1, 3-10

Table 1. SWOT analysis (strengths and weaknesses, opportunities and threats) of the greening the Azerbaijani economy

Strengths (S) Weaknesses (W) Opportunities (O) Threats (T) Government interest for Lack of business interest Dynamic price policy for Increase in bureaucratic green development for green economy energy inputs obstacles Import concessions for Substantial financial The opportunity of Inaccurate application several green technology investment resources directing additional of legislative framework equipment requirements resources towards green development Increasing interest of Inability of population to Establishment special Clash of different experts for green economy fully evaluate the green business zone economic interests importance of the problem The willingness of Lack of specification of The necessity of The weakness of institutional organizations green tariff upgrading technological corporative to establish favorable basis of economy management environment and mechanisms The sensitivity of Lack of professionals in The expansion of The decrease in population toward the field of green application of tax and corporate social ecologically clean products technologies customs concessions responsibility and environment The sense of Weak cooperation of The establishment of Some degree of environmental protection government and business special economic zones negligence and of population sector and industrial clusters in ignorance by population corresponding area As seen from SWOT analysis in Table 1, Azerbaijan has a strong potential for development of green economy [24]. However, existing weak sides and threats impede the development of green economy. At present, system-generating paradigm of green economy – human capital development constitutes the basis of economic policy in Azerbaijan. The conduction of complex programs carried out within this policy framework (fighting poverty, sustainable development, socio-economic development of regions, food and energy security, education, information and communication technologies and etc. spheres) will maintain the achievement of targeted goals. The evaluation of each concept according to different criteria reveals negative and positive aspects [25]. From this point of view, the green economy is no exception. It is because the measures and programs of transition to green system can harm one country, but benefit another. An accurate assessment must be carried out before the realization of incentives, and opportunities must be created for rapid adaptation of people to innovations. Negative impacts of transition to green economy can occur in developing countries and resource-rich countries. The mistakes, made in earlier periods of transition to green economy, can reduce the efficiency of the system in following periods. in this regard, developing countries are worried to a greater extent. It is because, the population of developed countries is advanced in human development index, especially in an education level. As a result, in case if developing countries can accomplish the first stage successfully and shift to the second stage, developing countries may face a failure due to the lack of human capital in the first period. That is why, some developing countries consider the transition to green economy as a new political game organized by developed countries. Hence, developing countries, especially the countries rich with natural resources such as oil and gas, must be approached carefully. For successful completion of the

8 www.jpis.az

Problems of information society, 2016, №1, 3-10 transition period, also in developing countries, the support of developed countries is required. This aid can be expressed as following [25]:  Enlightenment and organizing trainings, courses and conferences for adaptation to reforms;  The providing developing countries with one of the most valuable resources – information by enhancing cooperation between the state and private sector;  Mass media support in promotion of green economy;  Assistance for the systematic solution of water scarcity problem in developing countries;  Investing in agriculture as a potential field of the green economy;  Installment of the Foreign Direct Investments in development of alternative energy sources in countries rich with renewable natural resources;  Transfer of successful and respective practice in green economy field to relevant countries;  Consideration of economic situation of developing countries in initiative endeavors and etc. In general, the transition to green economy does not contemplate that all other problems are already solved. Several problems exist, the solution of which is only possible on the basis of complex approach. Conclusion In recent years, less energy utilization and its generation from cleaner sources have been specified as a common target in curbing global economic crisis and climate changes at international level. This is also the crucial condition for another issue such as transition to sustainable development and environmental civilization. E-government technologies, ICT and information society are encountered with number of problems in securing human potential-based development as a main priority of the 21st century. The training of highly specialized experts is a primary concern of a society based on knowledge, science and advanced technologies in a modern world. The World Summit dedicated to global climate change and ecological and economic problems related to these processes has demonstrated that the provision of long-term development of the Earth planet necessitates the formation of new priorities in human economic activity and lifestyle. The most important of those are “green” economy, “green” lifestyle and “green” thinking, “green mentality” and “green intellect”, which counteract with environment and maintain sustainable development. The economy and society of Azerbaijan must succeed the development of non-oil sector by using the greening technologies of post-industrial economy in a most efficient way, and information society, in turn, must achieve the greening of economy by tracking and applying the most advanced technologies. Despite some negative features of the green economy, its advantages overweigh the drawbacks. Hence, the green economy must be considered as an a sole way to sustainable development. References 1. National Program on ecologically sustainable socio-economic development in Republic of Azerbaijan, 18 February 2003, http://www.eco.gov.az 2. State Program on utilization of alternative and renewable energy sources in Republic of Azerbaijan, 21 October 2004, http://www.eco.gov.az 3. “Azerbaijan – 2020: the vision of future” Development Concept, 29 December 2012, http://www.president.az.

www.jpis.az 9 Problems of information society, 2016, №1, 3-10

4. National Strategy on Development of Information Society in Republic of Azerbaijan for 2014-2020 years”, 2 April 2014, http://www.president.az. 5. www.oecd.org, http://www.unep.org, www.fao.org/home/en 6. Alekberov U. “Green” economy and vocational training: a new stage of civilization – a pathway to environmental civilization (ecocivilization), http://www.muallim.edu.az 7. Gasimli V., Valiyev Z., Humbatov M. and co. Green Development: energy efficiency and alternative sources. The Center for Strategical Studies under President of Republic of Azerbaijan, 2014, 144 pp. 8. United Nations Environmental Programme: Green Economy, http://www.unep.org/greeneconomy 9. Towards a Green Economy. Pathways to Sustainable Development and Poverty Eradication. United Nations Environmental Programme, 2011. 10. Global “green” new deal. UNEP Report, 2009, http://www.unep.org/greeneconomv/portals/30/docs/GGND-polisv-brief 11. Medyanik N.V. The formation of spatial paradigm of green economy // Economy and society, 2014, № 2-3 (11), pp. 396-399. 12. Porfiryev B.N. “Green” economy: new trends and directions of world economic development // Scientific works: Institute of national economic forecasting RAS, 2012, vol. 10, pp. 9-33. 13. http://www.uncsd2012.org 14. Yang P. Black energy intensity versus green energy intensity: implications for sustainable development // International Journal of Green Economics, 2014, vol. 8, issue 2, pap. 93-119. 15. Musina L.A., Kvasha T.K. A study of the effect of resource efficiency on the economic development in countries that are leaders of “green” modernization // Economy problems (Kharkov), 2014, № 4, pp. 53-61. 16. Dinda S. A theoretical basis for green growth // International Journal of Green Economics, 2014, vol. 8, issue 2, pp. 177-189. 17. http://www.energysavingtrust.org.uk/domestic/feed-tariff-scheme 18. http://www.eco-tax.com 19. Shekhurdina V.I. Green economy – competitive advantage of XXI century state // Economics and management of administrative systems, 2014, vol. 1, № 1 (11), pp. 086-092. 20. Bochko V.S., Nekrasov A.A. Green economy: the theory of matter // The Journal of Economic Theory, 2014, № 1, pp. 244-248. 21. “The Law on Environmental Protection of Republic of Azerbaijan”, 8th June, 1999, http://www.eco.gov.az 22. Bruyère S., Filiberto D. The green economy and job creation: inclusion of people with disabilities in the USA // International Journal of Green Economics, 2013, vol. 7, no.3, pp. 257 - 275. 23. Lin J. Study on Green Economy Transformation in Developing Countries / Proceedings of the 2nd International Conference on Green Communications and Networks, 2012, vol. 5 pp. 315-323. 24. Makower J., Pike C. Strategies for the green economy: opportunities and challenges in the new world of business, New York: McGraw-Hill, 2009, 290 p. 25. T.G., Okereke C., Environmental justice and conceptions of the green economy // International Environmental Agreements: Politics, Law and Economics, 2015, vol. 15, issue 1, pp. 13-27.

10 www.jpis.az

Problems of information society, 2016, №1, 11-20

Rashid Q. Alakbarov Institute of Information Technology of ANAS, Baku, Azerbaijan [email protected] AZSCIENCENET SCIENCE-COMPUTER NETWORK: STAGES OF DEVELOPMENT, INTERNET SERVICES AND PROSPECTS The article is devoted to the provision of wide-range Internet services to ANAS institutes and organizations in the realization of scientific research, scientific-practical and education issues of AzScienceNet science-computer network. Wi-Fi, Eduroam, Cloud Computing, Hosting, e-mail, distant education and etc. services provided to ANAS employees by AzScienceNet are specified in the article. AzScienceNet network is considered as one of the primary goals associated with the development of information society in Azerbaijan and it supports all the measures adopted in this direction. Key words: information society, e-science, AzScienceNet, Internet services, cloud technologies, eduroam, cloud computing, information security. Introduction The integration to the world community and the informatization processes carried out in the country poses new goals and duties in the sphere of scientific activity, along with other fields. These tasks contemplate the efficiency increase of management and conducted scientific studies in scientific institutions, the linking and direction of their activities, and the application of information-communication technologies (ICT) of scientific activity with the purpose of the integration of Azerbaijan science into scientific environment. Several requirements posed in the presidential decree related to approval of “The National Strategy on Development of Science in the Republic of Azerbaijan in 2009-2015 years” approved on 4th May 2009 and “The State Program” on the realization of this Strategy have necessitated the development and realization issues of “e-science” concept within the framework of reforms in science in the country. This matter is being realized on AzScienceNet science- computer network platform of the Institute of Information Technologies (IIT) of ANAS. AzScienceNet provides the joint operation of scientific institutions and organizations engaged in scientific activity by establishing the necessary information-communication infrastructure, the access to scientific-technical information and to computation resources via high-speed Internet network. AzScienceNet science-computer network closely supports the measures proposed by “Azerbaijan 2020: the vision to future” development concept approved by the decree dated 29 December 2012, “The National Strategy on development of science in Republic of Azerbaijan in 2009-2015 years” approved by the decree dated 4th May 2009 and “The National Strategy on development of information society in Republic of Azerbaijan for 2014-2020 years” approved by the decree dated 2nd April 2014. Hence, important tasks such as the strengthening information maintenance of science, the application of ICT in scientific activity field and the formation of electronic science have been specified in those concepts and strategies. The stages of Development of AzScienceNet network AzScienceNet science-computer network plays a prominent role as a national operator on science and education networks providing the integration of the science of Azerbaijan into world science, by providing high-level Internet services to ANAS scientific institutions and organizations in the realization of tasks emanating from the above mentioned respective concepts and strategies. AzScienceNet science-computer network, created on the basis of ANAS corporate network, provides wide-range Internet services to ANAS institutes and organizations in the resolution of scientific-research, scientific-practical and training issues.

www.jpis.az 11 Problems of information society, 2016, №1, 11-20

The primary goal of AzScienceNet formed towards the building of information society in the country is the provision of contemporary network services, necessary for the solution of scientific-research works, also scientific-practical and training issues tackled by ANAS institutes and organizations. It must be noted that a sufficient level of scientific potential and practice is present in the country for the realization of specified tasks. It does not only provide the access to scientific- technical information and computation resources via high-speed Internet network, but also facilitates the joint operations. AzScienceNet coverage includes ANAS Presidium, ANAS institutions and organizations, ANAS Nakhchivan and Ganja branches, and Lankaran and Sheki Regional Scientific Centers. ANAS is a government institution conducting and coordinating the official scientific-technical policy of the government, the management of scientific activity, as well as the scientific studies and investigations. The realization of these prominent and complex issues emerges several tasks for respective organizations. The establishment of AzScience dates back to 1980’s. During those years, the Data Transmission Network covering Republican Computation Centers (Azerbaijan State Plan Committee, “Azerenerji” Industrial Association) was established, based on x.25 technology of multi-terminal computational system of AMS (Automated Management Systems) center as the predecessor of IIT of ANAS (Figure 1).

Figure 1. Data Transmission Network based on x.25 technology. The AMS department of AAS has been appointed as a primary executor of the European Academic and Research Computer Networks (EARN) by the Order of the Presidium of USSR Academy of Sciences and had established Azerbaijan station of EARN in 1991. Besides, the organization has established the Azerbaijan Station of International Electronic Post (AS IEP) by joining “Sovam Teleport” network according to the direction of the Cabinet of Ministers of Republic of Azerbaijan and the Order of the Presidium of AAS. This electronic post service has facilitated the access to information in “Sovam Teleport”, “EARN”, “BITNET”, “RELCOM”, «IASNET» and etc. International Computer Networks for entities and organizations of Presidium of AAS and several ministries and state entities. AS IEP has become the main station of the Republican Information Computation Network (RICN) in Azerbaijan and maintained the connection of local networks of the main building of AAS Presidium and IIT of ANAS with International Computer Networks by comprising those. With comprehensive financial support of Turkish government and BP oil company, IIT of ANAS has purchased the telecommunication equipment, server and service computers complying with the level of technical features of the time in 1993, and for the first time, has established the first Internet junction of Azerbaijan in AAS main building. At the time, the

12 www.jpis.az

Problems of information society, 2016, №1, 11-20 internet speed provided by was reaching 9600 bit/sec. 14400 bit/sec speed provided by the Russian Academy of Sciences has been added to that speed thereafter. As a result of the continuous development of technical support and software and the increase of Internet connection channel speed, the Internet connection was provided for all institutions and organization located in the Academy campus . Local computer networks of institutes, mutually connected via the first Internet junction of Azerbaijan, comprised more than 50 computers. More than 20 subscribers located farther from the Academy campus have connected to this station with commuted phone line in Dial-Up regime. Moreover, in order to meet the increasing Internet access requirements of ANAS Presidium and closely located state organizations, the Second Internet junction of Azerbaijan has been established in ANAS Presidium building in 1995. As a result of the telephone line directly separated among those stations, Internet network with the largest infrastructure has started to operate in the Republic. Subsequently, the first junction has encompassed ANAS main building, all institutes located in the Academy campus and its vicinity, whereas the second junction has covered ANAS Presidium, its institutes and departments. The far-located institutes to ANAS and several state organizations have been connected to both junctions with phone lines. The institutes, located in the main building of ANAS and covered by the first junction, were connected to the main building of ANAS by fiber optic cables. Local networks with Ethernet architecture was established within each institution. The following development stage of ANAS Internet network had started with the assignment of realization of “Virtual Silk Road” project proposed by the UN Scientific Committee to ANAS. The “Virtual Silk Road” project envisaged the connection to Internet network of three Caucasus countries - Azerbaijan, Armenia, , and five Central Asian countries - Uzbekistan, Turkmenistan, Kyrgyz Republic, and Tajikistan, with the most advanced satellite technology and thus, the establishment of “Virtual Silk Road” project.. The primary goal of this project is the creation of necessary opportunities for solving socio- economic and other problems emerged in strategical fields such as science and education, alongside with the substantial increase of the information exchange among academic societies of the above mentioned countries. On this purpose, the assembly of satellite antenna and the network equipment has been planned in each of eight countries (Figure 2). This equipment was considered to be connected to Network operation center located in Hamburg, Germany via EUROASIASAT satellite station via artificial satellite as shown in Figure 2. In 2003, the opening ceremony of VSAT type aboveground satellite-communication equipment start-up has taken place in the Institute of Information Technologies of ANAS, which has been delivered to the republic within the framework of “Virtual Silk Road” project by NATO Scientific Committee. Secretary general of NATO, lord George Robertson, councils of foreign countries, prominent scientists of the republic and the representatives of various ministries, science and education institutions have participated in the ceremony. A videoconference has been held between the Network operation center located in IIT of ANAS and the NATO Network operation network located in Hamburg, Germany during the ceremony.

www.jpis.az 13 Problems of information society, 2016, №1, 11-20

Figure 2. The Equipment assembled according to “Virtual Silk Road” project It is to be noted that the information downlink speed from Internet via “Virtual Silk Road” project had reached 3 Mbps and the information transmission speed had been 512 Kbps until December 2005. Currently, the socio-economic development of Republic of Azerbaijan has facilitated the provision of AzScienceNet science-computer network infrastructure with new equipment and the high-speed connection to international computer network. It must be mentioned that. in 2009, the IIT of ANAS has been assigned by ANAS Presidium to establish a new junction of AzScienceNet science-computer network. The working group formed in the Institute for this purpose has carried out intensive research work. By taking conducted research and practical studies in this field as the basis, the measures have started to be carried out in association with the establishment of new Data processing center of AzScienceNet science-computer network. The new junction of AzScienceNet science-computer network has been put into service in 2010 (Figure 3).

Figure 3. The new center of AzScienceNet science-computer network The Center located in the building of the Institute of Information Technologies of ANAS has been established based on the telecommunications and server equipment of Cisco and HP companies. The newly established center has gained access to Internet by connecting to Delta Telekom with optic connection channels. The Internet access speed of AzScienceNet science- computer network has reached 130 Mb/sec. At present, the technical features of AzScienceNet science-computer network and Data Center are as following:

14 www.jpis.az

Problems of information society, 2016, №1, 11-20

 The number of individual computers connected to AzScienceNet network – 4000 units;  Internet connection speed - 270 Mbit/s.;  Computation power - 14 Tflops.;  The volume of bulk memory – 200 Tbytes. The primary purpose of the Internet Center is the provision of high-speed, secure, 24-hour Internet access to global network for “AzScienceNet” science-computer network users. At the same time, in accordance with the requirements of the above mentioned state programs, the enhancement of AzScienceNet science-computer network infrastructure, the reliable establishment of security and monitoring systems, the application of open grid, cloud computing and eduroam services, and the organization of video conference system facilitate the realization of complex actions towards the integration with corresponding scientific network entities performing at international level and other countries. The provision of “AzScienceNet” science-computer network with new telecommunications and server equipment, and the realization of various Internet services on the basis of those have accelerated the integration of this network into various network infrastructures of the world and Europe, in particular. The membership of AzScienceNet science-computer network to TERENA (Trans European Research and Education Networking Association-Trans) has been agreed in General Assembly in Vilnius, Lithuania on 3-4th June, 2010. Thirty nine countries became members of TERENA. Azerbaijan is among those countries. Alongside with Azerbaijan, Latvia, Estonia, Moldova and Belarus are also the members of the mentioned organization among CIS countries. ANAS has carried out a significant step towards the integration of scientific-research and education network of Azerbaijan into corresponding network infrastructure of Europe. Azerbaijan is represented by the IIT ANAS in mentioned organization, close cooperative relations exist between them. General Assembly of TERENA is the supreme body of the organization. TERENA encompasses the networks of national academic and other associated organizations in European countries. The primary goal of TERENA is to assist the improvement of international networks’ performances used for scientific purposesç considering the interests of member countries in the association. It is to be mentioned thatç in 2011, the use policy has been developed for the efficient and secure use of AzScienceNet science-computer network resources [2]. The primary purpose of the policy is the purposeful and secure application of AzScienceNet science-computer network resources in the solution of scientific-research, scientific-practical and education issues carried out in scientific institutions of Azerbaijan. The services of AzScienceNet science-computer network AzScienceNet science-computer network provides the following Internet services to users:  electronic mail service;  hosting services;  monitoring and information security services;  AzScienceCERT service;  electronic library service;  distant education service;  Cloud Computing service;  eduroam service; A mail-server is set up for e-mail service of AzScienceNet science-computer network in the Internet center of the IIT of ANAS. This mail-server provides services to AzScienceNet science-computer network users. CommuniGate Pro software is applied for creating mailboxes for e-mail users and making changes in Mail-server. In general, 1500 users are benefitting from e-mail services. Each of them are assigned 1Gbyte mailbox in mail-server. At present, the web-sites of more than 30 organizations are located in hosting server.

www.jpis.az 15 Problems of information society, 2016, №1, 11-20

Monitoring and information security service provides the network activity of monitoring system of AzScienceNet science-computer network. The monitoring system carries out the following issues [3]:  maintenance of network security;  control over the state of network;  optimal utilization of allowed throughout bar;  monitoring of user activity;  optimization of network equipment parameters;  detection of network failures;  data collection for decision-making related to the organization of network activity. AzScienceNet science-computer network prepares various reports regarding the monitoring of activity of network users:  Report on IP-addresses;  Report on data type;  Report on host categories;  Report on countries;  Report on days;  Report on weekdays;  Report on day hours;  Report on web-sites. AzScienceCERT service is a group responding to information security incidents in AzScienceNet science-computer network. The main purpose of AzScienceCERT is the maintenance of management of information security risks at AzScienceNet science-computer network at an allowed level. In accordance with this purpose, AzScienceCERT carries out such issues as the detection, prevention and user apprising with regards to the actions intending to violate information security. AzScienceCERT service conducts the collection, storage and the analysis of statistical data related to the expansion of malicious programs and network threats in AzScienceNet science- computer network. In order to carry out the targeted tasks, AzScienceCERT establishes mutual connections with other similar groups operating in Azerbaijan, government bodies, international groups, engaged in the processing of information security incidents and other organizations operating in the information security field. Therefore, AzScienceCert team has been registered by European CERTs’ Trusted Introducer (TI) service in 2010. TI service is active within Trans-Europe Research and Education Network Association (TERENA). Its main goal is creating trust among CERT centers of European countries. TI includes new entities into trust network, and plays a role of the reliable third party. TI service is engaged in registration, accreditation and certification of CERTs [4,5]. The infrastructure of the IIT electronic library service is established on the basis of AzScienceNet network. The established Intellectual Information Service System is developed for the purpose of provision of operative information services oriented to user request in both online regime and electronic library base. The system functions are realized in several modules and grouped under “Information”, “Electronic catalogue”, “Electronic resources”, “Electronic libraries”, “Administrator menu” sections in the menu. Multifaceted activities are being implemented regarding the development and application of new training forms, including distant education and enhanced opportunities of interactive training. Measures are being carried out in stages towards the establishment of distant education centers, based on the advanced technologies in all science and education institutions of the Republic.

16 www.jpis.az

Problems of information society, 2016, №1, 11-20

Distant education service is established based on AzScienceNet science-computer network in the IIT of ANAS. The distant education center is established using the equipment of Polycom company possessing enhanced facilities. This service, first, has been used by doctoral students and degree candidates of Nakhchivan State University (NSU). In 2014, the second Distant Education Center has been established in ANAS Ganja branch; doctoral students and degree candidates of science and education institutions located in Ganja and neighboring areas already benefit from distant education. In future, the establishment of Distant Education Center of the Institute in Mingachevir, Sheki and Lankaran is planned in future. Cloud computing service was established in 2014. The application of Cloud Computing services is economically more efficient. Cloud Computing service provides users with the computation and memory resources by carrying out the clustering and virtualization of computation and memory resources of data processing center with the help of communication technologies [6, 7]. The employees of ANAS institutes and organizations employ the computation and memory resources of the IIT data processing center in order to use Cloud Computing system services. Firstly, this system is constituted of cluster-type computation system of 512 virtual processor (multi-core processor) and 200 Tbytes of memory. The data memorization block is comprised of 200 Tbytes SAN technology-based memory massive. Users are connected to the center with high-speed connection channel. The established system will allow the more efficient use of computation and memory resources. In 2010, Eduroam (education roaming) service was established. Eduroam services facilitate the connection to global Internet network for users from any corner of the world [8]. The following measures have been taken in order to apply Eduroam service in Azerbaijan, and connect the country to the worldwide eduroam network and to introduce it:  National Eduroam server software has been developed and user registry system has been established;  Wireless Wi-Fi access point equipment has been set up. Azerbaijan National Eduroam server is located in AzScienceNet science-computer network, it carries out republic-wide National Operator function and has been registered in European Eduroam Confederation organization on 11 November 2011. At present, this service is created in 6 ANAS institutes. AzScienceNet network provides Internet services in Education-Innovation Center (EIC), which was established in 2003, and is one of the structural departments of the IIT. Network infrastructure in EIC is created on the basis of AzScienceNet science-computer network. EIC is closely engaged in measures concerned with the formation of information society and the establishment of electronic government in Azerbaijan. As known, the main purpose in establishment electronic government is growing computer literacy and information culture in all members of the society. The activity of EIC is constructed in the direction of realization of this purpose:  Teaching “Informatics” subject to all doctoral and PhD students, and adoption of candidacy minimum examinations in accordance with the Resolutions dated 25 October 2002 and 16 December 2002 of Higher Attestation Commission under the President of Republic of Azerbaijan;  The organization of Information Technologies (IT) courses in different directions;  Knowledge certification in IT sphere. During 2003-2004 years, around 14 thousand doctoral students and degree candidates have participated in “Informatics” courses and have taken candidacy examinations.

www.jpis.az 17 Problems of information society, 2016, №1, 11-20

Figure 4. Cloud Computing service In 2014, online TV broadcasting service has been created on network over the Internet. With the help of this service, the conferences, events and etc. held in ANAS institutes and organizations can be streamed online over the Internet. The First Congress of Azerbaijan Scientists held on 18 December 2014 was streamed live via Internet. The Congress had been viewed by approximately thousand Azerbaijanis residing abroad. The organization of “Hot line” service on network. This service is activated by AzScienceNet science-computer network users addressing their complaints (via e-mail, phone or web-site), regarding the problems emerged in the network, to the operator of the 24/7 active Call Center. After the operator redirects the information to center administrator, the latter quickly eliminates the emerged problem, together with technical team. The established system carries out the processing, control and analysis of requests incoming from users. Development prospects of AzScienceNet science-computer network AzScienceNet science-computer network is a network platform and main infrastructure of “E-science”, a project of “Electronic Azerbaijan” State Program (SP) carried out in the country. “E-science” plays a prominent role in organization and development of scientific activity in accordance with contemporary requirements, enhancement of scientific management and the formation of national scientific information space by using ICT facilities. “E-science” targets the mutual link among scientific organizations and collectives, the efficiency increase of scientific management and research work, development of all science fields at levels of world standards, and the integration to world science. The aim of “e-science” is the wide application of ICT in scientific institutions, and the development of unified national scientific online infrastructure and information space [9]. AzScienceNet science-computer network provides the establishment of required information-communication infrastructure and the access to scientific-technical information and computation resources of scientific entities and organizations engaged in scientific activities via high-speed Internet network. Due to absence of the common concept regarding the issues of reconstruction and development of scientific activity based on modern ICT at present, the work, conducted by organizations engaged in scientific activities, does not comply with contemporary requirements related to technical, economic and other problems [10]. Hence, the development and realization

18 www.jpis.az

Problems of information society, 2016, №1, 11-20 of “E-science” concept, based on world experience within “Electronic Azerbaijan” SP, is one of the exigent and topical issues occured to scientists and experts. “E-science” is an integral part of e-government, being formed within “Electronic Azerbaijan” SP. Its primary goal is the development of science in accordance with contemporary requirements, improvement of scientific administration, wide application of ICT in scientific institutions of the republic, the formation of a unified national scientific information space, the provision of information security, and thus, the achievement of close cooperation among scientific organizations, collectives and scientists, the efficiency increase of research works, the development of all fields of science at levels of modern world standards and the integration into world scientific space. The “E-science” does not only envisage the ANAS institutions, but also the reconstruction of those with the application of ICT and the formation of unified online scientific infrastructure for the efficiency increase of performance of the country’s scientific institutions. The transparent, accurate and operative information regarding the top-priority directions of research works, ordered and financed scientific-research works, obtained results and so forth will accelerate the conduction of research works in progress, provide the mutual links between scientific organizations and scientists, facilitate the development of all scientific fields at levels of modern world standards, accelerate the integration of those into world sciences and as a result, will eliminate the digital backwardness. The e-science project platform and infrastructure is contemplated to be established on the basis of AzScienceNet science-computer network. It is to be mentioned that there is an emerging demand for the establishment of data processing centers formed on the basis of supercomputers for the solution of strategically important complex issues; these issues require large computational and memory resources, and emerge in government institutions and scientific-research institutes during the realization of the above mentioned “E-science” project, the evaluation processes of electronic signature and coding algorithms maintaining the information security of e-government, which is being formed and while providing high-speed Internet services to users. At the same time, a substantial need has emerged for the realization of complex works towards the enhancement of AzScienceNet science-computer network infrastructure, reliable construction of security and monitoring system, the application of open grid, cloud computing, eduroam services and electronic document flow, the organization of video conference systems and the integration into corresponding scientific network institutions operating at international level and in other countries, in accordance with the requirements of “E-science” program. The establishment of distributed multi-terminal information system service is of great importance. This system provides the information transmission to monitors located in entrances, lounges and conference halls of geographically distributed institutions and organizations. The management and information transmission to the monitors is operated from the single center. Application fields of the system:  Dissemination of corporate information (internal news, appeals of administration and etc.) of organizations and institutions;  Dissemination of scientific novelties in different fields;  Dissemination of report information and videos; The establishment of multi-point video conference system is considered within AzScienceNet science-computer network in the near future. This system will comprise the institutes and organizations of ANAS, and higher education institutions. The created service will provide the online streaming of lectures on various science fields in conference halls of higher and scientific institutions of the republic via network. The organization of online web-seminars in AzScienceNet science-computer network. Another service to be created in the near future is the organization of online web-seminars via the service network. This service will facilitate the access to “Informatics” subject lectures from

www.jpis.az 19 Problems of information society, 2016, №1, 11-20 home or work place for doctoral students and degree candidates. Tests are being held on this service. AzScienceNet science-computer network also operates in the direction of establishment and development of international connections: • Member of TERENA organization since 2011. • Member of GEANT (Gigabit European Advanced Network Technology) Association since 2014. Conclusion AzScienceNet science-computer network plays a prominent role in information society building in Azerbaijan by maintaining the contemporary network services that are necessary for the solution of scientific studies, as well as scientific-practical and education issues conducted in ANAS institutes and organizations. Necessary potential exists for the enhancement of the activity of AzScienceNet science-computer network, the improvement of service quality and coverage, expansion of international relations, as well as the realization of prospects for determining targets towards the provision of new services. The efficient implementation of the potentials of AzScienceNet science-computer network is necessary for future development of information society and its important segment - the electronic science, in the country. This work has been carried out with the financial assistance of Science Development Fund under the President of Republic of Azerbaijan – Grant № EIF-2014-9(24)-KETPL-14/02/1 References 1. https://www.terena.org 2. Alakbarov R.G. On the use policy of AzScienceNet network services // First Republican scientific-practical conference on Electronic Science Problems, 15-16 November, 2012, Baku, Azerbaijan, pp. 89-90. 3. Nabiyev B.R. On the monitoring system of information security in AzScienceNet network // “First Republican scientific-practical conference on Information Security Problems” dedicated to 90th anniversary of national leader of Azerbaijan Heydar Aliyev, 17-18 May, 2013, Baku, Azerbaijan. 4. Nabiyev B.R. The Formation of Requirement System for Critical Tasks from the point of view of Information Security // “First Republican scientific-practical conference on Information Security Problems” dedicated to 90th anniversary of national leader of Azerbaijan Heydar Aliyev, 17-18 May, 2013, Baku, Azerbaijan, p.128. 5. Alakbarov R.G. On security policy of AzScienceNet computer-science network // “First Republican scientific-practical conference on Information Security Problems” dedicated to 90th anniversary of national leader of Azerbaijan Heydar Aliyev, 17-18 May, 2013, Baku, Azerbaijan, pp. 126-127. 6. Alguliev R.M., Alekperov R.G. CLOUD COMPUTING: Modern state, problems and prospects. // Telecommunications and Radio Engineering. USA, 2013, DOI:10.1615 // TelecomRadEng. Number 3. vol. 72. i3.80. p. 255-266. 7. Marios D. Dikaiakos, George Pallis, Dimitrios Katsaros, Pankaj Mehra, Vakali Athena. Cloud Computing, Distributed Internet Computing for IT and Scientific Research // IEEE INTERNET COMPUTING - 2009. № 9. p. 10-13. 8. https://www.eduroam.org/index.php?p=europe 9. Alguliev R.M., Fataliyev T.Kh. Electronic science: goals, tasks and development prospects // I Republican scientific-practical conference on Electronic Science Problems, 15-16 November, 2012, Baku, Azerbaijan, pp. 11-12. 10. Fataliyev T.Kh. The monitoring of application of information technologies in scientific activity // Express-information, “Information Technologies” press, 2010, Baku, 68 p.

20 www.jpis.az

Problems of information society, 2016, №1, 21-30

Yadigar N. Imamverdiyev Institute of Information Technology of ANAS, Baku, Azerbaijan [email protected] BIG PROSPECTS AND PROBLEMS OF BIG DATA TECHNOLOGY Big Data covers technologies and tools for collecting, processing, analyzing and extracting useful knowledge from structured and unstructured data of large volumes generated at high speed by different sources. Recently, scientific and popular literature promotes Big Data as technology, which opens new perspectives and revolutionary changes in e-government, business, health, science, industry and other fields. In order to determine the true potential of arguments supporting these assertions and to choose the right strategy for Big Data, this paper critically examines essentials, characteristics, basic building components and analytical capabilities of Big Data, and identifies advantages, prospects and existing problems. Keywords: Big Data; Big Data analytics; Data Mining; Hadoop; predictive model. Introduction The development and implementation of information and communication technology (ICT) in various sectors of society during the last decade has resulted in the generation of large amounts of data of different formats from multiple sources. According to IDC’s evaluations, which deal with the application of information technology market, the volume of the stored data is growing rapidly by 40% per year. the volume of data hit the limit of 1 Zettabyte (ZB) (1 ZB equals to about 1 billion gigabytes) in 2010, and the volume of data reached 2.7 ZB globally in 2012. This figure is predicted to reach 40 ZB by 2020. E-government, science, economy, transport, communications, trade, tourism, healthcare and other areas generate large volume of data, and the performances of these areas depend more on the effectiveness of data collection, processing and analysis systems. Large volumes of data generated at high speed by different sources cannot be processed with traditional database technologies. The problem gave an impetus for the innovations in collection, processing and storage of this kind of data. As a result, relevant models and software have been developed for collection, storage, processing and intelligent analysis of the large amounts of data in ICT industry. Computing power, the volume of data storage devices, hardware in the form of all possible sensors, as well as high-speed Internet has reached its mature level for the resolution of such issues. In the last few years, the rapid increase in the volume and diversity of the processed data, and a number of associated technological solutions has led to the “transition from quantity to quality”, which is called Big Data. Experts believe that the trend of Big Data is the driving force of ICT industry [1]. Today, evidently, Big Data is one of the leading fields opening up new perspectives for research in processing and analysis of large volumes of data from various spheres of computer science, and extracting useful knowledge from them. Today, ICT industry is offering numerous approaches to working with Big Data both for public and business sectors. Large enterprises (banks, telecommunication operators, and retailers) may obtain almost all information about the customers by analyzing the data stored in the customer databases. Through the integration of Big Data and cloud technology, Big Data opens up great opportunities also for small businesses. In spite of all the advantages offered by Big Data technologies, only 0.5% of collected digital data is investigated. The concept of Big Data There are various definitions of Big Data concept. It was first defined and described by Meta Group (Gartner company) for its “3V” characteristics: Volume, Velocity and Variety. IBM added the fifth V based on the data quality: Veracity. Referring to the value of Big Data, Oracle added one more V: Value [2].

www.jpis.az 21 Problems of information society, 2016, №1, 21-30

Accordingly, more comprehensive definition is called “5V”: Volume, Velocity, Variety, Value and Veracity (Figure 1).

Volume Velocity

Value

Variety Veracity

Figure 1. Big Data – 5V [2] Volume – Big Data unable to be processed by traditional methods due to its large volume. Velocity - speed of generating and processing new data. Big Data is a phenomenal acceleration of data collection and complication of its processing. Variety - variety of types of processed data: structured, semi-structured, and unstructured. It is a set of tools that allows working with Big Data irrespectively of its type and volume. Veracity - quality and source of data: good, bad, indefinite, inconsistent, incomplete and so on. Value - is of little intensity of value; it is necessary to process very large amounts of valuable data to find necessary information. Big Data is a new generation of technologies and architectures obtaining the greatest value from collecting, processing, and analyzing large volumes of data generated at high speed by different sources, and providing veracity of automatic quality control [3]. Big Data volume. The concept of Big Data is often described as much more than a few terabytes of data. In particular cases, some data warehouses may grow up to thousands of terabytes, that is, a petabyte (1,000 terabytes = 1 petabyte). The data more than a petabyte is measured by Exabyte (Eb), for example, the data collected on the Internet in 2009 is estimated to be 500 Eb. The metrics and proper volumes of data are given in the Table 1. I can be noted that the following data classification is known: - Large data: 1000 megabytes (1 GB) up to a few 100 GB; - Very large data: 1000 GB (1 terabyte) up to a few terabytes; - Big Data: a few terabytes up to hundreds of terabytes; - Extremely Big Data: 1000 terabytes up to 10,000 terabytes (1 petabyte up to 10 petabytes).

Table 1. Data metrics Metrics Volume, byte Metrics Volume, byte Kilobyte (Kb) 103 Exabyte (Eb) 1018 Megabyte (Mb) 106 Zettabyte (Zb) 1021 Gigabytes (Gb) 109 Yottabyte (Yb) 1024 Terabyte (Tb) 1012 Brontobyte (Bb) 1027 Petabyte (Pb) 1015 Geopbyte (Gb) 1030

Big Data Sources. Social networks, log-files of web sites, and scientific data (in astronomy, physics, human genome, meteorology, biochemistry, biology) are well-known Big Data sources. 15-20% of data is generated by the “Internet of Things”, as well as numerous phones, tablets and other devices. The data generated by the "Internet of Things" is predicted to reach 40% of the total data by 2020.

22 www.jpis.az

Problems of information society, 2016, №1, 21-30

Modern medical technology also generates large amounts of data associated with the medical assistance (images, video, real-time monitoring). Manufacturing sectors, such as power plants sometimes generate continuous data streams every minute and even every second, for tens of thousands of parameters. For several years, the application of "Smart Grid" technology has been measuring electricity consumption of households every minute or every second. Big Data Velocity. Since the volume and variety of data changes, its generation velocity also changes. Today, data generation velocity makes it impossible to be processed by traditional systems. About 7 thousand petabytes of new data is generated daily; only 10% of it is structured, at the same time, this rate is constantly decreasing. There are many organizations generating big data at great velocity. Each day, Twitter generates about 5 GB data a minute or 7 TB a day, Facebook - 7 GB a minute or 10 TB a day. YouTube claims that 24 hours of video is uploaded every minute. History of Big Data. While most of the debate is related to the business applications of Big Data, in fact, the term appeared in a corporate environment, and offered in the scientific article, and it is one of the very few terms, the history of creation of which is precise [4]. The journal “Nature” published its special issue, on September 3, 2008, dedicated to the question “How technologies working with large amounts of data can affect the future of science?” The special issue concluded the discussions on the role of data science, in general, and e-science, in particular. Clifford Lynch, the journal editor, introduced the term Big Data analogous to the metaphors in Business English as “big oil” and “big ore”. However, the concept of Big Data is not new, it appeared in the time of mainframes and scientific calculations associated with them. It is known that scientific calculations are always distinguished by their complexity, and often occur in association with the need for large-scale data processing. Big Data industry has emerged from the need to process large amounts of data of many companies, as the traditional methods would no longer work. For example, in some sources, Google processes 24 Pb (24 million gigabytes) of information a day. The price of supercomputers, managing such volumes, is too expensive for most companies, and they are looking for its alternatives. One of such ideas was connecting a large number of common computers in a network, and distributing the calculations among them. The problem was frequent accidents in such systems. The program repeating these calculations in different areas of the network solved this problem. Due to this program, the failure of one of the elements did not affect the final result [5]. Big Data became more popular after McKinsey consulting company announced report on “Big data: The next frontier for innovation, competition, and productivity” in June 2011. The report estimated the potential of Big Data market in billions of dollars [1]. At present, according to the potential of Big Data, it is generally accepted at least as the second sector of ICT industry. Big Data analytics tools. Tools and technologies for collection, management, analysis and visualization of large-scale data are available in several areas, including statistical analysis, computer science, applied mathematics and economics. Some of them were first used to work with small data, and later with large-scale data successfully; while the others were formed from scientific issues and managed by the companies (first of all, Google, Amazon, Yahoo, Facebook, etc.) aimed at working with large amount of data.

www.jpis.az 23 Problems of information society, 2016, №1, 21-30

Predictive models (real-time) Analytics (Business, client, field) (for eg., Splunk, JAckBe)

Big Data machine learning mechanisms (for eg., Mahout, IBM, SkyTree)

Big Data Software platforms (for eg., Hadoop, Cloudera, Hortonworks)

Big Data Storage (for eg., mongoDB, Cassandra, HANA)

Figure 2. Big Data ecosystem Big Data ecosystem can be defined as in Figure 2. Big data storage and software platforms included into the ecosystem comprise technological base of Big Data, which provides data collection from different sources, its storage and management. Big Data analytics tools are built on Data Mining, Machine Learning, and Text Mining [6-8]. The problems of Big Data ecosystem can be divided into three groups: 1. Data Storage and Management – hundreds of terabytes or petabytes of volume does not allow storing and processing the data by traditional relational databases. 2. Unstructured Data Processing- most of Big Data is unstructured, as text, video, audio, images, multimedia and so on. How to organize unstructured data processing and analysis? 3. Big Data Analysis - statistical analysis, Data Mining, machine learning, simulation models, optimization methods, data visualization, aggregation, integration and other methods are used for Big Data Analysis. Moreover, Predictive analytics is distinguished as a separate direction [9, 10]. Unstructured Data Processing. Unstructured Data is characterized by a number of signs, which complicate the data processing with standard analytics tools, and at the same time, which is a unique potential for the extraction of new knowledge. First, that is its variety. Second, it is not ambiguous - a data set may have different meanings depending on the context, language and cultural characteristics. Third, it is dynamic - data structure and values vary over time. Moreover, unstructured data often bear subjective and emotional character. Defining the ontology (structure) of the case study is the first step in structuring the unstructured data. Ontology comprises the scheme of description of the field of study, and the rules of relating the data to this subject. As the scheme it includes the concepts, as essences, attributes the essences, and relations. Relations include the attributes that reflect service information, emotional shade of relations, an object of relation, method of relations and so on. Criteria for concepts, attributes and relationship are specified with the rules of relating the data from the unstructured data streams to this or any other subject field. After determining the ontology of the subject field, several tools can be applied to the structured data such as search, classification, visualization, analysis, forecasting, pattern detection, identification of emotional shades and data extraction.

24 www.jpis.az

Problems of information society, 2016, №1, 21-30

Unstructured Data Mining is relatively newer field of scientific research rather than Text Mining [11, 12]. Key research works in the field of Text Mining mainly focus on texts classification, clustering, summarization, feature extraction, question answering, thematic indexing, keyword searching, sentiment analysis and Opinion Mining [8, 10, 12]. Today, many leading software manufacturers offer Text Mining products such as: • Intelligent Miner for Text (IBM); • TextAnalyst, PolyAnalyst (Megaputer); • Text Miner (SAS); • SemioMap (Semio Corp.); • Oracle Text (Oracle); • Knowledge Server (Autonomy). Predictive analytics is a set of statistical analysis, data analysis and game theory methods used in the analysis of present and past data or events to predict the future data or events. Predictive is close to Data Mining, since the predictive analytics partly used similar methods. The main point of Predictive analytics is to define a predictor or predictors (parameters affecting the predicted event). For example, when determining insurance coverage, insurance companies review predictors such as age and driving experience. Predictive analytical model comprises majority of predictors. This model probably predicts the future of the reviewed event. The most famous example of the usage of Predictive analytics is the introduction of scoring models to assess the solvency of the customer when issuing credit in the bank. Nonetheless, predictive analytics is applied in a wide range of fields, however, it is mostly needed in banking and financial services working with end consumers, insurance, pharmaceutical, public sector, telecommunications and information technology, and retail sales. Eric Siegel shows ten most widespread scopes of application of predictive analytics in his book "Predictive Analytics" [13]: direct marketing; predictive advertising orientation; detection of fraudulent schemes; investment risk management; maintaining customers; recommendation services; education; political campaigns; decision-making systems of medicine; insurance and mortgage loan. Building Big Data Models. Building exact Big Data models is often challenging. There are Map-Reduce realizers for parallel processing of large volumes of data of Different Data Mining and Machine Learning algorithms. However, the final model obtained from the processing of large amounts of data, is really hard to be considered exact. In fact, building small data models is more profitable. One of the approaches to Big Data analysis includes the usage of data for segmenting and clustering entire volume of data, and then, building multiple models from the obtained small segments and clusters, and finally, forecasting on the appropriate models. In the case of limit, separate models of any person can be built in the data warehouse to predict future purchases of the customers. Accordingly, analytics platform supporting Big Data should be capable to handle hundreds, or even thousands of models, and, if necessary, to configure them again [14]. Big Data technologies Distributed file systems. Big Data (terabytes, petabytes) can be stored and systemized in the distributed file systems. Using standard hardware and open source software (e.g. Hadoop) in distributed file system management can relatively ease the realization of safe data warehouse [15]. Google File System, Lustre (Linux and Clusters or Lustre File System, LFS), IBM's General Parallel File System (GPFS), Hadoop Distributed File System (HDFS) and many other solutions support Big Data distributed file system. Google File System is mostly designed for search, while HDFS is more suitable for analytical applications [16]. However, there are such application areas that none of these tools does not fully meet the requirements. The tools are required distributed data requests, and the data may be distributed geographically and among different warehouses. In this case, the data to

www.jpis.az 25 Problems of information society, 2016, №1, 21-30 minimize costs and avoid unnecessary migration data and used in a multi-level system, you need to keep close to the ground. New types of databases. Effected by a sharp increase in the volume of data, some motion starts to be noticed in database management systems (DBMS), which is considered a stable area, and it is self-evident in the appearance of NoSQL and NewSQL [17, 18]. NoSQL (not only SQL or no SQL) is a notion that conveys some approaches and projects aimed at the realization of database models significantly differing from the requests to the data via SQL used in traditional relational databases (appeared in 2009). NoSQL is a new databases type: non-relational, distributed, open source, and horizontally scalable. Hash-tables, trees, and other data structures can be used for the description of the scheme during the application of NoSQL solutions. Supporters of the concept NoSQL note that this concept does not completely deny any relational model and SQL language. The project points from the fact that SQL is an important tool, however it cannot be universal. One of the problems of the relational databases is associated with its poor functioning with large amounts of data. The goal of the project is to expand the capabilities of database where SQL is not flexible. Effective cluster solutions. Currently, parallel database technologies are widespread. This technology provides the requests of the processor set to the integrated databases. In turn, it increases the rate of transactions, supports the functioning of multiple users simultaneously, and accelerates the implementation of complex requests. SNA (Shared Nothing Architecture) – an architecture, the resources of which are not distributed, is better scaled and gets increasingly popular. SNA is a distributed independent computing architecture, in which each node has its memory, disk array, and input and output devices. In such architecture, each node is independent and does not share anything with other nodes of the network. Each SNA node has a special interaction protocol with other nodes and fulfills its own problems. The efficiency of such systems can be increased by adding processors, operational memory, disk memory to each node, or by increasing the number of such nodes. Big Data and cloud technologies. Cloud technology, first of all, is a flexible approach that provides efficiency, scalability, migration and expansion for Big Data analysis [19]. Cloud environment enhances the effectiveness of the requests to data and offers flexible majority of resources to enable processing of large amounts of data. This solves the problem of ensuring sufficient amount of computing resources for the storage and processing of large-scaled data. Data is placed in several areas of cloud, which allows placing it close to the user, reducing time and increasing productivity. Virtual company Pivotal Initiative has been designed to deliberately support integration of Big Data and cloud technologies, and it includes companies such as Pivotal Labs, Greenplum, vFabric, Cloud Foundry, Spring and Cetas. That is combining PaaS and Big Data analytics solutions in a unified structure. In this alliance, VMware products are responsible for the combination of infrastructure with PaaS, Greenplum systems - analytics, Pivotal - product lines, and for the creation of general commercial solution. Hadoop ecosystem. Today, Hadoop ecosystem (Figure 3) is identical to Big Data. In Hadoop,MapReduce technology is implemented, which provides automatic data paralleling and processing in the clusters (created by Doug Cutting and Mike Cafarella, in 2005, and Hadoop is derived from the name of the elephant toy of Cutting’s little son). Most of the Hadoop components are open-source software developed within various Apache projects [16, 20]. A brief description of some components included into Hadoop ecosystem is shown below:

26 www.jpis.az

Problems of information society, 2016, №1, 21-30

Oozie Pig Mahout Hive Sqoop Traffic controller Script Machine learning Data warehouse SQL- databa se Zoo- HBas HCatalog Ke- Hadoop Metadata catalogue relatio e eper ns coordin Linear ation data base Flume MapReduce 2.0 (YARN) Log- Distributed calculations Collec tor HDFS Hadoop Distributed file system

Figure 3. Hadoop ecosystem HDFS (Hadoop Distributed File System) - is a core of Hadoop, and it is a distributed file system for storage and management of the data warehouse with the storage capacity from several petabytes up to terabytes. HDFS breaks input data into blocks and locates each block in the places in server sets allocated for them. TCP/IP level is used for communication. HDFS fault resistant, the failure of one of the components does not affect the work of the system. HDFS enables applied programs to work with hundreds of odes and petabytes of data. For example, HDFS system manages about 40 Petabytes of data in Yahoo!. MapReduce – performs distributed computing model (in Java) offered by Google in 2004 for the parallel processing of large volumes (petabytes) of data in computer clusters. MapReduce’s function consists of two steps: Map and Reduce. In Map, introduced data is preliminarily processed. For this, one of the computers (master node) receives preliminary data of the issue, breaks it into sections and allocates it among working nodes of distributed file systems for pre-processing. In Reduce, master node collects and combines preliminarily processed data, and forms the problem solution [21]. Pig - top-level language to evaluate large amounts of data. Apache Pig component was designed for the generation and implementation of the teams on Big Data sets. The main feature of Pig is paralleling, which helps to manage large data sets. Pig component consists of the compiler, which generates a sequence of MapReduce, and “Pig Latin” language. Hadoop supports the handling of requests similar to SQL in the distributed databases. Hive – data storage infrastructure, used to request to large amounts of data located in Hadoop file system via SQL, and it fully supports MapReduce. Another feature of Hive is supporting the indexes as bit-map indexes to speed up queries. Apache Hive, created by Facebook, is now used and developed by several companies. HCatalog - provides management services for the tables and storages of the data created in Hadoop. HCatalog offers features such as a mechanism for common schemes and data-types, table abstraction, and supports sustainable functioning of Hadoop components, such as Pig, MapReduce, Streaming and Hive. HBase (Hadoop DataBase) – distributed and linear database (stems from Google's BigTable), it uses HDFS for storage purposes. It controls both calculations in package mode through the use of MapReduce, and random reads. Zookeeper - another important component of Hadoop ecosystem. Its main function is to provide the storage of coordination details, naming, distributed synchronization and group services, which are important for a variety of distributed systems. In fact, HBase’s funtioning depends on ZooKeeper.

www.jpis.az 27 Problems of information society, 2016, №1, 21-30

Mahout - software for machine learning, which includes basic algorithms as classification, clustering, and collaborative recommendation and packet filtering. The basic algorithms are realized with Map/Reduce paradigm in top-level of Hadoop, however, it can also be used beyond Hadoop as a software library targeted at linear algebra and statistics. Sqoop and Flume included into the ecosystem is used to transfer data to Hadoop-clusters and vice versa. Hadoop is often used together with standard technologies for storage and processing of data, and sometimes, innovative solutions such as Storm, Dremel, and Drill are added. In addition, practically all the major manufacturers of business analytics products add functional capabilities in order to request to the data constantly stored in Hadoop-clusters. The list of components can be expanded many times, because more and more companies join the market with their products related to Hadoop in this or other terms. Some challenges of Big Data One of the problems of Big Data applications is related to the evaluation of the effectiveness of Big Data projects. Two sources of the effectiveness of such projects exist: 1) It reduces time and costs of large data analysis, and provides quick preparation of information for timely decision making; 2) Applying Big Data technologies provides individualization of e- services. Along with this, despite the promises for announced economic efficiency and expediency, it is very difficult to calculate the economic efficiency of Big Data projects. The second problem is related to the training of specialists, who are capable to apply Big Data technology in various fields. Such specialists, on one hand, should master mathematical statistics, data analysis, and machine learning, and they should have programming skills, should be able to work with hardware-software suits offered by IBM, Oracle, HP, SAS, SAP and other companies. On the other hand, they should have skills to formulate the problems of a specific area, where Big Data technologies are applied. They should know methods, scenarios and algorithms of the subject field, and should be able to form requirements for the functional characteristics of hardware and software systems, which implement Big Data technologies. At the same time, abusing new technologies can also be disappointing. For example, worthless corrections can be detected as the result of Big Data analysis. Harvard University professor David Leinweber proves that the revenues of the companies included in the S & P 500 can be predicted according to high accuracy based on the volume of butter production in Bangladesh [22]. Many interesting problems can be studied and solved with the use of sparse data sets, as well. “Small Data” movement. Another important revolution lies behind the success of Big Data, namely Small Data. Due to the rapid fall in the costs of data storage, its collection and processing is democratizing. On the contrary, ecosystem of centralized, distributed data and knowledge has the biggest potential in the age of technology: - More work can be performed in a single computer even in the organizations such as Microsoft and Yahoo! For example, in Microsoft, the average job size equals 14 GB and 80% of work is less than 1 TB. average job size in Yahoo! is approximately 12 GB [23]. - Surveys show that the work in Facebook is subject to the exponential distribution law, and slight work is dominating [24]. At least in 90% of the work, the size of input data is less than 100 GB. Precise study of Hadoop loading in Facebook revealed that, very small portion of work reaches terabyte and more, and in most cases, input and output data averages around megabytes and gigabytes [25]. Protection of personal information. Big Data technologies pose serious problems in terms of privacy. Various socio-economic actors collect plenty information about users, such as the user’s behavior in web site and social networks, behavior and relationships of other persons related to the user, their trade behavior and so on. Furthermore, emotional communication shades are also analyzed. Along with what the user writes in social media, it is analyzed how they are

28 www.jpis.az

Problems of information society, 2016, №1, 21-30 written. In a word, necessary or unnecessary information about the potential user is collected, and his/her overall profile is created. Thus, based on modern surveillance technology and Big Data analysis, the possibility of tracking a person throughout his/her life poses a critical dilemma between the attempts to protect the integrity of personal life and information needs of the society [26]. Conclusion At present, public interest in Big Data is at its peak. Thus far, it is difficult to say whether Big Data technology will become a necessity in the life of people as the personal computer and the Internet in the near future, but it is obvious and no one doubts that it is changing our lives and business environment. Big Data technologies have a great potential, and it is likely to seriously affect numerous areas. Changing the architecture of corporate information is not sufficient. It is required to change the work of almost all structural units of the organization. Gradually changing the process of data analysis becomes an integral part of business processes. To take advantage of the great potential of Big Data technologies, the development of smart Big Data strategy targeted at large-scale data management and analysis is of particular importance. References 1. Manyika J., Chui M., Brown B., Bughin J., Dobbs R., Roxburgh C., Byers A.H. Big data: The next frontier for innovation, competition, and productivity. McKinsey Global Institute. 2011. 2. Baaziz A., Quoniam L. How to use Big Data technologies to optimize operations in Upstream Petroleum Industry / International Journal of Innovation, 2013, vol. 1, no. 1, pp. 19-29. 3. Feblowitz J. The Big Deal about Big Data in upstream oil and gas. IDC Energy Insights. October 2012. 4. Editorial: Community cleverness required // Nature, 4 September 2008, vol. 455, no. 7209, pp. 1-1. doi:10.1038/455001a 5. Dean J., Ghemawat S. MapReduce: Simplified data processing on large clusters / Proc. of the 6th Conference on Symposium on Opearting Systems Design & Implementation (OSDI’04), 2004, vol. 6, pp. 137-150. 6. Han J., Kamber M., Jian P. Data mining: concepts and techniques. Morgan Kaufmann, 2006. 7. Bishop C.M. Pattern recognition and machine learning. Springer. 2006. 8. Feldman R., Sanger J. The Text Mining Handbook: Advanced approaches in analyzing unstructured data. Cambridge University Press, 2007. 9. Junqué de Fortuny E., Martens D., Provost F. Predictive modelling with Big Data: Is bigger really better? // Big Data, 2013, vol. 1, no. 4, pp. 215-226. 10. Weiss Sh. M., Indurkhya N., Zhang T., Damerau F. Text Mining: Predictive methods for analyzing unstructured information. Springer; 2005, 260 p. 11. Aliguliyev R.M. A new sentence similarity measure and sentence based extractive technique for automatic text summarization // Expert Systems with Applications, vol. 36, no. 4, 2009, pp. 7764–7772. 12. Alguliev R.M., Aliguliyev R.M., Isazade N.R. Multiple documents summarization based on evolutionary optimization algorithm // Expert Systems with Applications, 2013, vol. 40, no. 5, pp. 1675-1689. 13. Siegel E. Predictive Analytics: The power to predict who will click, buy, lie, or die. Wiley; 1st edition. 2013. 320 p. 14. Karthik K., Kollias G., Kumar V., Grama A. Trends in Big Data analytics / Journal of Parallel and Distributed Computing, 2014, vol. 74, no. 7, pp. 2561-2573. 15. White T. Hadoop: The definitive guide. O'Reilly Media, Inc., 2012. 16. Ghemawat S., Gobioff H., Leung S. The Google file system / Proc. of the 19th ACM Symposium on Operating Systems Principles, 2003, pp. 29-43.

www.jpis.az 29 Problems of information society, 2016, №1, 21-30

17. Anglade T. noSQL Tapes. http://www.nosqltapes.com. 18. Stonebraker M., Madden S., Abadi D. J., Harizopoulos S., Hachem N., Helland P. End of an Architectural Era (It's Time for a Complete Rewrite) / Proc. of the 33rd International Conference on Very Large Data Bases (VLDB '07), 2007, pp. 1150-1160. 19. Agrawal D., Das S., El Abbadi A. Big data and cloud computing: current state and future opportunities / Proc. of the 14th International Conference on Extending Database Technology, 2011, pp. 530-533. 20. Shvachko K., Kuang H., Radia S., Chansler R. The Hadoop distributed file system / IEEE 26th Symposium on Mass Storage Systems and Technologies, 2010, pp. 1-10. 21. Lee K.H., Lee Y.J., Choi H., Chung Y.D., Moon B. Parallel data processing with MapReduce: a survey // ACM SIGMOD Record, 2012, vol. 40, no. 4, pp. 11-20. 22. Leinweber D., Stupid Data Miner tricks: Overfitting the S&P 500 // The Journal of Investing, 2007, vol. 16, no. 1, pp. 15-22. 23. Rowstron A., Narayanan D., Donnelly A., O’Shea G., Douglas A., Nobody ever got fired for using Hadoop on a cluster / Proc. of the Workshop on Hot Topics in Cloud Data Processing (HotCDP), 2012, Article No. 2. doi:10.1145/2169090.2169092 24. Ananthanarayanan G., Ghodsi A., Wang A., Borthakur D., Kandula S., Shenker S., Stoica I. PACMan: Coordinated memory caching for parallel jobs / Proc. of the 9th USENIX Conference on Networked Systems Design and Implementation, 2012, pp. 20. 25. Chen Y., Alspaugh S., Katz R.H. Interactive analytical processing in big data systems: A cross-industry study of mapreduce workloads // Proc. of the VLDB Endowment (PVLDB), 2012, vol. 5, no. 12, pp. 1802–1813. 26. Tene O., Polonetsky J. Privacy in the age of big data: A time for big decisions // Stanford Law Review Online, 2012. http://www.stanfordlawreview.org/online/privacy-paradox/big- data

30 www.jpis.az

Problems of information society, 2016, №1, 31-40

Rasim M. Alguliev1, Rasim Sh. Mahmudov2 1,2Institute of Information Technologies of ANAS, Baku, Azerbaijan [email protected], [email protected] THE INTERNET AS A DRIVING FORCE OF THE DEVELOPMENT OF CIVILIZATION The article analyzes new realities, global and virtual relations generated by the Internet in modern society. Qualitative changes occurred with the influence of the Internet on all spheres of human activity and the emerged opportunities are commented. Moreover, the perspective development directions of the Internet and the existing threats are specified in the article. Key words: globalization, virtualization, Internet economy, virtual labor relations, cosmic Internet, biometric Internet, Internet of Things, Internet dependence, Internet crime. Introduction The Internet was established as a result of convergence of computers in the 1940s, and of communications and computer technologies in the 60s of the previous century. The idea of creating the Internet network is attributed to American Scientist J. Licklider. In his concept of “Galactic Network” written in 1962, he proposed the idea of global network creation constituted of mutually linked computers. The author has shown the possibility of gaining access to data and programs in any computer by anyone via this network. Essentially, this concept was close to modern mission of the Internet. Due to these contributions in particular, J. Licklider is fairly regarded as “the father of Internet” [1]. This convergence has provided the more rapid dissemination of information over the space and has carried out the memorization of information, and solved the time issue. By the development of ICT, these capabilities have rapidly increased. Any information freed from time and space limitations is inserted to the Internet, and everyone is able to use these sources. Consequently, Internet becomes the world information storage (memory). Internet has facilitated the transformation from industrial society to information society phase of the humanity. The main purpose of the information society as an ideology of the millennium is to satisfy the information needs of all people, regardless the age, religion, language, race, space and time, create the environment of social communication, and publicize the thoughts. By realizing these duties encountered to the information society, the humanity will achieve an instrument possessing marvelous and phenomenal features for elimination of global socio-economic and moral problems inherited from millenniums – poverty, deprivation and illiteracy, health protection, the provision of democracy expansion, human rights and other human problems. One of the authors of the concept of Information society, a prominent American Sociologist E.Toffler, analyzes the trends of revolutionary changes influencing the development of civilization in his work “The Third Wave”. He divides the stages of society development into 3 waves – agrarian society, industrial society and information society. E.Toffler mentions the increase in importance of information and knowledge exchange in information society, the decrease in prominence of traditional production factors – labor, land, raw materials and the capital, the establishment of electronic information as a main exchange instrument instead of traditional money, and the emergence of wars for information reflecting goods and services information [2]. Although the Internet has emerged as a technological novelty, it has caused an “earthquake” within the information world formed throughout the history. The wide facilities created by this global network lead to substantial changes in the way of thinking, communication, activities and social relations of people.

www.jpis.az 31 Problems of information society, 2016, №1, 31-40

According to the data of the end of 2015, 3,3 billion Internet users (the world population constitutes 7,2 billion people) exist in the world. If only 18% of world households had an access to Internet in 2005, this indicator has reached 46% in 2015 [3]. Internet technologies develop with high speed and pledge great prospects. This development process is not amenable for forecasting in most cases. Thus, Internet is a phenomenon that its development, prospects, influences, threats are impossible to forecast accurately. The progressive novelty introduced by the Internet to the society also entails specific problems. The humanity benefits from the positive influences of the Internet, and must be protected from its negative impacts. The capabilities of the Internet Internet and globalization. The process of globalization is accelerated with the impact of the Internet. This digital technology reflects gigantic information and knowledge potential and leads to unity of the humanity in a integrated global society by overstepping the national-cultural boundaries. The large opportunities facilitated by the global Internet network cause substantial shifts in the way of thinking, working manner, communication and social activity. Although the radio and the television which played a prominent role in globalization in second half of the past century have eliminated the intra-country language, cultural, folk and other. differences, Internet is about to completely eradicate these differences [4]. Internet creates new possibilities for the resolution of problems associated with asymmetric information dissemination emerged throughout the civilization history; the barriers and boundaries among the countries and nations are evoperated. The process of information and knowledge exchange among various regions, states and nations was proceeding very slowly in times of weak communication. Hence, the differences related to information asymmetry among the world countries were clearly observable. However, owing to the facilities created by ICT, including the Internet today, the exchange of information and the knowledge is being expanded among people. Internet conforms the circumscribed spaces with social, cultural, physical and functional features with one another. The global network is rapidly expanding day by day, and it is being applied to the increasing number of fields. Internet enters the world community by transgressing a particular country, and thus, the events occurring within a country are illuminated at a global scale. The Internet is subject to various changes with the development of the globalization,. It gains new forms of existence and develops the adaptation mechanisms against crises and social convulsions. In the first place, the Internet shapes the world information space and constitutes the technical-social basis of the globalization. At present, the globalization must be considered as a process developing due to the increasing impact of the Internet on various spheres of the society. The globalization process occurring as a result of renovation and alteration of these spheres entails the formation of new lifestyle and the rapid expansion of own boundaries. The globalization trend deeply penetrates the socio-political sphere of the society. With the development of modern Internet-communication tools, a favorable condition is created for freedom of choice of individual lifestyle. A person gains an opportunity to spread his/her ideas and find like-minded people with no dependence on anyone and anything. Internet and virtualization. The essence of the virtuality created by Internet influence is that people counteract not with physical objects, but their images and symbols. As one of the main factors of societal transformation and formation of information society, the virtualization is accompanied with the transformation of types of human activity and the transition of those to virtual environment. With Internet influence, the virtual “twins” of real creatures emerge in the world; the education is superseded by electronic education, traditional science with electronic science, usual citizen with electronic citizen, traditional government with electronic government, traditional

32 www.jpis.az

Problems of information society, 2016, №1, 31-40 commerce with electronic commerce and etc. Therefore, the world is integrated as a result of unity of these “twins”, and imperfections (problems) inherited from the past are eliminated. In the globalization process, the virtual reality – virtual management of events and processes, plays a prominent role. In the environment of virtual reality, the opportunities emerge for changing, combining information flow, and generating new one. The virtual reality is becoming a sociological model, capable of explaining several factors and trends of the modern society. The globalization is virtualized by the influence of the Internet per se. With the Internet impact, the traditional forms of mutual communication alter and consequently, horizontal links emerge among the participants of virtual reality. By mentioning this trend in his “Adaptive corporation” work, E.Toffler writes that “superindustrial” society type emerges with the impact of these processes and traditional organizational types lose their effectiveness [5]. Human needs to be capable to adapt to the trend of rapid changes of social infrastructures in a society. People “migrate” to virtual reality more and more with the effect of the Internet. This affects their worldview, behaviors, and lifestyle. The virtualization also reflects new communication forms acquired by people for the realization of their unfettered creativity opportunities. As a result, a human reflects himself as a social being. Hence, the virtual society acts as an alternative to the physical society. Human is not limited in his actions here. In general, the main three features of virtualization caused by Internet can be distinguished [6]: . Non-material character of impacts (images give a material effect); . Arbitrariness of parameters (objects are artificial and variable); . Temporariness (entry-exit independence maintains the opportunities to stop and resume the existence). Internet and economy. The impact of the Internet on economy is substantial. As a result of this impact, economic-financial system is exposed to serious changes; crises emerge at regional and global scale, profound disturbances occur in association with economic security of countries. Information and knowledge-based economy is formed. With the emergence of the Internet, an opinion, “Massive standardized production will be superseded by the new individualized labor system based on intellectual activity with application of informatics and super technologies” stated by E.Toffler is reinforced [2]. He noted that the expansion of individual and group creative activities and the rational exchange of the results of those via Internet will take place instead of the dominance of large corporations in the economy. Indeed, the establishment of social relations in this direction facilitates the provision of more rational, equivalent opportunities of social exchange. The simpler the exchange structure, the clearer and more transparent are the relations among the producers, and the shorter is the distance till the final user. In this case, traditional commerce intermediaries (brokers, real estate agents) are not required; this function is shifted to Internet. In turn, the bigger and more complex the social organization, the more complex is its objective analysis. This situation also creates a ground for manipulation. In the Internet economy, personal computer becomes the main production tool, and personal web site becomes an instrument for realization of produced intellectual product. Naturally, in such economy, there will be no place for private entrepreneurship (as a field of manipulative activity) not associated with professional activity and oriented to collecting social dividends. Internet and commerce. Internet and computer eliminate several important attributes of industrial society, including cinemas, book stores, traditional trade, communication systems. Especially, as a result of development and comprehensive use of electronic commerce, it is expected that the image of cities will alter significantly. Even a usual town store outsteps the limited framework and becomes not an instrument of satisfying the needs of residents, but a global store. Because, it is possible to access the web-site of store from any corner of the world

www.jpis.az 33 Problems of information society, 2016, №1, 31-40 and familiarize oneself with and purchase proposed products. Moreover, there exists no such thing as the closing time. The store is always available for a customer at any time in 24 hours in a day [1]. The emergence of electronic commerce helps to solve one of the important problems posed to humanity so far. This is the problem of information asymmetry in markets. As seller is not aware of a potential buyer in advance, a buyer also faces the problem of lack of information about a seller. Hence, the disruption of information balance has always constituted the pith of commercial relations. Electronic commerce leads information asymmetry towards symmetry, by which the information abundance is created between the buyer and seller. Nowadays the electronic commerce has become an inseparable part of every state economy. If people were cautious about the purchase via Internet only few years ago, it is very hard to find a person, who hasn’t experienced electronic commerce operations now. The number of electronic commerce operations is rapidly increasing and influencing the world economy to a significant extent. At present, the growth pace of electronic commerce exceeds the pace of trade growth as a whole [7]. Internet and labor relations. The emergence of computer and the Internet supersedes virtual relations with traditional relations and prioritizes the intellectual labor. With the influence of information, all market types, including labor market, are subject to transformation. As a result, fundamental changes and novelties emerge in labor division, employment and the structure of profession, the labor feature, employer-employee relations, and the expansion in information-intensive labor is observed. In case of virtual labor relations, the people can organize not only their own tasks, but also their activities by considering private interests. If an individual is not obliged to go to work every day and is able to work anywhere, he can choose more favorable living place for himself. In some regions of Europe, the flow of countrymen to cities observed during 200 years has weakened and, even, tendency of returning to countryside takes place. Based on this fact, the start of destruction of city civilization is conceded [8]. Internet and public administration. The character and nature of public administration alters in Internet environment. The establishment of electronic government is associated with optimization of services provided to citizens and business sector, the participation of all citizens in public administration, the transparency of public administration and accountability of government bodies to citizens. The essence of new administration concept is such that the governance activity is softer, better structured and of limited normalization and it is based on not vertical, but horizontal links. Internet and scientific activity. Internet has brought innovations and dynamism to fundamental scientific research fields. As a result, traditional science is superseded by electronic science. Electronic science is a concept carrying out the joint operation of scientific entities and organizations engaged in solution of scientific problems and possessing necessary information- communication infrastructure, with access to scientific-technical information and computation resources via high-speed Internet network [9]. During scientific activity, it is required to collect, memorize, process (i.e., to compute, draw logical conclusions, propose opinions, analyze and synthesize), to introduce it in required form vast amount of information, in other words, to publish it, visualize, to transmit and so forth. Internet has created previously nonexistent unique opportunities in order to carry out all of these. Owing to Internet [1]: . scientific activity is globalized, acquired information is distributed; . e-publications, web-sites supersede the traditional scientific publications; . the network of electronic scientific libraries is established; . special online environments are created on different scientific fields.

34 www.jpis.az

Problems of information society, 2016, №1, 31-40

Consequently, e-history, e-geography, e-medicine, e-astronomy and etc. emerge. While memorization and processing capabilities of people are limited, the traditional historical research on space and time parameters are very complex and require substantial efforts. However, all information is inserted to computer memory in e-history, the historical discrepancies, inaccurate information is detected with specific processed research algorithm by computer without space and time limitations, historic facts are improved, and the truth is revealed.so forth Internet and education. Internet education alter the traditional role of teacher. A teacher does no longer act as a sole source of information and knowledge. A part of this function is shifted to the Internet and monopoly of a teacher in this sphere is eliminated. The teacher adopts a role of technician, consultant and coordinator. For the effective use of Internet in education, the teachers are required to possess skills such as working with electronic mail, online- communication, information search systems, placing information on the Internet, the web-design and using web-design technologies [10]. Internet technologies make education accessible for everyone. Therefore, individuals with physical and social disabilities were not able to benefit from traditional education systems. The concept of distant education based on Internet technology facilities eliminates this problem. For example, individuals with health disabilities, living far from education institutions or employed, isolated from public places or not allowed by their confessions are able to use the facilities of distant education. Internet and medicine. Internet also penetrates the healthcare system and medical field. Wide application of Internet facilities in informatization of healthcare system and solution of medical problems acts as one of important trends in building of information society. Also, the establishment of information system regarding citizens’ health, the detection of disease geography with help of GIS-technologies, monitoring, diagnostics of diseases, creation of database on pharmacies and medicaments, the provision of online medical services to patients, statistical information regarding quantitative and qualitative indicators of doctors’ performance, the creation of web-portals reflecting the information regarding the treatment methods and tools of diseases and other issues are the integral components newly formed electronic healthcare [4]. Intensive application of the Internet in healthcare rapidly alters the diagnostics and treatment methods, the forms of mutual communication of a doctor and a patient, and the organization of health recovery processes. Internet becomes a prominent tool providing the accessibility of medical services for the patient. At present, the application of capabilities of Internet technologies is growing day by day for the conservation and protection of human health, the increase in birth rates and the reduction in mortality. Internet and cultural sphere. Internet also influences the cultural sphere. Global network facilitates the access opportunities to information and knowledge resources in this sphere and causes the emergence of new cultural traditions. Internet eliminates the obstacles present at geographical distances and strongly supports the transparentizing of cultural policy by stimulating the emergence of new forms of demand in cultural sphere. Virtual museums are one of the appearances of this tendency [11]. As a result of facilitation of access opportunities to art works and exhibitions, based on the use of interactivity and hyperenvironment and the application of educative mechanisms, virtual museums contribute to comprehension of cultural values and formation of new forms of comprehension. Libraries enable online access to bibliographic data bases via Internet, and they also gradually transform their collections into electronic versions. Rare and valuable works kept in physical form in library funds have always faced the threat of destruction. By transforming them into electronic form, this risk is minimized. Several major libraries of the world pursue the programs on transformation of old, hard copy collections into digital form. The archives of digitally published works are also established. In general, the Internet enables the development of culture in two directions [1]:

www.jpis.az 35 Problems of information society, 2016, №1, 31-40

Firstly, national boundaries and language obstacles of the culture are eliminated; the boundaries between the cultural forms such as science, education, art and recreation are dismantled. Secondly, each individual is not confined with comprehension of the cultural content only, but also gains an opportunity to influence it. Internet and political activity. The role of Internet-technologies in current political process is rapidly expanding. Modern information technologies, especially the Internet, created new opportunities for active performance of parties and political leaders. The growth in use of Internet facilitates the more active participation of citizens and groups in development of political decisions and decision-making process. Moreover, Internet technologies are used by political parties as a political communication instrument. The political activism outsteps the space of traditional activities and shifts to virtual environment. The society experiences the period of transition from representative democracy to direct, digital democracy, also from strict democracy to flexible democracy (for instance, wiki- democracy). Experts reckon that the traditional democracy has reached a critical point, i.e. there is no potential for developing democratic processes with traditional methods. Hence, the idea of “electronic democracy” is proposed as a solution. It is noted that in current state of globalization and political transformations, it is impossible to disregard the impact of Internet on political processes. Two points are indicated regarding the impact of the Internet on development of democracy: i) information accessibility; ii) the decision-making ability by analyzing those. Naturally, Internet creates unique, previously impossible opportunities for information collection [4]. Internet shapes the behavior of an active part of civil society by orienting towards the public opinion, and influences the social consciousness. Internet shapes the information environment of activities of leaders and parties, and becomes an integral part of political communications. The global network acts as a real interactive channel for communication with population and an instrument of political influence on electorate by political parties. The social networks, historically existing at different levels and expressed with various names, has reached the new quality level by shifting to Internet environment. Separate social groups are becoming a prominent factor in the society by obtaining the opportunities such as operativeness, flexibility, mobility and informativeness in virtual space. Virtual social networks, created by people gathered around various interests, act as an important component of socio- political, socio-economic and cultural life of the society. Internet creates new network societies by encompassing the earth. Prominent Spanish sociologist, the researcher of information society M. Castells assumes that the networks linking people, organizations and governments with one another will play an important role in the information age. In his opinion, economy, the labor, employment, culture, politics, state institutions, and time and space factors will consequently experience the transformation in information society [12]. Internet Prospects Biometric Internet. The application of biometric technologies in computer networks and Internet, due to simplicity, economy and reliability, has several advantages. Firstly, biometric technologies promise wide perspectives in terms of more trustworthy personal identification. Cloud technologies have an irreplaceable role in strengthening of the global Internet network security, effective struggle against cybercrime at national and international levels, reliable performance of electronic commerce. With the help of biometric identification system, the more efficient fight against hackers, spammers and other cybercrime acts will be facilitated [1]. Sound biometry plays a prominent role in terms of maintenance of information security on the Internet. Thus, the techniques of standard information security contemplate the presence of physical carriers (passport, plastic card and etc.) or the information evidence (password, code).

36 www.jpis.az

Problems of information society, 2016, №1, 31-40

These approve the right to use particular information resources by an individual. A human voice acts as a unique guarantee of personal identification in sound biometry system. Unlike a password, code, passport, plastic card and other traditional methods of personal identification, it is impossible to lose voice features, transmit it to another person, forget, steal or falsify. Cosmic Internet. In the near future, interplanetary apparatus will facilitate the transmission and reception of information in real time regime with the speed enabling to view video. Contemporary ships and outlet apparatus transmit information to Earth via phone line at the speed comparable to Internet connection speed. Hence, the reception of videos sent from apparatus in Mars takes several hours. As expected, this new network technology will substantially ease the information exchange among the participants of cosmic experiment. Researchers hope that the creation of cosmic Internet will facilitate the realization of a new cosmic mission. In this sense, the information in modern satellite networks are translated via satellite- retranslators and aboveground stations, which cause delays. IP-routers assembled on the Orbit allow the realization of direct traffic exchange among satellites. This allows to save time spent on translation and prevents the risks of losing separate packages. Moreover, it is possible to access Internet at places without cables and 3G networks with the help of satellite-routers [1]. Cloud technologies. Internet provides new services as it develops. Internet creates a communication environment among people and meets information needs of them. At recent times, Internet has started to satisfy people’s need for computation. Thanks to the technology called “cloud computations”, the access opportunity to software, data bases and other services is facilitated with various devices. Cloud technologies eliminate several technical and economic obstacles, and are able to expand the operation capacity of information technologies. The elimination of those obstacles will facilitate the contributions to information technologies market by the experts and the users to benefit from those opportunities. According to expert forecasts, the cloud technologies will exhibit the substantial impact in society and economy as one of the most decisive technologies in the next 20 years. The rapid enhancement of possibilities of data processing, storage and transmission establishes the basis of cloud technologies economy. The development and wide application of cloud technologies promise several economic perspectives at micro and macro levels. For this reason, the cloud technologies are considered as one of fundamental and perspective segments of information economy and Internet economy as a leading trend of it. Hence, several leading world countries devote a special place to cloud technologies in national strategies and programs on development of information society, ICT, information economy or the Internet [13]. Internet of Things. At the next development stage of the Internet, the boundless expansion of opportunities of these global networks and fundamental changes in the their essence are expected. Today’s Internet is constituted of the global network of computers used by people. At the next development stage of the Internet, the connection of all useful things (household devices, electric devices, daily consumer products, transport vehicles, production equipment, labor tools, information carriers, medical tools, security and control systems, fauna and flora) to global network, and the establishment of Internet of Things is expected. Internet of Things is characterized as the next revolutionary development stage of the industry of information technologies after computer, Internet and mobile phone communications. If this concept is brought into life, all useful things surrounding us will have IP address in the near future. According to forecasts, the Internet of Things will penetrate the lifestyle of people ubiquitously and in all aspects, and alter their life significantly. The number of users of the Internet of Things will reach 2 billion people and the annual income, earned from the network, will be 800 billion dollars in 2020. According to another forecast, the number of terminals connected to Internet will reach 50 billion worldwide. Also according to expert estimations, the market volume of RFID constituting the technological basis of Internet of Things will amount to

www.jpis.az 37 Problems of information society, 2016, №1, 31-40

27 billion dollars in 2018. For comparison, it can be mentioned that this number was equal to 1,5 billion dollars in 2004 [14]. The solution of several important problems is expected with realization of network of the Internet of Things. Furthermore, the quality improvement of medical services, the more reliable maintenance of public security, the issues of upgrading administration processes will reach the solution. As a whole, the successful realization of Internet of things technologies is expected to enable the improvement of standard of living of people, the creation of new and more favorable job places, the creation of new opportunities for business and the increase in productivity and competitiveness in production. Big Data technologies. Big data is a general term used for the illustration of large-volume unstructured and semi-structured data generated by a particular state, state institutions and private organization. The processes of large-volume different-format data processing, analysis and extraction of useful knowledge from those are carried out by Big Data technologies. The Internet network is a major data base, that is, the largest object of Big data and raw material base. The information of larger scale is currently generated in Internet services, social networks, and e-commerce systems. According to calculations, the amount of information sent by e-mail is equal to 2,9 million per second in the world. The volume of downloaded videos from YouTube per minute constitutes 20 hours. The information of 24 petabyte volume is processed by Google during the day. 50 million information is posted on Twitter during the day. The minutes spent on Facebook per month reach 700 billion. The number of products placed on Amazon per second is equal to 73 items. 300 million photos are uploaded to Facebook in one day [3]. All these facts show that Internet acts as a primary information source for development of Big Data technologies. Several Internet enterprises process and use large information massives gathered regarding their performance via Big Data technologies, and introduce those to other administration and business-oriented organizations on commercial basis. Moreover, the number of Internet companies, specifically engaged in marketing activities, increases day by day. The threats of Internet Information Security. The provision of security of Global Internet Network is an important issue for its sustainable and reliable performance. The information security becomes the main factor in Internet environment. Internet is a suitable arena for intelligence, sabotage, terror and protest activities. Global network is characterized by multi-branched architecture, in which large-volume information of scientific-technical, military, socio-economic and political content circulate. As a result of threats to Information Security, a serious harm can be incurred to country performance in political, economic, military and other fields, and in this case, separate citizens and the society as a whole may face substantial socio-economic harm [1]. According to calculations of American experts, the disruption of operation of computer networks used in public administration and bank structures is as harmful as the consequences of nuclear weapon used against the country. In countries where Internet is widely used, the crime acts associated with computer systems and Internet occupies a prominent place among general law infringement acts. The rapid increase of crime acts in Internet environment is primarily related to the features of the global network – openness, accessibility for everyone, the absence of control by any country or organization. Moreover, the absence of effective law regulation mechanisms related to Internet activity, the existence of jurisdiction problems, also non-professionalism of law enforcement agencies facilitates the increase in number of criminal acts in cyberspace [15]. Energy security. The majority of modern human activities are carried out with the help of computers and Internet. It is no coincidence that the failures often occurring in computer systems disrupt the work of financial, transport, production and other fields, and incur negative impact on everyday life of people.

38 www.jpis.az

Problems of information society, 2016, №1, 31-40

One of the factors necessary for normal and continuous operation of Internet is the energy security. It is to be considered that although the Internet creates a virtual world, it consumes real energy. Nowadays, 30-50 percent of costs of any computation center are constituted by energy costs. One large computation center consumes as much energy as a small town with 20 thousand people (for instance, Quba, Shamakhi) [1]. Hence, as a result of power supply shutdown, the operation of state and private corporate computer networks, automatized production and service enterprises can be paralyzed and large financial losses can be incurred. At present, experts articulate regarding the minimization of energy consumption of the Internet. They concede that sustainable power supply is of specific topicality. For this reason, the restoration of existing energy sources and the discovery of alternative sources is one of the most important issues encountered by the humanity. Internet addiction. One of the problems caused by Internet is the consequences of information abundance within the society. An individual becomes addicted as a result of excessive use of information and computer.. This socio-psychological condition is called “escapism”. In modern society, information sources such as television, computer, Internet and mobile phones “voraciously consume” people’s time, and become the most important life priorities. The volume of the information received by a modern individual during two weeks is equal to information volume received by an individual during the lifetime in the Middle Ages. The psychological reaction of an individual to rapid and radical changes occuring in society, due to the impact of these technologies, is named the “futureshock” by E.Toffler. In his opinion, the cause of shock condition is the inability of an individual to flexibly respond to new realities brought by the technology and adapt to a new situation [16]. Internet addiction is a source of danger for not only an individual, but for the society as a whole. In order to avoid the addiction to information sources and the Internet, possession of information culture and behavioral norms with information by individual is essential. The problems associated with Internet regulation. The difficulties associated with the specification of unified regulation policy, principles and mechanisms are mostly related to these factors. Thus, each state and nation aspire to be represented by own national-moral values in virtual space. However, it is a complex issue to find the points in the Internet, where the interests of all parties are maintained. Thus, traditional national and international legal systems find it hard to regulate the realities brought by the Internet. The incentives are proposed for the realization of measures on Internet regulation at international level. Internet weakens the international legal rules and national legislation which is based on geographical boundaries. It becomes a complex issue and sometimes untenable to govern the virtual relations formed on capabilities of Internet technologies with real world rules of law. The regulation of virtual relations necessitates the development and application of new laws and norms pertaining to this environment [17]. Internet crime. Unique technological characteristics of Internet facilitates a favorable environment for committing several criminal acts. The existence of legal loopholes in the field of global network regulation perplexes the prevention of such negative cases. The Internet acts as a favorable environment for realization of both traditional criminal acts in more convenient way, and previously unknown, new types of criminal acts pertaining to the global network [1]. Internet capabilities are actively used by criminal elements; websites are widely spread, which carry out the advertising and sale of drugs and weapon, post pornographic materials and have racial, nationalistic and extremist content. The high social insecurity of crimes in such virtual space encompasses large human groups and different countries. The rapid increase of criminal cases in Internet environment is firstly related to the features of this global network – openness, accessibility by everyone, and the absence of control by any government or organization.

www.jpis.az 39 Problems of information society, 2016, №1, 31-40

Conclusion It is to be noted that each progressive novelty has entailed specific problems during the development history of civilization. However, the humanity has always benefited from progressive innovations and been able to overcome the problems. Internet is a phenomenon with no analogue in history and not comparable with any other instrument. Therefore, none of technological novelties were able to alter and develop the humanity as Internet is doing. Development tendencies of global networks are so dynamic and multi-branched that it is impossible to accurately forecast its prospects. As the benefits of Internet to humanity are large- scale, the negative consequences also encompass all fields. Nevertheless, the past and rich experience of humanity and present efforts show that people will be capable to eliminate the negative consequences of the Internet for the sake of better opportunities and more convenient life.

References 1. Alguliev R.M., Mahmudov R.Sh. A multi-faceted view to Internet phenomenon. Express- information. Information society series, Baku, “Information Technologies” press, 2010, 96 p. 2. Toffler E. The third wave. M: OOO “Publishing AST”, 1999, 784 p. 3. http://www.internetworldstats.com 4. Alguliev R.M., Mahmudov R.Sh. The essence of Internet and some scientific approaches on its features // Information society problems, Baku, 2012, № 1, pp. 41-51. 5. Toffler A. The Adaptive Corporation, Gower, 1985, 217 p. 6. Berre A.J., Gómez-Pérez A., Tutschku K. Future Internet - FIS 2010: Third Future Internet Symposium, Berlin, Germany, September 20-22, 2010, Proceedings, Springer, 2010, 157 p. 7. http://www.emarketer.com 8. Mahmudov R.Sh. Distant labor relations: international practice and the perspectives of application in Azerbaijan // Information society problems, Baku, 2010, № 1, pp. 56-62. 9. Alguliev R.M., Fataliyev T.Kh. Some aspects of formation of electronic science // News of Baku State University. The series of physico-mathematical sciences, 2008, № 4, pp. 77-83. 10. Alguliev R.M., Mahmudov R.Sh. Some conceptual issues of education informationalization // News of Azerbaijan State Pedagogical University. The series of pedagogic-psychological sciences, 2007, № 9, pp. 9-16. 11. The formation and conservation of cultural heritage in information society, UNESCO Publication, 2003. Trans. from English, Saint-Petersburg, 2004, 110 p. 12. Castells M. The Rise of the Network Society: The Information Age: Economy, Society, and Culture, Vol. 1, John Wiley & Sons, 2011, 656 p. 13. Mahmudov R.Sh. The current state of the economy of cloud technologies and the analysis of development perspectives // Information society problems, Baku, 2014, № 2, pp. 14-23. 14. Alguliev R.M., Mahmudov R.Sh. Internet of Things // Information society, № 3, pp.42-48 15. Alguliev R.M., Imamverdiyev Y.N. The incidents of information security, Baku, “Information Technologies” press, 2012, 219 p. 16. Alguliev R.M., Mahmudov R.Sh. The issues of Internet addiction and the methods of fight. Express-information. Information society series, Baku, “Information Technologies” press, 2009, 62 p. 17. Alguliev R.M., Mahmudov R.Sh. The problems of Internet regulation. Express-information. Information society series, Baku, “Information Technologies” press, 2010, 115 p.

40 www.jpis.az

Problems of information society, 2016, №1, 41-49

Bikas S. Aghayev, Shakir A. Mehdiyev, Tarlan S.Aliyev Institute of Information Technology of ANAS, Baku, Azerbaijan [email protected], [email protected] ELECTRONIC INFORMATION CARRIER AS AN OBJECT OF INFORMATION SECURITY The article addresses the problem of information security and protection methods of some information carriers. The methods and devices for protection, recycling, recovery, backup information stored in electronic media and paper waste, which store confidential communications and state secrets are analyzed. Establishment of management system of information carriers is highlighted. Keywords: electronic waste, electronic waste recycling, electronic information carriers, information security, information protection, magnetic/optical carriers, strimmers. Introduction People working in any field generate wastes along with material goods and services. These wastes create health threat for human and pollute environment. At the same time, they are important for heat power resources and raw material resources for industry. Harmless or very harmful (dangerous) wastes are distinguished due to the threat and damage it poses on human health and environment. Electronic waste is a (dangerous) waste type and three groups of e-wastes are distinguished by the hazards it poses. According to the classification of the International Union for Standardization, e-waste embraces electronic devices, installations and equipment, including computer equipment, along with the electrical (power) devices, and they are marked briefly as WEEE (Waste Electrical and Electronic Equipment). EU 2012/19/EU Directive on electronic waste includes electronic waste comprising 600 electrical and electronic equipment items in 10 groups [1]. Telecommunications and networking equipment is the third classification group. Nonetheless, historically, information has been one of the most important factors providing high-quality performance of man and society. On one hand, significance of information as a mean of enhancing the quality of life of people increases, on the other hand, the quantity and quality indicators of possible danger and damage are also increasing in the modern information society. This damage can be, more or less, dependent on the degree of privacy and secrecy and due to data loss and seizure for malicious purposes. The development of information security and its security methods are accompanied by advanced techniques and technology used for the expansion and theft (seizure) of leakage channels. Studies have shown that, over time, importance of information security issues is increasing. Therefore, any serious organization should handle data security and protection issues as multi-factor and multi-purpose problems and pay particular attention to the implementation of a) institutional and legal; b) software and hardware; and c) technical aspects of effective security system. The paper mainly focuses on information security software and hardware issues of information carriers of electronic waste. Electronic information carriers Formation of information society in recent years is characterized with computerization and networking processes. This primarily indicates the rapid increase in the number of computer and network equipment. Only in a small country as Azerbaijan, according to the statistics of the year 2014, about 1 million computers and more than 10 million mobile phones had been used []. Ensuring information security of technical devices of each user is very important. Vast majority of technical devices and equipment nowadays has electronic memory, elements and nodes -

www.jpis.az 41 Problems of information society, 2016, №1, 41-49 electronic information carriers. Therefore, from a technical point of view, information security, first of all, is the security of its carriers. Information security of data carriers is provided by the optional protection methods and rules depending on the type of carriers, and their physical, mechanical, chemical and ergonomic features. The major amount of information is stored in the following material carriers: - hard and soft magnetic drives (disks, floppy disks); - magneto-optical drives (discs); - streamers; - ZIP-memory drives; - Flash-based flash-disks - flash-drives, flash-card; - Paper; The content of texts, audio and video materials, photos, projects, calculations and so on the content of stored in these material drives may comprise confidential information (personal, business, commercial, trial and investigation, professional, production etc.) or state secret (especially important, very confidential and secret). These drives can be displaced, thrown out, stored, transported, transferred to other locations, in which the data is written (home, work places, public places etc.). Obviously, uncontrolled movements of these drives, unauthorized use, loss or theft, deletion with malicious purposes, modification and other cases may harm public interest, organizations or ordinary citizens. US non-governmental organization Identity Theft Resource Center reports that, as the result of the disposal of e-waste with unreliable methods, 50 data loss cases, including the loss of state secret occurred in the government and military sector in 2014 (2.5 million text files) [2]. Therefore, ensuring information security stored in these drives is important and urgent for state, organizations, and each individual. Unauthorized dissemination of information (leakage) from drives is mainly carried out through the following channels. - insider and outsourcing activities; - research and development (R & D); - manufacturing activity; - paper and electronic data waste carriers. Violation of information security by the outsourced employees during the insider activity (information security violations by current or former employees, partners, etc.), as well as outsourcing activities (transferring agency workers, job places, job function, and other resources to another organization) occurs through illegal data acquisition and transmission. Paper documents (sketches, projects, notes, calculations, reports, etc.), models, nodes, elements, product samples and their waste, defective products, production wastewater emitted to the environment, air mass, radioactive element ray generated by R & D, as well as manufacturing process may be confidential and secret data carriers. Information security of these sources must be provided by existing legislature,, organizational and legal documents, manuals, organizational rules, and so on. In modern times, the foremost data drives are electronic. The vast majority of information security violations stored in electronic carriers occur when the stored data is not deleted or destroyed, if necessary. Here “if necessary” means possible interventions are expected to occur. These operations primarily include the followings: - deletion of expired electronic and electrical equipment (including discharge of households) – becoming electronic waste; - transferring to primary and secondary waste processing in accordance with the requirements of e-waste management system; - disposal of domestic and industrial wastes; - transferring to other institutions for repair; - transferring electronic waste (e.g. computers) to other institutions as a gift or donation;

42 www.jpis.az

Problems of information society, 2016, №1, 41-49

- transportation of carriers from one place to another (from departments to offices, from workplace to house, repair places, etc.).

Disposal of e-waste drives

According to the legislation of the Republic of Azerbaijan, regardless of working conditions, moral or physical deterioration, after the lifecycle of 9 years (by 10.1% in nominal depreciation) computers can be discarded. Discarded computers may be stored in the warehouse. According to the law of the Republic of Azerbaijan on “Production and Domestic Waste” the law [3] and the law on “Precious metals and stones” [4] computer is considered to be precious metal waste from the moment of discard since it includes precious metals (gold, silver and platinum group elements). To reproduce the precious metals in the composition of the waste, it must be processed in a specific way or be transferred to private institutions for this purpose. However, due to the lack of “e-waste” and “e-waste management” concepts in the legislation of Azerbaijan, there is no infrastructure for primary and secondary processing of this group of waste [5]. To avoid controversy with the provisions of the law, organizations usually delay discard of computers, as well as other electrical and electronic equipment (especially, if warehousing capabilities are limited), they store them in the warehouses or transfer them to kindergartens or schools as a donation, gift and so on [6]. In most cases, computers are discarded as household and industrial wastes. The same is true for households. Computers brought to disposal sites are eliminated by burying or simply throwing away. Observations show that, in many cases, the entities dealing with households do not safely delete or destroy the information stored in discarded computers or information drives. “Safe disposal” means deletion of information that is not supposed to be recovered in any way. Otherwise, the data obtained by malicious parties in certain ways, may possibly be used. The practice proves that one of the “favorite” sources of information obtained by the professional intelligence officials is the waste sites (landfills). Deletion of the information in the drives is carried out by two technologies depending on the confidentiality and secrecy of data: 1. deletion technologies based on writing principles of the information on the carrier. The technology often uses two methods: a) deleting by the functional capabilities of the computer’s operating system; b) termination by specific deletion devices. 2. deletion (destruction) methods based on other mechanisms. It is not possible to delete drive’s information reliably with the capabilities of computer’s operating system software. Principally, operating system is configured so that the information does not disappear as a result of random error of the user, that is, being able to be restored if necessary. Hardware also takes it into account. We can review the technique of deletion of information through the operating system avoiding the principles of writing (reading) solid and soft magnetic, magneto-optical disks and diskettes, as well as magnetic tapes (streammers). Deletion is carried out in three ways: - through standard “Delete” command of the operation system; - writing new non-informative information instead of the information to be deleted (on the occupied sector in the carrier); - re-formatting the drive. None of these methods provide 100% deletion of the information. In fact, magnetic (magneto-optical writing (deletion) heads of the drives are provided so that there will not be sufficient magnetic (optical field) intensity to fully erase information. On the other hand, expansion of power (intensity) of writing and deleting facilities (Winchester, CD/DVD-ROM, etc.), magneto-optical heads of computer to delete information without any possible recovery would be resulted in about 2-3 times increase of their size, which is in contrasts to the principles of miniature computers (especially mobile computers). In other words, according to the residual magnetism (optical stream) of carriers initial information is possible to be recovered through

www.jpis.az 43 Problems of information society, 2016, №1, 41-49 special technical devices. Therefore, this simple method, as a rule, is used for the deletion of non-confidential data without a state secret. It should be noted that each subsequent application method of the three deletes the information more reliable than the previous one. According to some reports, based on the track advances devices specially designed for counter intelligence and other bodies recover the original data deleted through the most perfect deletion tools [7]. Therefore, the only way to safely delete the carriers storing high-level state secrets is to melt them at high temperatures. The second technology uses facilities generating powerful magnet (optical field), which are applied in the following terms: - to be used in the stand-by mode (Figure 1). The carriers designed for deletion are removed from the computer and placed on external device and the device is enabled. The devices have different structures depending on the type of the drives. It is used to delete the carriers in the workplace. - to delete in emergency situations. The device is installed inside the computer. It is used for emergent deletion in the cases of sudden occupation or theft of law enforcement, tax authorities, government and other bodies. Switch button is usually installed in a hidden place.

a) b) c) Figure 1. Deletion facilities for solid disks (a), floppy disks (b) and ZIP-drives (c) In case of confiscattion or theft, usually electricity supply of the room where computer is located is stopped so that the owner could not delete the drives. Therefore, the device is equipped with the source of stand-by power supply, and the ability to enable deleting facility via radio channels (radio controller, mobile phone etc.). In case of unauthorized acquisition of the carrier (theft, robbery) the options automatically activating the device are available. - to ensure the safety of transportation (Figure 2).

Figure 2. Security case for drive transportation

It is used to delete information remotely in the case of loss, theft and etc. when moving to another place for certain purposes. Deletion device is installed in the case, attaché-case and other similar bags. The disc is placed inside the device. It has numerous functions as self-power supply, remote control, breach alarm, and so on. - Carriers for backup copies storage (Figure 3).

44 www.jpis.az

Problems of information society, 2016, №1, 41-49

Archive carriers may also be exposed to the unauthorized intervention. It is used to delete the data in case of theft, replacement by other copies and so on. However, some emergency situations (fire, earthquake, flood, etc.) can cause loss of data backup. Therefore, careful organizations have several copies, which are stored in various areas (organizational units, private institutions etc.). Other technical enforcement tools (the cables, locks, alarm devices, etc.) are used against unauthorized transportation of computer, de-rigging of computer for the carrier theft, changing the content and etc.

Figure 3. Security wardrobe storage for storing carrier backups

As the large-scale ZIP-storage, which replaced previous floppy disks, is based on the principle of magnetic recording devices, it is deleted through the devices with same working principles and different structures. Basically, utilization devices for various purposes are used for safe deletion of strimmers - magnetic recording tape drives, which are used for audio-video recording, their archiving and backup. Reliable deletion of the information stored on flash memory devices is realized through the use of external devices. The memory element of these devices comprises integrated circuit transistors (EPROM), which are programmable and re-writable (readable) with an electric current. And therefore, it cannot be deleted through the magneto-optical field, but through electric current with the special-shaped high-voltage impulse signals. As a result of deletion the device becomes useless for rewriting and reading. When deleting the flash memory device with non-secret data through computer operating systems (through two of the above-mentioned three methods) it can be used again. These devices are produced in various versions with addition security features (deleting via remote radio channels, safe transportation, etc.). Several non-electrical-magnetic-based methods are used to delete the information of magneto- optical disc reliably. For example, the essence of one of these methods is that the surface of the disc is covered with a thin layer of pyrotechnic composition and fired up with electrical impulse. In this case, the disk surface temperature heats up to 2000 °C and destroys the information in a short period of time, however disk itself is not spoilt [8]. R & D wastes (model, nodes etc.), defected production of electrical and electronic equipment are processed as electronic waste, i.e., an element of the applied ETIE system. Information Safety of Paper Carriers Paper carriers may include confidential information and state secrets. Practice shows that the information in the hand-torn paper components of any size may be recovered. Therefore, in order to destroy data paper, special paper destruction devices (PDD) such as shredder, grinder, and disintegrators are used (Figure 4).

www.jpis.az 45 Problems of information society, 2016, №1, 41-49

Figure 4. Shredder, grinder and disintegrator According to purposes, PDDs are usually divided into the following groups: - individual PDD - used in small offices and houses; small and inexpensive; - office PDD - used in medium and large organizations; - archives PDD - used for the destruction of large amounts of paper carriers; - universal PDD - used for the destruction of folders, books, magazines and so on. Depending on the degree of secrecy and confidentiality the papers are cut into strips of certain width and length. 4th and 5th grade confidential information cut into vertical and horizontal sheets. For example, standard 08x4mm size is adopted for the US government documents. Destroying 5th grade information is done by chemical solutions or special high temperature ovens. The last destruction method is considered to be more reliable for paper carriers with state secret. Secret data is destructed by grinders and disintegrators cutting it into pieces of width and length smaller than a millimeter in diameter. The size of cut sheets by above- mentioned devices varies depending on data confidentiality. Following table provides these sizes (R - radius of round cut-sheets). Table 1. Destruction and confidentiality dependence

Data confidentiality Shredder Grinder Disintegrator degree Sheet dimensions (mm) I 12 x unlimited R = 1,0 0,8 x 0,8 II 6 x unlimited II 4 x 80 IV 0,8 x 20 V 0,1 x 13

Obviously, investigation, classification and backup of the large-scale carrier content, establishing and operating their storage facilities require complex work and considerable costs, even though, the loss of important information or recovery is much more expensive. The US Larry Ponemon Institute studies the character of information security incidents and assesses the damage caused by them and provides annual report. The results of the study conducted on 31 large commercial organizations are shown in Figure 5 and Figure 6 [9].

Figure 5. Average annual financial loss by an organization (by the US)

46 www.jpis.az

Problems of information society, 2016, №1, 41-49

Annual average financial loss of an organization includes: 1) average cost of lost earnings: the losses resulting from decrease of authority, loss of customers, expenses for attracting new customers 2) direct losses: compensation paid to customers, drop of product and service costs, etc. 3) indirect losses: the costs incurred in litigation, informing customers about the information leak, payments mail and phones bills and so on.

Figure 6. Nature of information leakage

Information leakage reasons include: 1) malicious programs; 2) data access prevention; 3) loss of backups; 4) insider activity; 5) loss of paper carriers; 6) outsourcing activities; 7) loss of mobile computers; 8) unknown reasons. To show the seriousness of the consequences of the breach of information security, the following facts are mentioned: 1. important data recovery on a sheet averagely costs $ 1000,00 for specialized US companies [9]. 2. A few years ago, the US Army distributed tens of thousands of personal computers as part of the improvement of computers provisioning to schools. Without any defined purpose, students, for the sake of the interest, restored the data on these computers, which contained state secret and confidential information, through regular programs downloaded from the Internet, and passed across the press. The implementation of the program was stopped after the scandal. Studies show that the carriers of personal computers were deleted through software capabilities of operating systems, which is unreliable method [9]. 3. In 1979, the rebels, who captured the US embassy in during the revolution, restored the information in the paper, which was deleted using shredder, and spread the information in a book form. It caused an international political scandal [10]. Each field of activity and each organization must establish its information security management system for data drives (ISMSDD) taking into account own capabilities and the nature of business features. To this end, the experience of a number of leading organizations and governments can be used. The management system should comprise the design and implementation of sustainable development concept in this area and management policies, current and future programs, and specific action plans (Figure 7). Practices show that the cost of establishing and operating the management system is much less than the costs spent on the acquisition of stolen confidential and secret data, commercial secrets, including recovery of the lost data.

www.jpis.az 47 Problems of information society, 2016, №1, 41-49

ISMSDD strategy of organization

Organizational and Technical and management technological base

ISMSDD

Economic Information support management

Regulatory documents of

Figure 7. Architectural scheme of ISMSDD Conclusion The article studies scientific and practical aspects of information security and protection problems. Optimal methods are proposed for selection of facilities for storage, transmission and reliable deletion (destruction) of information stored in magnetic (magneto-optical) drives, strimmers, zip-drives, and flash drives depending on the degree of data secrecy and confidentiality. Similarly, reliable data destruction methods and devices for paper carriers comprising state secrets and confidential data are described. Studies show that leading organizations of some countries have created an effective management system to ensure information safety of information sources of electronic wastes. It is shown that management system covers disposal of electrical and electronic equipment, its storage, handling (transportation), backup, archiving, processing as waste, organization of regulatory documentations, economic incentive mechanisms, development and implementation of action plans. Finally, the feasibility of establishing appropriate management system is justified.

References 1. Directive 2012/19 / EU of the European Parliament and the Council of 4 July 2012 on waste electrical and electronic equipment, http://www.ec.europa.eu 2. Breach 2011 20120207pdf http://www.idtheftcenter.org/artman2/uploads/1/ITRC 3. Law of AR on “Production and Domestic Waste”, http://www.qanun.az 4. Law of AR on “Precious metals and stones”, http://www.qanun.az 5. Aghayev B.S., Aliyev T.S. Comparative analysis of electronic waste management systems in Azerbaijan and the European Union / Proceedings of Republic Scientific and Practical Conference of “E-government building problems” works. Baku: Information Technology, 2014, pp. 196-199. 6. Alguliyev R.M., Alakbarov R.G. Social and environmental problems of disposal of used computers. // Problems of Information Society. Baku, 2010, No 2, p. 38. 7. Prokofiev N. // Heavy artillery information security, Computer press, 2002, No 3, pp. 115- 118.

48 www.jpis.az

Problems of information society, 2016, №1, 41-49

8. Aghayev B.S., Aliyev T.S. The problem of electronic waste and information security / republican scientific-practical conference on the problems of information security dedicated to the 90th anniversary of national leader Heydar Aliyev. Conference Proceedings. Baku: Information Technology, 2013, pp.145-148. 9. http://www.ponemon.org/library/2014-global-report-on-the-cost-of-cyber-crime 10. http://ru.wikipedia.org/wiki/Шредер_(устройство)

www.jpis.az 49 Problems of information society, 2016, №1, 50-55

Tahmasib Kh. Fataliyev Institute of Information Technology of ANAS, Baku, Azerbaijan [email protected] SECURITY PROVISION ISSUES OF E-SCIENCE The article is devoted to the information security issues of e-Science, which is under formation in Azerbaijan. The basic components of e-Science are investigated and importance of ensuring its security is highlighted as a complex technological and social problem. The paper analyzes works implemented in this area and priority directions of effective eScience security are Keywords: eScience, information society, AzScienceNet, eScience information security, CERT, computational resources, e-services. Introduction The application of information and communication technologies (ICT) in Azerbaijan has caused fundamental changes in all sectors of society. One of these areas is the science. The reforms carried out at Azerbaijan National Academy of Sciences (ANAS), as well as the special attention of the government to ICT has urged the realization and development of e-science as a part of emerging “Electronic Azerbaijan”. Apparently, e-science aims at reconstructing the performance of all institutes and organizations of ANAS as well as other research institutions across the country with the use of advanced ICT, and at forming the national science infrastructure and online information medium. Accordingly, joint and efficient activity of the research organizations and scientists in the virtual medium is provided. The main tasks of e- science include the formation of science, communications, networking and computing infrastructure, the wide application of the ICT in scientific activity and management as well as generating information resources, improving the regulatory framework, and staff training [1]. E-science infrastructure is geographically distributed, and has to fully cover all research institutions of Azerbaijan. Obviously, most research institutions of ANAS, including other educational institutions and organizations are located in Baku, Nakhchivan and Ganja departments of ANAS. Shaki and Lankaran Regional Scientific Centers are geographically distributed in the areas. e-Science Emerging in Azerbaijan has a complex infrastructure, which is based on AzScienceNet computer network. Hence, the protection of the emerging e-science as a unified system, is very important both economically and in terms of the security, and becomes one of the most complex technological and social problems [2]. This is also of great importance as an integral part of national security [3]. Along with the integration to the global network and potential threats to the system, growing demand of users increased the importance of knowledge, professional skills, and human resources in solving problems in the field of information security [4]. E-science components E-science is a complex system, comprising integral parts as infrastructure, data acquisition, storage, processing, search, analysis, transmission, presentation and so on. Evidently, formation of each of these blocks is related to the solution of complex issues and information security problems. Being imagined as a unified system, e-Science includes the subsystems shown in Figure 1.

50 www.jpis.az

Problems of information society, 2016, №1, 50-55

Figure 1. Subsystems of e-science As it is noted above, one of the main goals of e-science is forming the communication- network and computing infrastructure. The work carried out in this direction resulted the establishment of data processing center based on the AzScienceNet, which has a large computing and memory resources: • AzScienceNet covers all academic institutions of ANAS [5]. It needs to be noted that the development of e-science is possible through covering all other academic institutions of Azerbaijan. Therefore, the work carried out in this direction have to be intensified. • Technical features of the Data Center, which has large memory and computational resources (memory - 200 terabytes, computational efficiency - 14 Tflops) are constantly updated. • The functioning network and computing infrastructure connects scientific institutions, and offer many services (hosting, AzCloud, AzStorage, e-mail, e-library, distance learning, AzScienceCERT, eduroam etc.) to the users, and at the same time, provide integration opportunities to the international systems. • On the initiative of ANAS, the Ministry of Communications and High Technologies of the Republic of Azerbaijan, and the Ministry of Education of the Republic of Azerbaijan, AzScienceNet has been registered at GEANT Association to represent Azerbaijan. As the national operator, AzScienceNet cooperates to inform scientific and educational community of the country about the projects services of the Association.

www.jpis.az 51 Problems of information society, 2016, №1, 50-55

The status of the implementations within the framework of e-Science confirms the importance and urgency of researching and solving scientific, theoretical and practical problems of information security. The implementations in the field of information security The rapid development of ICT, its spread and intensification of competition coordinate the provision of information security based on the scientific and methodological principles, as well as the legal, organizational, technical and physical security measures. Consequently, it is necessary to create a unified information security system in AzScienceNet network. Provision of information security means ensuring data confidentiality, integrity and availability. Information confidentiality is provided when it is available only to the authorized people; and information integrity is provided when authorized persons are allowed to access the data, when necessary. The most important issues of developing information security system are as follows: • identification and analysis of the list of potential threats to information security; • classification of information resources; • determination of the unified information security requirements to the new applicable information technologies; • specifying requirements for the establishment of information security system. To this end, a common information security policy of the AzScienceNet is developed. The policy aims at minimizing the possible material and moral damages of threats to the network and information resources of ANAS; raising the business prestige of ANAS; forming common principles for the establishment of information security system; creating information security systems; and finally forming proper organizational and methodological framework for the development and actions of the system. To benefit from the capacity of the AzScienceNet, registry of the user computers was developed. Information about all computers connected to the AzScienceNet is accumulated in a unified database of the register. This system assists in the resolution of the following issues: • Preventing the access of unauthorized users to the network; • Implementing more detailed analysis of the monitoring results; • Fighting against threats; • Minimizing possible damages caused by the threats within the network; • Preventing users’ requests to banned sites; • Preventing network traffic overload with unnecessary information; • Preventing requests to the Web resources, inappropriate to the profile of network. To ensure efficient management of AzScienceNet and its safety network security monitoring (NSM) system has been established and operated. Core functions of NSM are acquisition and analysis of data about the network. Moreover, the system directs these results to respective people or systems, meets modern requirements, and consists of software and hardware [6]. The monitoring system provides many functions, which also increases the efficiency of the network. Main duties of the NSM can be described as below: • Internet traffic monitoring and recording; • security controlling of Internet-related real-time systems; • security, confidentiality and protection of the Internet users; • identification of the system vulnerabilities; • uninterrupted operation; • risk assessment. AzScienceCERT (CERT-Computer Emergency Response / Readiness Team) service has been established In order to ensure information security risk management [7]. The main objective of the service is to ensure high-level management of information security risks [8]. To this end, AzScienceCERT assists the users to detect and prevent the incidents aimed at disturbing

52 www.jpis.az

Problems of information society, 2016, №1, 50-55 security, and informs the users. AzScienceCERT service realizes collection, storage and analysis of statistical data related to the spread of malicious programs and network attacks on AzScienceNet e-science network platform. For the fulfillment of the objectives, AzScienceCERT cooperates with other similar groups and national authorities operating in Azerbaijan as well as with the foreign groups and organizations dealing with the processing of information security incidents. Obviously, CERT centers, including national and international networks linking these centers, are functioning in advanced countries in ICT. They hold exchange of experience and form knowledge databases. Taking into account that the spread of cyber attacks, threats, information warfare manifestations turn into a real danger, Azerbaijan has to be represented in international organizations to establish its adequate system of counter- measures. Therefore, on May 31, 2011, AzScienceCERT team was registered and accredited in TI (Trustel Introducer), affiliated with TERENA (Trans-European Research and Education Networking Association). Its main duty is to create the trust infrastructure between European CERT centers. TI service deals with CERTs’ registration, accreditation and certification. TI provides a range of services to accredited CERT, such as access to specific information materials and warning systems; the usage of the particular database and the registration of incident objects in these databases; the participation in the events intended for members only; encryption and e- signature infrastructure for the information exchange of during the processing of incidents, and so forth. Accordingly, international cooperation is of particular importance for the prevention of information security incidents and responding to them in the global information infrastructure. For this reason, integrating into TI and similar international infrastructures, AzScienceCERT team gains opportunities to effectively cooperate with the partners from around the world. The measures taken to ensure the safety of the services offered by AzScienceNet has significantly increased the quality of these services, and the efficiency and reliability of their usage [9]. Priorities to ensure the safety of e-science E-science safety embraces ensuring its sustainable performance within the allowable deviations and deliberate impacts aimed at undermining the normal operation. E-science protection is characterized by its broad boundaries. Hence, its security can be exposed to both internal and external threats. On the other hand, formation and development of e-science poses new threats and dangers to its security. This is primarily due to the introduction of new technologies. Therefore, the above-mentioned reasons, requires a complex approach to ensuring the security of e-science. Solution of the complex issues shown in Figure 2 should be considered for the effective protection of e-science.

Figure 2. Complex issues of e-science protection

www.jpis.az 53 Problems of information society, 2016, №1, 50-55

Review of these issues is separately provided below: Security issues of e-science projecting: • projecting the network and computing infrastructure in accordance with safety requirements; • safe configurations options for hardware and software of mobile devices, computers, work stations and servers; • safe configurations options for network devices (firewalls, routers, switches, etc.); • application of security software; • inventorying authorized and unauthorized devices and software; • restrictions and supervision of network ports, protocols and services; • defining protection border. E-science safety control and protection issues: • authority access control; • wireless access control; • monitoring the usage of administrative privileges; • malicious software protection; • data protection; • consideration of backup opportunities. E-science safety management issues: • maintenance, monitoring, audit, and analysis of relevant journals; • preparation of the report on monitoring and control; • response to the incidents and their control; • continuous assessment and removal of threats; • application of the tests and training teams; • holding trainings in information security assessment skills and studying vulnerabilities. Solution of all abovementioned issues that ensure effective organization and implementation of e-science security protection take into account the followings: • establishing practical protection based on the knowledge obtained as a result of examination and prevention of security threats; • giving priority to the measures to ensure protection of the most dangerous threats; • common indicators for the assessment of the effectiveness of security measures to specify and prompt adoption of the necessary adjustments; • performing continuous diagnostics and maximum automation of protection for the assessment of the effectiveness of available security measures. Conclusion Security of e-science, which is emerging as a segment of E-Azerbaijan, is an important component of the national security system. This is multidisciplinary, complicated and urgent issue. Explored e-science components and presented security mechanisms prove it once again. As an example of the AzScienceNet, the work done in this area is of great importance and should constantly be developed within the framework of the issues solved in the e-science.

54 www.jpis.az

Problems of information society, 2016, №1, 50-55

References 1. Alguliyev R.M., Fataliyev T.Kh. E-science as a part of e-government building // proceedings of the 1st Republican scientific-practical conference on “Problems of E-government building”, Baku, Dec. 4, 2014, pp. 5-7. 2. Fataliyev T.Kh., Imamverdiyev Y.N. Information security problems in e-science // 1st Republican scientific-practical conference on “Problems of information security”, Baku, May 17-18, 2013, pp. 113-115. 3. Law of the Republic of Azerbaijan on “National security”, June 29, 2004, http://www.e- qanun.az 4. Critical Security Controls for Effective Cyber Defense, http://www.sans.org/critical- security-controls 5. http://www.azsciencenet.az 6. Alguliyev R.M., Imamverdiyev Y.N., Nabiyev B.R. Analysis of network security monitoring methods // Information Technologies Problems, Baku, 2014, No 1, pp. 60-68. 7. http://www.sciencecert.az 8. Alguliyev R.M., Imamverdiyev Y.N. Information security incidents, Baku, “Information Technologies” Publishing House, 2012, p. 219. 9. Alakbarov R.G. et.al. Security issues of AzScienceNet Internet services // proceeding of the 2nd republican scientific-practical conference “Multidisciplinary problems of information security” dedicated to the 150th anniversary of the International Telecommunication Union, Baku, May 14, 2015, pp.119-122.

www.jpis.az 55 Problems of information society, 2016, №1, 56-62

Rasim M. Alguliyev1, Saadat R. Aghayeva2 1,2Institute of Information Technology of ANAS, Baku, Azerbaijan [email protected], [email protected] ONLINE MEDIA MONITORING: CURRENT STATE, PROBLEMS AND DEVELOPMENT PROSPECTS The article studies the challenges of internet-media resources monitoring and international experience in this field. The interaction of monitoring and evaluation was presented, the factors facilitating the media monitoring were shown. Keywords: online media, social media, media monitoring, media evaluation. Introduction Information and communication technology (ICT) has penetrated practically all areas, and people have become an integral part of the culture of information. Journalism is one of the priority spheres exposed to the major changes and development as the result of the use of ICT. This development has led to the emergence of new media, in other words, the Internet-media. In the globalized world, the role and position of the Internet-media is increasing. The abundance of media resources requires their acquisition, sorting, evaluation, and producing the accurate results. The development of web technologies make it possible to define the rate of electronic media and articles, social structure of its readership more accurately and in an objective way [1]. The introduction of such system enables mass media to evaluate its performance and manage its quality. In modern times, well-known business, governmental and non-governmental organizations monitor their own media organization for the future development of its performance in a positive way. These media groups follow the market trends and analyze business strategies of the competitors. Media monitoring services provide positive results and prospects for the implementation of the above-mentioned objectives. Why to monitor Mass Media materials? Mass Media is one of the most important sources of information and the subject of analysis of officials and experts of trade structures in many organizations. Monitoring and evaluation of newspapers, radio, television, and Internet media resources directs the performance of professional journalists. Today, the efficiency of the public relations department of vast majority of the state, public and business organizations and forming their positive images in the media is an essential condition for their sustainable functioning [2]. Monitoring process includes identification of information sources and their surveillance, data acquisition and storage, selection of the most appropriate data through categorizing and filtering, and finally, analysis of accumulated data [3]. Media organizations monitor own activities to compete with other media groups. Systematic collection of information during the monitoring allows obtaining accurate and reliable information on the topic, evaluating the influence of media groups in the region or in the country, and being aware of information transfer tools. Assessment of the obtained results makes it possible to establish more effective functioning of media resources and optimal decision-making. Media monitoring around the world was first carried out by “press-clipping” agencies. “Press clipping” is a selection of media publications and visual materials through keywords or other criteria. The first “press-clipping” was founded in London in 1852 by the Polish news agency Romeike. The first Internet media monitoring company, WebClipping, started its operation in 1998 [4]. One of the most professional and leading organizations in this area, FIBEP (International Federation on Press-clipping services), was founded in Paris in 1953 [5]. The organization currently has 92 members from 43 countries.

56 www.jpis.az

Problems of information society, 2016, №1, 56-62

Currently, media monitoring conveys not only the search and analysis of information in traditional media, but also working with the Internet resources. It also involves monitoring of social media - forums and blogs on different topics, which does not mean “Media” directly, but can have a significant impact on public opinion and serve as a source of information [6]. Data collection is very important step for the analysis of the materials published in the media. Data collection and monitoring is a reasonable information basis for verified management decision-making [7]. Along with the observation of the materials published in the media on specific topics (e.g., financial markets, information technology, etc.), media monitoring is the result of the observations obtained by keywords. Regular, initial, competition-oriented, thematic, reputation and other types of Media monitoring are distinguished. Media monitoring is carried out as follows:  observation of close potential source: TV channels, radio stations, periodicals, news sites, etc.;  collection of materials;  filtration and categorizing;  transmission of collected data for further analysis. Main features of the Media Monitoring According to surveys, 9 of the 10 largest US companies annually allocate $ 1 million to the monitoring of the activitis of the competitors. These funds are paid at the expense of proper decisions based on the results achieved from monitoring and analysis of information. Most of monitoring and analysis products are provided with personal or installed autorubricators, including annotators. It proves the given tools to be standards for information and analytical systems. It is important to be able to work with the dictionaries of synonyms and to take into account the morphology of the language in order to use such applications. Without these features the necessary documents can be missed during the search [8]. As a rule, the monitoring of the Internet is used as a supplement to other media monitoring or as a component of other marketing projects. The monitoring results are presented in the following forms: • “press clipping”: (electronic) scanned articles; • brief summaries in the required languages; • statistical report indicating the date, publications, authors, titles, size and pages of the article with the hypertext appropriate to the scanned version of the original text; • analytical report appropriate to the objective of monitoring. Media monitoring is applied for:  operational tracking of negative and potential information risks;  daily monitoring of positive and negative news in terms of information wars and crisis;  analysis of the information presented in Mass Media;  comparison of quality of information about the company in Mass Media;  comparison of number of positive and negative references;  evaluation of quality changes in the information of the company compared to its competitors for any period of time. Monitoring companies and their basic services Media monitoring process requires great amount of time and human resources. The companies specialized in media monitoring such as CyberAlert, WPS, Park.ru, Medialogiya, Inteqrum and other news agencies, as well as PR agencies offer media monitoring services to the customers. Media monitoring companies are engaged in the information search in mass media on any criterion.

www.jpis.az 57 Problems of information society, 2016, №1, 56-62

Monitoring process. Media monitoring is carried out through various services offered by the monitoring companies. These services are delivered with the use of software that controls the contents of online free news sources, newspapers, magazines, television channels through the automated robots. Monitoring process is implemented as follows: the software reads the text, and then defines the news or social media shares based on each key word of the client, and automatically presents related articles and materials obtained from social media to each client. Internet-search systems or specialized Mass Media databases (Integrumi, Addictomatic, Alterian, Prnews, Semantic Force, MediaTek, TextAnalyst, TopSOM, IntellSoft Vision, etc.) are often used for monitoring. CyberAlert - best known media monitoring company around the world, monitors 50 thousand online news sources in more than 75 languages every day in 189 countries around the world, more than 50 million blogs in social media, and 100 thousand message boards, forums, complaint sites, more than 200 video sharing websites, including Twitter [9]. Monitoring services include: • monitoring of all types of Mass Media on the given topics in all countries; • monitoring of the current situation; • monitoring of data about media organizations, companies, trademarks, as well as individuals; • monitoring of past, present, and future events; • analysis of the current situation; • analysis of data about media organizations, companies, trademarks, as well as individuals; • analysis of material published in the media about the client’s major competitors; • identifying statistical characteristics, conclusions and recommendations, and underlying trends. Monitoring is implemented on certain topics by domestic, regional, international electronic media and news agencies. Monitoring retains the key quotes in the articles giving the customer opportunity to become familiar to all events as soon as possible. Major monitoring products (as an example of ITAR-TASS monitoring department) may include [7]:  daily monitoring;  operational on-line monitoring;  weekly monitoring with the analytical records;  weekly monitoring of foreign Mass Media;  monthly monitoring of media organization;  monitoring of ordered publications and stories;  monitoring of television and radio broadcasting, introducing video and audio stories through information coding (in text format);  monitoring of media based on the results of the media events;  preparation of the report based on published materials, TV and radio stories;  monitoring of publications about the company’s activities in the regional media on the areas (summary is provided twice a month and accompanied by an analytical records);  summarizing the news on topics of interest to the customer;  search for necessary information by keywords. Media monitoring tools. These tools include computer programs, which collect and sort the data from mass media. There are nearly 100 such programs in the market, but as a rule, all of these programs have thematic rubricators or simple search features without offering medium, or large-scale data storage and any quality analysis mechanisms [10]. Text quality analysis is only supposed to assess nuances such as the nature of the relationship between emotions, dangers and

58 www.jpis.az

Problems of information society, 2016, №1, 56-62 objects. Therefore, the human brain that has intuition and is able to gain experience is preferred in this area. Though the estimation speed is not high, the quality is improving. Computer program maximum eases the human labor to address intellectual issues. Some applications have options to search over the “intellectual” data sets taking into account morphology and selecting the documents by the lists of key words, their frequency of usage and relative location. Simple content analysis, which is statistical semantic processing, is possible through these applications. Media monitoring is based on classical factographic analysis methods, including content analysis by quantitative and qualitative information streams: . analysis of facts; . evaluation; . analysis of news topics; . analysis of news contexts; . analysis of relations among the contexts; . analysis of logical expression of news; . media and statistical analysis; . analysis of news chronology; . analysis of bibliographic data (authors, geography, etc.) of news; . analysis of additional materials (photos, cartoons, etc.) of news [11]. Interaction of Monitoring and Evaluation Monitoring, dealing systematic collection and analysis of information, is a precious tool for the management of media group (holding, company, etc.), and it serves as a preliminary stage of the evaluation. Media monitoring allows defining whether how resources are appropriately available and properly used. Development trends may be reviewed, planning or implementation problems, as well as successful strategies of competitors can be identified through the monitoring and evaluation. Note that Several monitoring and adjustment procedures are essential before evaluation and re- evaluation [12]. Monitoring and evaluation:  identify problems and the causes;  offer possible solutions to the problems;  direct activity of media organization;  provide information;  encourage to follow the guidance;  increase the probable positive growth of the company.

www.jpis.az 59 Problems of information society, 2016, №1, 56-62

Overall, data analysis process is carried out as follows (Figure 1):

Identifying key indicators for monitoring-evaluation process

Collecting data on indicators

Identifying the structure for

analysis

Following the facts by topics

Identifying patterns, trends, and

possible explanations

Preparing the results. Identifying effective areas of activity (recommendations)

Figure 1. Data analysis process Social media monitoring Along with the professional media, social networks play an important role in shaping public opinion in the modern era. In this case, the media, first of all, serves as a means of enlightenment for citizens, on the other hand, as a means of social participation [14]. Unsurprisingly, after the emergence of the Internet, several studies are conducted to reveal the training level of the journalists to dialogue with the audience in Western countries. Studies show that the most journalists do not effort to communicate with the audience. Information technology may affect the development of the media when the possibilities of these technologies would be evaluated and used [15]. Transformation of the social media into a new communication means is undeniable. Today, since the social media is one of the best promotional methods, people and companies turn to social networks. Social media is a direct and clear dialogue with the audience, in which website is targeted[16]. Social media means include social networks, blogs, microblogs, forums, and so on. In addition to the monitoring of the Internet-media resources, many media companies monitor social media and review the information spread about them in social media. There are more than 100 different services of monitoring and evaluation of social media. The most well- known companies offering free blog monitoring services are Technorati, Blog Pulse, IceRocket, Google Blogs. The US Technorati, one of the giant companies in the field of web-services and software, reports that 75 million blogs with 1.2 million new daily sharing, which include statements about the company’s products and services, are created. Social media monitoring resolves the following issues [17]:  consideration of the interests of the audience, defining the needs and aspirations of the people accurately;  interacting with people;  spreading information demanded by the audience through social media;  analyzing the future performance of company.

60 www.jpis.az

Problems of information society, 2016, №1, 56-62

Status of Media Monitoring in Azerbaijan Although there are enough number of Internet media resources, the Internet media is still in the phase of formation [18]. At present, Commission, under the Press Council of Azerbaijan, is operating to control the Internet-media resources. The Commission reviews complaints submitted to the Press Council related to online media resources, monitors national and international trends, and assists to overcome negative consequences in connection with the responsibility of the Internet-media journalist. Media Monitoring Center, which deals with media monitoring and analysis in Azerbaijan, “Kalibri” media company monitoring, “A-Vision” media and communications company, and Azerbaijan Media Monitoring Institute offer a wide range of prompt and professional services for the analysis of media and social networking, for the establishment of marketing strategy and tactics in accordance with current trends. The scope of these companies’ services includes: . national media monitoring; . international media monitoring; . press monitoring; . TV broadcasting monitoring; . radio monitoring; . social media monitoring; . monitoring of news agencies; . monitoring of TV advertising; . monitoring of street advertising; . monitoring of advertisements in the press. The companies prepare monthly statistics of the news submitted to the Internet-media resources. This statistical data expresses the number of used certain keywords of the articles published on the website in figures. Graphical tables are set according to obtained figures. These tables take into account the different forms of one word and indicate only the number. One of the shortcomings of this service is that the content of reports is not analyzed during the preparation of the tables. Furthermore, various non-governmental organizations periodically monitor the media for various purposes. Conclusion The studies prove the importance of current media monitoring. As the media has a direct impact on public opinion and people’s choice, the main goal of media professionals all over the world is to benefit from positive effects of media and work for charitable purposes. To this end, Mass Media may promote the reputation of the site by media monitoring and making rational decisions to set the right strategies. The results of the studies define the following problems of online media monitoring: 1. High-cost monitoring services: media groups applying to monitoring companies may face high prices. The offered prices challenge the use of media monitoring services by smaller companies. 2. Inconsistency of the results. Sometimes, the results of several monitoring companies do not coincide. 3. Automated tools: these cannot define positive, negative or neutral information. Analysis shows that the resolution of existing media monitoring problems requires conceptual and institutional approach. It may also be significant for the main objectives of the national security as the identification of freedom of information, the public sentiment, public opinion, as well as for the detection of threats.

www.jpis.az 61 Problems of information society, 2016, №1, 56-62

In addition, lack of application of new technologies in the monitoring, inconsistencies during the monitoring procedure, the absence of confidence as a result of deregulation of this area, the deficiency of necessary culture, nonexistence of intelligent monitoring and analysis, and the lack of national statistics mechanisms for the Internet resources are the obstacles for the development of media monitoring. Thus, media monitoring enables:  overall assessment of the situation in the field of information;  revealing opportunities for improving the performance of information field through media and analytics;  developing information policy by considering general media image and situation in this field;  scheduling several measures to be taken in the field of public relations based on the experience of the competitors and related companies;  predicting the events and actions of competitors;  optimizing the work with publications and journalists (promoting database of journalists, journalists’ rating, publications’ rating, mass media databases). It can be noted that the monitoring of only the Internet-media resources does not provide the evaluation of the entire media processes . Thus, the steady increase in the number of media sites does not mean complete decline of traditional media. References 1. O. Gunduz. Information technologies for journalists. Baku, 2009, p.101. 2. Phillips D. PR in the Internet. trl. from Eng. by I.Gavrilov. M. Fair-Press, 2004, p.320. 3. Media Monitoring Service, http://pages.rediff.com/media-monitoring-service/305165 4. http://www.cision.com/us/pr-software/media-monitoring/online-media-monitoring 5. http://www.fibep.info 6. Huridocs, Media monitoring, information scanning and Intelligence, 2009, 33 p. 7. Lysenko A.G., Fateev E.A. Journalistic skills. An analysis of media materials, Moscow, p.25. 8. Oparin A., Media monitoring and analysis systems, December 16, 2003, http://www.newart.ru/oparin/smi_oparin.htm 9. CyberAlert, Inc. Media Monitoring: The Complete Guide, 2010, p.26. 10. Daniels M., Jeffrey A., International Media Analysis Made Simple, Institute for Public Relations, 2012. 34 p. 11. Media analysis, http://www.public.ru/analytics 12. Shapiro J. Monitoring and Evaluation, South Africa, Johannesburg 2001, 51 p. 13. Institute of Information Freedom Development, Methods of monitoring the sites of nonprofit organizations, St. Petersburg, 2011, p.69. 14. Kaschesky M., Sobkowicz P., Lobato J.M.H. et all. Bringing Representativeness into Social Media Monitoring and Analysis. 46th Hawaii International Conference on System Sciences, 2013, 10 p. 15. Alguliyev R.M., Mahmudov R.Sh. Emergence and development of the Internet media: key trends and characteristics. Express-information, Information Society series, Baku, “Information Technology” Publishing House, 2012, p.58. 16. http://www.snce.ru/ru 17. http://www.cosida.com/news/2014/10/7/imported_1007141327.aspx 18. Valiyev S., Babayev Z. Internet journalism in Azerbaijan: history and prospects. B., 2007, p. 247.

62 www.jpis.az

Problems of information society, 2016, №1, 63-68

Afruz M. Gurbanova Institute of Information Technology of ANAS, Baku, Azerbaijan [email protected] COMPUTATIONAL TERMINOLOGY: STAGES OF FORMATION AND DEVELOPMENT TENDENCIES The article explores the history of formation and the current state of computational terminology. The development stages of methods of computational terminology and the process of management of computational terminology are described. The article explains the impact of technology on specific principles and techniques of computation terminology and the evolution of computation terminology techniques. Terminology management systems are investigated and the working principles are illustrated in the article. The conducted research in the field of computational terminology are explored and the development trends are specified as well. Key words: computation terminology, linguistic informatics, natural language processing, ontology, semantic relations, terminology databases. Introduction The application of computers in terminology management has a 50-year history. Starting from the 60’s of the past century, computers have started to be applied in the processing, storage and collection of terminology data sets. After a while, mini and personal computers have started to be used for the management of terminology in specific subject matters and the technique of support of terminology activity has altered [1]. Nowadays, the Internet provides an environment for terminology research as well as an online-platform for international cooperation on terminology activity. The management of terminology is determined as “the purposeful management of any terminology information” and carried out by the realization of the following actions while updating the published information:  inclusion of new terms and notions;  review of existing concepts (their integration or division);  declaration of the obsolescence of terms. Depending on how the terminology is published (traditional book, web-data base and etc.), problems on the realization of these works are increasing. The field of computation terminology studies the application issues of computation techniques during the conduction of terminology work. It is to be noted that the computer application and realization of terminology-related issues is relatively weaker, in comparison with other fields, due to different reasons. The management of computational terminology is a developing field of science. The facilitation of this process is based on the application of computation techniques. The facilitation can be pursued by automatic (or semi-automatic) data processing or software introduction. This will allow the terminologists, researchers, engineers and others to manage the terminology information with more advanced and effective techniques. The computational terminology system is regarded as a new research trend in the crossroads of several scientific-research fields. The roots of this field belong to the terminology management. Several issues pertaining to the computation terminology management are mentioned below:  terms extraction;  extraction of notions;  assistance to terminologist;  terminology service issues (detection of updated terminology under new conditions in new documents);  control over the content quality and etc.

www.jpis.az 63 Problems of information society, 2016, №1, 63-68

The opportunities created by program solutions for a terminologist, especially the impact of technology in specific principles and techniques of the theory of terminology, and the evolution of techniques of terminology activity during this period are clarified in various issues of computation terminology management. The main focus is directed towards the international standards, the terminology data modelling in these standards and the facilities suggested to terminologists by the world wide web. Based on investigations and works by the founder of the theory of terminology E. Wüster [2], several work has been published in the 80’s of the past century [3-8]. In these publications, the theoretical foundations, techniques and principles of terminology activity are specified. Moreover, the standardization of terminology, the practical transmission and application of the majority of principles described in terminological activity are critically assessed. This is related to the fact that traditional tools for terminological activity – file cards, terms list and special dictionaries did not allow terminologists to follow the principles of terminology in most cases. In the middle of the 60’s of the past century, appropriate apparatus maintenance has been provided for the terminology management by computer technologies. The terminology processing was conducted with substantial efforts with the help of personal computer-based terminology management software. Nowadays, several smart software tools exist, which supports specific principles of the theory of terminology and terminological activity. The application of such advanced terminology management systems altered the work principles of terminologists, and demonstrated prominent results for terminology theory. The methods of terminological activity and computational terminology management The theory of terminology, the methods of terminological activity and the historical evolution of computational terminology management are chronologically described in the following tables (Table 1, Table 2). Table 1 The evolution of scientific theory of terminology in software tools Until 1965 The scientific theory of terminology was established through use of software tools 1965 – 1975 Discussion and expansion of theoretical foundations; various approaches; computer programs oriented to research and development were absent.

1975 – 1985 Early articles regarding the design of terminology data bank (Termbank), the field of application, paper templates for writing the terminology data and the clarification of specific aspects (data extraction, published dictionaries, data exchange) of terminology bank

1985 – 1995 Inclusion of topics about the management of Termbank and terminology with the help of computer programs; the development of early tasks and recommendations

After 1995 Scientific discussion of (application of) new techniques of computational terminology management; publications and standards

64 www.jpis.az

Problems of information society, 2016, №1, 63-68

Table 2 The evolution of terminological activity and computational terminology management Till 1965 Realization of terminological activity related to card files, dictionaries and terms list only 1965 – 1975 Development of the main carcass of Termbank (Termium, Eurodicautom); first templates for registration (paper templates); the list of published terminology; the development of inclusion and search of terminology data 1975 – 1985 Terminological software tools in mini-computers (for instance, Ericsson Cat and etc.); direct access to terminology; the access to home terminal of the main carcass of termbank; online data insertion and search

1985 – 1995 Software tools for terminology management for separate users in personal computer base (for example, Termex-MTX); the formation of working group related to the problems of unification and integration of terms; modules and procedures for data exchange; repeated use of data

After 1995 Development of high-quality and powerful terminology management systems (for ex. MultiTerm (translation program)); joint terminological work on the network (LAN and the world wide web); integration to other tools (for ex. translator device); development of auxiliary programs for the support of terminological work (for example, a software tool for term extraction)

The design and architecture of early program tools for terminology management did not suffice for the establishment of terminology collection. Although the founders of Termbank attempted to realize the principles of the concept in the first place, the practice showed that several terminology articles representing this concept are stored in data bank. The reason was the absence of the mechanism checking the homonyms and the procedure of checking the doublets (two-fold writings) during the insertion of new terms. First programs have been developed for term management in personal computers’ base towards the solution of such problems. The majority of these programs allowed to keep one term in each language; synonyms, however, had to be written in a separate writing. Terminology data bank of the European Commission Eurodicautom was established in 1975 and mainly considered for the use of translators and other employees of the Commission. Eurodicautom, established in six languages, is expanded, and currently operates in seven, nine or eventually, eleven languages. Three main groups of computation terminology management can be distinguished: 1. terminology creation; 2. terminology support; 3. terminology storage. The terminology management system is a specially developed software tool and considered for the use by translators, terminologists and other users. Nowadays, almost all modern terminology management systems (TMS) are capable to create and support terminological articles and store terminological information. These systems also allow for the realization of conceptual hierarchical links (superior, subordinate and peer notion) from the linking mechanism among various writings: Acrolinx – is a platform of content optimization, oriented towards the linguistics problems and introduces a sentence in an improved form.

www.jpis.az 65 Problems of information society, 2016, №1, 63-68

AcrossTerm (Web) – Across Language Network carries out a central function for all terminology companies, and also serves to the translation of those terms. Anylexic –is a new software tool of TMS not related to a particular terminology. It assists the process of terminology translation at each stage – creation, modification, search and the exchange of terminology. ApSICXbench – maintains the quality, and simple and powerful management of terminology in a single package. With this software tool, the download of any file of several formats, supported by CAT, can be carried out and the high level of quality is obtained. Interplex – is a glossary for translators; a software tool for Ipad and Iphone. i-Term – is a tool for management of the state of terminology and knowledge in art, it allows to reserve the structure of notion-related knowledge and search on the Internet. qTerm™ – is a software tool for terminology management. It detects and translates critical terminology. Moreover, it is the newest software tool, which explains in detail the use of each term, as well as the language and the history of its use. LogiTerm Web – has an interface providing the access to four terminology databases, Bitexts, the whole text and serial number. With the help of this software tool, a terminological writing can be created for the terminology database, modified and reviewed in web-interface or Microsoft Word. Multiterm – is a program facilitating the creation of terminological bank for SDL Trados Studio. In this program, the terminological bases are based not on words, but on notions. Alongside with the above mentioned tools, Multitrans Prism, TermStar, Termbases, TermWeb, TermWikiPro, Taas - Cloud Services for Terminology Work, TippyTerm, TManager and etc. terminology management systems have been developed [9]. Three international standards are prepared regarding the development, application and operation of terminology management systems. ISO 12620 (1999) [10], ISO 12200 (1999) [11] and ISO 16642 (2003) [12] standards, developed by ISO 37 TC technical committee of the International Standardization Committee, specify more than 200 categories of standard data. These standards serve to the preparation of proposals with the purpose of selection of data categories for specific construction of terminology management systems, and suggest a terminological metamodel specifying the base architecture of a terminology management system. Hence, computation terminology bears a great importance in text mining, information search and acquisition, request systems, the ontology construction and other fields. Text mining and the extraction of new knowledge are best reflected in the terms. Development trends of computational terminology The results of scientific investigations, carried out in various spheres of computational terminology, are discussed in international conferences, symposiums and scientific workshops held in this field. Starting from 1965, “Coling” (Computational linguistics) international conference on computational linguistics takes place every two years. First conference was organized in New- York (USA). The 25th “Coling” International conference was held in Dublin in 2014 [13]. Since 2000, “CICLing” (Conference on Intelligent text processing and Computational Linguistics) international conferences takes place on text mining and computational linguistics. The 15th international conference was held in Kathmandu (Nepal) in 2014. “Computational terminology (CompuTerm)” international scientific workshops are organized regarding the various problems and issues of computational terminology. First International Workshop “CompuTerm” was held in Montreal University of Canada in 1998 [15], second International Workshop was held in University of Pennsylvania (USA) in 2002 [16], third International Workshop in Geneva (Switzerland) in 2004 [17], and fourth International workshop in Dublin (Ireland) in 2014 [18].

66 www.jpis.az

Problems of information society, 2016, №1, 63-68

By gathering together in international workshops on computational terminology, the experts of this field have discussed the current state of computational terminology and its impact on applications of natural language processing (NLP); the following development trends have been specified:  automatic term extraction (ATE), recognition and filtration constituting the basis of terminological activity. Automatic term extraction is carried out by using computation techniques. The purpose is the acquisition of potential knowledge for future processing. The techniques developed for automatic term extraction must be realized in terminological activity and in systems assisting the terminology management;  recognition of the events expanding the notion of terminological integrity from terms bearing its static single meaning to the terms bearing the meaning of a procedure and dynamic process;  specification of semantic relations among terms – this is applied in updating the existing knowledge base;  management of variety of terms – this facilitates the work with dynamic nature of the term, its acquisition from various sources, integration, standardization and the introduction in wide-spectrum applications and resources; thus, this problem is encountered while working with various dictionaries, thesauruses, ontologies and text information;  creation of description encompassing important investigations and oriented to the provision of accurate and univocal definition of terminology object; this definition includes important elements necessary for the formal description of terms and notions in ontology;  discussion of user expertise which is a new problem in terminological activity. Specific fields here encompass the notions and terms usually not familiar for non-professionals (for example, a patient or bank customer).  systematic management of terminology and the update of thesauruses and dictionaries of specific fields, which is an important aspect for supporting the existing terminological resources. The number of existing terminological resources are constantly increasing; their continuous update is necessary for the effective use.  creation of monolingual and multilingual resources – it facilitates the inter-lingual and multilingual applications, and requires specific methods and tools, design and assessment, which is a complex issue;  reliability and portability of techniques – this allows to apply the techniques used in a specific context to another context and the division of research expertise among those;  processing of social networks and contemporary media;  use of terminology in various NLP applications;  Experiments on the assessment of terminological techniques and tools and etc. The development trends of computational terminology encompass important issues and reveal the necessity of conducting serious scientific research in this direction. Conclusion The investigation of the current state, formation and management stages of computational terminology, international standards prepared in this direction, the analysis of scientific- theoretical research carried out in the field of computation terminology shed light on the development perspectives of terminological activity and necessitate the creation and development of terminological knowledge base. Terminology database – is a database storing key terms as data, which are translated described in a specific definition within the framework of the whole document (project). Each term in terminology database is provided with metadata (additional information about the term). The meaning of the term, equivalent in other languages, short form, synonyms, application fields

www.jpis.az 67 Problems of information society, 2016, №1, 63-68 and the information about the document verifying the term (for example, national and international standards) are provided. Along with its practical importance, the terminology database is a powerful tool for conducting serious scientific investigations. This work was carried out with financial assistance of Science Development Foundation under the President of the Republic of Azerbaijan – Grant № EIF-2014-9(24)-KETPL-14/02/1 References 1. Klaus-Dirk Schmitz. Developments in computational terminology management and its influence on terminology science and terminology work. ELETO 5th Conference "Greek Language and Terminology", Nicosia, Cyprus, 13-15 November, 2005, http://www.eleto.gr 2. W ster E., Baum R. Einführung in die allgemeine Terminologielehre und terminologische Lexikographie (the general introduction to terminology and terminological lexicography lesson). 3rd Edition, Romanistischer Verlag, Bonn 1991, XXI, 239 p. 3. Helmut F. Terminology Manual. Paris, 1984, http://www.unesdoc.unesco.org 4. Dubuc R. Manuel pratique de terminologie (1er édition). Quebec, 1985, 158 p. 5. Heribert Picht, Jennifer Draskau. Terminology - An Introduction. Guildford, 1985, 265 p. 6. Reiner Arntz, Heribert Picht. Einführung in die Terminologiearbeit (1. Auflage). Hildesheim, 1989, 344 p. 7. Helmut Felber, Gerhard Budin. Terminologie in Theorie und Praxis. Tübingen, 1989, 315 p. 8. Juan C. Sager. A Practical Course in Terminology Processing. Amsterdam/Philadelphia, 1990, 258 p. 9. Terminology Management Systems, http://www.recremisi.blogspot.com 10. ISO 12200 (1999): Computer applications in terminology – Machine-readable interchange format (MARTIF) – Negotiated interchange. Geneva: International Standards Organization. 11. ISO 12620 (1999): Computer applications in terminology – Data categories. Geneva: International Standards Organization, http://www.semanticweb.kaist.ac.kr 12. ISO 16642 (2003): Computer applications in terminology – Terminology markup framework (TMF). Geneva: International Standards Organization, http://www.tbxinfo.net 13. COLING 2014, the 25th International Conference on Computational Linguistics, Helix Conference Centre at Dublin City University (DCU), Ireland, 23-29 August 2014, http://www.coling-2014.org 14. 15th International Conference on Intelligent Text Processing and Computational Linguistics, April 6–12, 2014, Kathmandu, Nepal, http://www.cicling.org 15. First Workshop on Computational Terminology, University of Montreal (Canada), 1998, http://www.perso.limsi.fr 16. Second International Workshop on Computational Terminology, Association for Computational Linguistics, Stroudsburg, PA, http://www.dl.acm.org 17. CompuTerm 2004 - 3rd International Workshop on Computational Terminology, Proceedings of the Workshop, 29 August 2004, Geneva, Switzerland, http://www.acl.ldc.upenn.edu 18. 4th International Workshop on Computational Terminology, COLING 2014 Workshop, 23rd August 2014, Dublin, Ireland, http://www.perso.limsi.fr

68 www.jpis.az

Problems of information society, 2016, №1, 69-77

Irada Y. Alakbarova ANAS Institute of Information Technology, Baku, Azerbaijan [email protected] WIKIPEDIA ENCYCLOPEDIA AS A MANIPULATIVE TOOL IN SOCIAL MEDIA The analysis of secured management technologies has become one of the factors of information security in the modern information society. The use of Wiki-projects as one of the social media tools in information impact is closely related to the wide application of information- communication instruments. The primary aim of the research is to study the social media phenomenon, the stance of wiki-environment as one of the social media tools in the society and its role in information impact. For this purpose, the notion of social media is explored and the fields encompassed by social media are specified. The problems associated with user content in wiki-environment are indicated and the essence of Creative Commons license is clarified. The main tendencies providing the information impact of wiki-environment are determined in the article. Key words: social media, social network, blog, wiki-environment, information impact, podcast, user content, Creative Commons. Introduction Nowadays, millions of Internet users from various parts of the world devote their time, experience and knowledge to various projects of virtual space: the creation of social media contents in social networks, blogs, forums, open encyclopedias and websites. Different news programs, knowledge sources, blog articles, tweets, virtual study materials and images, video and audio materials, in different formats, are attributed to this content. Modern information- communication technologies (ICT) are playing a prominent role in the development of social media, as in different fields of the society. The wide opportunities of the Internet, in particular confirms once again that it is not only the information and communication environment, but also a new reality of our everyday life and a field of activity of many people. It is to be considered that no customs and boundary control exist for information. People from different continents can freely communicate here. As a result, several new interests, goals, needs, activities, also the forms of psychological and social activity of Internet users emerge in association with the global network [1]. The Internet capabilities have facilitated the emergence of the gigantic information resources such as social media. The social media – creates the opportunity to establish social communication among people and share various information via the The Internet tools. By using more accessible and web-based technologies, it turns the communication to an interactive dialogue, rapid dissemination of information in the society and the mirror of reactions of people to various events and processes. Information web-sites broadcasted via the Internet, social networks, blogs, microblogs, wiki-projects, instant communication programs, and forums pertain to social media tools [2]. Social media plays a prominent role in formation of information society. Hence, the essential philosophy of the information society is expressed as the satisfaction of people’s need for information and knowledge, regardless the age, language, religion, social and political affiliation, education and occupation; the creation of social communication environment among those, and communicating any information to community. [3]. These opportunities are acquired through the direct use of web 2.0 and 3.0 program products and wiki technologies. The networks pertaining to social media facilitate the establishment of unofficial communication between the user and the experts of different fields. Thus, in social media, people are more open and active, and eager to share knowledge more than in real life [2,4]. Facebook and Twitter social networks, Wikipedia virtual encyclopedia can be shown as an example. Unlike the traditional web pages, users do not only obtain particular information passively, but also participate in generating and

www.jpis.az 69 Problems of information society, 2016, №1, 69-77 editing information in projects representing the social media. The social media, as an addition to traditional media tools, facilitates the collection of useful information and information exchange among people, and plays a central role in satisfaction of information requirements and acquirement of additional knowledge in the process of scientific research. The social media is transforming the people, their lifestyle, worldviews, communication tools and habits. The social media has a key role in globalization of the world by eliminating the boundaries among the states and people. The social activity of citizens in global network poses the tasks such as the strengthening control over social media, the monitoring, the use of social media tools in own purposes alongside the protection of information space of a state. The social media that emerged with the impact of Web 2.0 technologies has yielded expansion of other social activity fields. This, in turn, actualizes the issues of investigation of social media’s role in information impact on society [5]. Wiki-environment as one of the main tools of social media plays an important role in information impact today. The reason for this is the extremely large information and reader audience of wiki-projects, and the its recognition as an easily accessible and reliable knowledge source in the society [6]. The fields of social media Social media attracts more experienced, educated and serious users day by day. Social media is also affecting the economic, political and cultural relations [6,7]. People trust in social media and attempt to analyze the events occurring in the society with the help of social media. The social media can be encountered in most projects of the Internet today [4,8]. The fields encompassed by the social media are as following:  social networks;  blogs;  wiki projects;  forums,  content sharing;  podcasts;  microblogs; Social media is a group consisting of social structural links between social mutual relations, social objects (people and organizations) and communications. The social network, in the Internet environment, is referref to interactive and multi-user web-site, in which people with common interests gather together. In this web-site, as an automatized social environment, the information is posted by the Internet users, who are assembled in a particular group. Social networks are gigantic information resources: vast amount of information related to people, events, products and organizations is inserted in different languages of the world. Social network is a favorable place for the promotion of a particular idea and thought [8, 9]. Social networks support the virtual activities such as the collection of important information, the transmission of various information (information protected by copyright rights, personal information, misinformation, false information, spam), promulgation and validation of particular ideas, and income earning using network acquaintance. MySpace, Facebook and LinkedIn social networks are more popular among young people. Nexopia, Hi5, Tagged, XING, Skyrock, Orkut, Friendster, Multiply, Xiaonei and Cyworld projects can be shown as other popular social networks. Blog is the best-known type of social media. Being an Internet-diary, blogs are wide information sources regarding the socio-economic, political and other events occurring in the world. At the same time, a blog is a virtual society gathering people around a particular topic. Blogs can be personal and professional. Personal blogs are more widely spread. In such blogs, a blogger shares his/her observations and thoughts with readers, writes about the issues, in which he/she is concerned, and tries to engage readers in discussions. Expert blogs differ from personal

70 www.jpis.az

Problems of information society, 2016, №1, 69-77 blogs in the method of introducing the information. In such blogs, a blogger introduces him/herself as an expert and attempts to shape an opinion of readers in a particular topic. Corporate blogs occupy a larger space among expert blogs. Corporate blog is created and managed by a company. By this type of blogs, a company tries to introduce itself as an institution benefiting the society, and to increase the number of supporters. Journalist blogs also occupy a special place among expert blogs. In a modern age of the development of information society, it is impossible to imagine a professional journalist without a personal blog. For a journalist, a blog is a tool for increasing the prestige, trustworthiness and professionalism. Such blogs are often considered as mass media blogs. Blogger, WordPress and other respective projects can be shown as an example. The reason for the interest toward the blogs has been studied by most researchers, and it has been revealed that, although not having a prominent impact power in terms of politics, the uniqueness of introduced information and the opportunity of bringing any topic for discussions at world level attracts the users [10, 11]. Blog creators do not always possess material, moral, social or cultural features. Nevertheless, blogs are capable of gathering people together [11]. Forum is deemed a strong and popular element of social media and one of the first Internet projects. The forums, establishing the basis of Web 2.0 technologies, is an interesting virtual environment of online discussions. In these projects, Internet users gather around a particular subject and interests. The events, conflicts and confrontations are being widely reflected in forums. For this reason, discussions are superseded by hot debates and information confrontation in most forums. In content sharing project, as most interesting and most-viewed social media projects, the users share images, video and audio files. As an example, Flickr, YouTube, Picasa, Commons and Twitpic can be shown. One of the main problems caused by these projects is associated with copyright rights [12]. Podcast is the creation and translation of audio and video files as radio and television programs on the Internet. The web-sites of Podcast posts operate as a video and audio recording studio by supporting the media-file hosting. Their performance can also be called as video-blog or Internet-radio. These web-sites allow the subscription to media-files. Speeches can be saved as texts in podcasts sometimes. Various software tools exist for using Podcasts. Zune Software, iTunes, Rhythmbox, gPodder and AmaroK are examples. A microblog is a project comprising the facilities of blog and social media. By generating small-volume information (tweets), microblogs rapidly spread via the Internet network and mobile connection. Twitter is a leader in this field. New projects are being added to social media fields and this process is constantly proceeding. These projects include social bookmarking (Delicious), opinion and research (Yahoo Answers, Yelp), video sharing (Youtube, Vimeo, Dailymotion), live streaming (Justin.tv), audio and music sharing (last.fm, Grooveshark) and etc. One of the most frequently used social media projects is Wikipedia virtual encyclopedia [13]. Wikipedia and related projects, created with wiki-technologies, allows to create a web page about any subject, at anytime without quitting the browser, edit pages and upload files, in various formats, on the pages.. Besides content creation, as fully eligible web-programmer on the internet, web-technologies also enable the users to participate in discussions, regardless the occupation and interests, and express their opinion regarding the created and edited content by users, which leads to the establishment of new social relations in the society. Wikipedia has acquired a high rating as one of the web-resources of largest user audience on the Internet, one of the most popular social networks, and the largest knowledge base [4]. The main reason of Wikipedia’s popularity is dynamicity and the ability to be updated. Today, a primary information regarding a nation, state, particular event, a popular person and etc. are acquired from Wikipedia encyclopedia. From this point of view, Wikipedia is a primary information source.

www.jpis.az 71 Problems of information society, 2016, №1, 69-77

As an example to wiki-projects, open web-sites about virtual encyclopedias, news, tourism, education, and other topics can be shown. Wiki-projects are more suitable for Internet publishing, in comparison with other projects, in terms of the information characteristics. Therefore, the users of wiki-projects do not only acquire encyclopedic information, at the same time, they access to media-files, animated schemes, three-dimensional objects and interactive panoramas posted in web-sites, and become actors of the social network engaged in knowledge generation [8,12]. User content and Creative Commons license While studying social media, the notion of “user content” is often encountered. By user content, particular content is considered which pertains to Web 2.0 technologies, created by users, is of particular importance and is voluntarily inserted to open Internet projects from various information carriers. Today, social media is expanded due to user content [14]. User content considers the use of all technologies for content storage and transmission. Podcasts, blogs, wiki-projects, network platforms are considered for image, audio and video upload pertain to those. In some cases, the user content constitutes only some part of web-resource. For example, although in particular websites the main material is posted by administrator, a place is created for user content which leads to more comprehensive and attractive news due to user content. In all cases, the user content is verified by administrators before publishing in order to avoid copyright rights problems. The expansion of social media, the excessive enlargement of user content, and the rapid continuation of this process have caused the formation of a new generation, trying to use the Internet independently and without any obstacles. The desire of Internet users, which encompasses use of any information for various purposes through free download and uploading, is always topical. However, content authors in traditional web-pages seek to limit the unauthorized use and dissemination of their products by any means. As a result, two sides are formed in the Internet environment, which do not accept each other’s attitude: one group does not recognize the copyright rights, while another party does not accept the free content sharing. Creative Commons license has been suggested as an optimal version of the consent between two sides [15]. Creative Commons is a specific license and allows the content author to make amendments in the rights of use of this content. Creative Commons license was proposed by Lawrence Lessig, a law professor of Stanford University, in 2001. This license is a new approach to the management of intellectual property rights, and the purpose is to provide open and legally independent use and dissemination of variety of creative works (book, article, image, music, film and etc.). With those licenses, the authors can apply their authorship rights not fully, but with some concessions, i.e. authors decide on which rights to relinquish or to preserve according to these licenses. For instance, it can be the case that an author does not oppose the dissemination of his work by fans and readers. In another approach, an author can give permission to distribution and use of his work, but its alteration or the commercial use will not be allowed. This approach is called “some rights are reserved”. It must be taken into consideration that unlike Creative Commons license, the authorship rights contemplates “all rights are reserved” and in this case, all rights belong to an author. As a result of social media expansion, millions of artworks are protected and circulated by Creative Commons license. The licenses are used in culture, education, science, government organizations and wide spectrum of Internet projects. The Internet projects, widely using these licenses, are the web sites managed by wiki-technologies: Wikipedia encyclopedia, Wikimapia virtual map [16], Wikitravel virtual travel site [17], and so forth. Various international scientific journals, open data bases, virtual photo galleries, video-projects and web-sites of different content exist, which operate in accordance with Creative Commons license.

72 www.jpis.az

Problems of information society, 2016, №1, 69-77

Wiki-environment and the problems of information impact Some social network groups aim to impose information impact on society to turn people against the state and national values; to dishonor the history of a particular nation and to damage the economy by wiki-technologies [18]. The crowd that do not use the Internet, social networks and wiki-technologies is a passive majority, and it is unlikely that they will demand something from the state with information impact. The history shows that revolutions, coups, the seizure of power are realized by the socially active minorities exposed to the information impact. Today, in order to prevent the threats against the state, the mechanism of the processes occurring in social media must be studied and understood. In most cases, the distant observations cause the emergence of various assumptions and speculations. However, specific geopolitical results are obtained by information technologies. From this point of view, the decision-making associated with state information security must be carried out against the analysis of events occurring in social media. In some studies scrutinizing the information impact of social media,, it is indicated that a new media can be deemed neither democratic nor authoritarian. This social project can reflect both attitudes [18,19]. This feature also pertains to wiki-environment. In recent years, an opinion is shaped in the society that it is impossible to manage the social media and wiki-environment as its integral part. Firstly, due to that fact that the users are constituted of volunteers and can operate in wiki-projects regardless the place of residence [20,21]. In order to analyze the role of wiki-environment in information impact, the Internet phenomenon must be studied in depth at first stance. The thought that Wikipedia is a truly free project and anyone can edit the desired information does not conform with the reality. The corresponding capabilities of Wikipedia are as large as the threats of the Internet to the security of governments. It must be considered that the Internet is controllable by particular countries and a question rises at this case: who controls Wikipedia? Is Wikipedia established for the purpose of instilling a particular ideology and world view in people or a special form of public relations, a propaganda machine disguised behind the encyclopedic information? It is well-known that Wikipedia is a strategic Internet resource managed from a special center in Florida state, USA, and it is forming the worldview of the citizens and youth in particular [22,23]. The Wikipedia Fund, managing the Wikipedia project, possesses gigantic supercomputers located in specific strategic points of the world and not available even to the majority of developed states. Servers operate on the basis of Linux operating system. Some part of servers operate as managed data base, based on MySQL, some part as requests cache (Squid), and another part as web-server (Apache). Wiki-servers are machines with super power processing more than 4 billion traffic and defeating any virus and spy programs [23]. The power supply of wiki-servers, high-skilled staff, program and apparatus software require financial resources of millions of dollars and in this case, the fact of possession of wiki-projects by a regular company raises some doubts. In Wikipedia, the topics are managed by particular groups, protected when needed and the people protesting against the distorted facts are dispelled from Wikipedia [18,26]. The analysis conducted with Wikipedia Scanner program established in California Institute of Technology demonstrated that the majority of articles are created with the participation of the employees of Central Intelligence Agency of USA, Federal Bureau of Investigations, state and education institutions, political parties and information agencies [22]. The principle that “anyone can create and edit the desired information” in Wikipedia is not justified. The permission for any information to be posted in wiki-pages is agreed by the group of specific administrations only. By specific administrators, a group of people “trusted” by Wikipedia Fund are considered, and the members of this group, disguised behind the false names, are engaged in the dissemination of the Western culture and ideology in Wikipedia.

www.jpis.az 73 Problems of information society, 2016, №1, 69-77

Wiki technologies are complex and multilevel. It appears as a resource considering the use of any type of content and containing the encyclopedic information at first glance. However, in depth analysis reveales that wiki-projects have large capabilities to cause the formation and alteration of public opinion. The sovereignty of governments and national-moral values, the history and language of nations are infringed and practically, neither Wikipedia members, nor the administration does not bear any legal responsibility for the content in wiki-environment. The number of gathered articles in Wikipedia in English exceeds the articles in other languages millionfold, and are mainly engaged in promulgation of American and English realities, cultural values and prominent persons, and the people eager to work in Wikipedia are firstly offered the translation of these type of articles [23, 26]. One of the principles of Wikipedia is impartiality. However, beneath the veil of this rule, the youth are offered to victimize the national interests and realities of the nations they belong to Wikipedia rules and unfortunately, the active participants of this virtual project accept these conditions under the veil of impartiality. As a result, the articles about foreign scientists, statesmen and other prominent persons constitute the majority of articles in several languages. The spam feature is already pertaining to Wikipedia as well. Thus, it is of no coincidence that Wikipedia is at the first page of various search systems. Even if Internet users intend to read the information not from Wikipedia, but from other web-sites, they are forcedly redirected to Wikipedia. The Chinese government which has understood the threat of Wikipedia has established a virtual encyclopedia in 2005, and was able to distract the majority of students from Wikipedia to this encyclopedia. With 11 million articles, this open encyclopedia, called Hudun, is the largest encyclopedia of the world after Wikipedia [24]. The socket puppet technology is largely used in information impact of wiki-environment [25]. Firstly, several virtual accounts and bots are created with this technology and directed towards particular target, and by evaluating a particular event, they introduce it as a public opinion. The user entering wiki-environment is forced to accept the artificially created “public opinion” as a normal case. Actually, this is not the opinion of the majority, but of a group imposing the information impact on a society and managed from a center. Wiki-environment mainly operates with “90-9-1” principle, that is, 90 percent of users are regular readers, 9 percent are the ones making slight changes in content. The main information is created by the group constituting 1 percent [26]. Hence, an important social context and social environment necessary for the solution of a political problem is created by 1 percent of users. It must be taken into consideration that if any political decision or event attempted to be realized by particular groups is not supported by the publicity, its realization is complicated. But, if favorable conditions are created for any political decision or event in a correct way, its realization does not appear to be hard and many adherents are gained. Resolution of problems The activity of users in wiki-environment can appear in different format: cooperation, competition, integration and confrontation. The analysis of each position facilitates the forecasting the prospective development of the events in wiki-environment. It is to be considered that, as in all social networks, the main part of users in wiki-environment are constituted by the active part of the society on the Internet and they are mainly intellectuals, politicians, media workers and other highly skilled experts engaged in intellectual labor. They are socially active persons with the Internet access and the skills to work with information, and they are specified as main targets of information impact. Therefore, the subject of encyclopedic articles reflects the purpose of users editing those articles [20, 23, 26]. This, firstly, impacts the volume, topicality and the accuracy of the information in an article, and creates severe distinctions among Wikipedia articles. Today, the social media is a tool maintaining related activity of the political movement in the world. Social media is a tool stimulating the consolidation and expansion of the civil society.

74 www.jpis.az

Problems of information society, 2016, №1, 69-77

This approach is deemed as “external environment” in several literature sources [18]. Wiki- technologies, as one of the instruments of social media, are fundamentally changing the mutual relations of a citizen and the state. New tendencies associated with wiki-environment create big opportunities for the impact of a particular country on the social life of other country and the information environment of its citizens. For this reason, several advanced countries are using wiki-technologies for political and economic purposes by studying the capabilities of those technologies. But it must be determined how the information needs of citizens of separate countries are met and which sources of information impact are used. These are the primary issues posed in relation to the security maintenance of information space of every country. It must be considered that information needs of citizens of separate countries can comply not only with the interests of their country, but of others. The support of wiki-projects by Google gigantic search server and the suggestion of information contained in Wikipedia encyclopedia, as the first suggestion in any information search, proves the prominent role of the Wikipedia in information need of citizens. Main tendencies providing the information impact of wiki-environment are shown below.  rapid increase in content volume in wiki-environment;  enhancement of opportunities for interactive use of wiki-content;  escalation of information confrontations in wiki-environment;  commercial character of wiki-environment in recent years;  technical and economic convergence of traditional encyclopedias and Wikipedia;  globalization of wiki-environment. On the other hand, the fight against Web 2.0 and wiki-technologies is a hard task in terms of information security. For instance, the environment of adherent wiki-users is necessary for the revolution in web-environment, and if this environment is absent, it must be created artificially. The French philosopher Gilles Deleuze, who describes the features and the structure of the network, mentions that a special impact network must be created in a rival area in order to fight against the social network. Hence, after creating the environment, the realization of destructive scenario in such environment is possible; the operation principle of such gigantic information base such as Wikipedia and the behaviors of active groups prove the need for accurate study of the network [27]. Wiki-environment is a social network created by USA, and it operates in 300 languages. If a group opposing the state is formed in this environment and information war is pursued, a new network serving to the government interests must be created, as suggested by G. Deleuze, and the information must be posted in that network, which is capable to supersede the content created by the rival party. It is to be mentioned that the target attracting the attention of network users is limited. An individual reads and comprehends as much information as physically achievable. So, the exclusion of destructive content is possible with the creation of alternative content, which can attract the users. The approaches used in the analysis of social networks, operating in wiki-environment, can be generally used in the analysis of social media. The solution of the following issues is important in the analysis of different impact methods of Wikipedia on political spheres and economy:  Technical and software tools used for the information impact by Wikipedia must be specified;  The negative consequences of the impact of Wikipedia on citizen behavior must be determined;  All projects operating in wiki-environment at present must be analyzed; new projects to be created and their role in information impact must be specified. In order to study the information impact in wiki-environment, its social network must be analyzed. The monitoring and evaluation of main indicators must be carried out. The monitoring

www.jpis.az 75 Problems of information society, 2016, №1, 69-77 in network is carried out with specification of key worlds relevant to the studied object field. All information exchanges are tracked and the data is organized for next analysis in this process. During the evaluation of indicators, more important indicators are specified. Moreover, the main features of wiki-environment must be considered and the following directions must be specified:  capacity of wiki-environment;  links among the actors of network;  philosophy, nature and the power of wiki-environment for determining the functionality of the latter;  problems and the causes of those. Conclusion As a result of the research, it has been revealed that social media is not only an information source, but also one of the tools of information impact. The social media is a tool for discussions in virtual space for the creation of virtual base of different types of files storage, and cooperation with other Internet users due to the ability to access instantly to desired information on the Internet. Social media is a set of projects that facilitate the development of professional critical thinking and the independent analysis by people that expands day by day and becomes popular. Wiki-environment as one of the main tools of social media is a large knowledge source and a social network today. Like in traditional social networks, the information in wiki-environment is realized not directly, but indirectly. The main features of wiki-environment are the multi- media character, operativity, interactivity, the ability of rapid adaptation against changes, parallelism in communication and the ability of retranslation of information. Wiki-projects are used for the illumination of a particular event or a prominent issue not only by usual citizens, but also by experts attempting to evaluate a specific event, and for different radical groups and organizations trying to manage the minds of citizens, mobilize and engage people in protest actions at the same time. The investigations showed that the popularity of Wikipedia and the continuous increase in number of articles posted cannot be considered as a positive case as such; this also implies that wiki-environment plays a prominent role in information impact and proves its dangerousness. Hence, the wiki-environment is a tool granting the democracy and the openness in a society as well as a malicious instrument facilitating the disturbance of political stability. The analysis of information impact in wiki-environment is one of the significant tasks for the maintenance of security of the government information space. For this reason, the states aspiring to maintain their information space security must be capable to control the wiki-environment. References 1. Alguliev R.M. Mahmudov R.Sh. The essence, features of Internet and some views on its impact opportunities // Problems of the Information society, 2012, №1, pp. 41-51. 2. http://www.sosialmedia.net/?page_id=7 3. Alguliev R.M., Valehov J.F., Mahmudov R.Sh. Some aspects of the formation of Internet- journalism. Express-information. The Information society series, Baku, “Information Technologies” press, 2008, 32 p. 4. Alguliev R.M., Alakbarova I.Y., Kasumova R.T. The collective knowledge in Internet // Proceedings of sixth international scientific-technical conference “Internet-Education- Science-2008”, Vinnytsia, 7-11 October, 2008, pp. 5-7. 5. Rozina I.N. Communications 2.0: educational and social dimensions, limitations and opportunities // Educational technologies and the society, 2010, vol.13, №2, http://www.ifets.ieee.org/russian/depository/v13_i2/html/6.htm 6. Alakbarova I.Y. The analysis of some information war technologies carried out in Wiki environment // Problems of the Information society, 2011, №2(4), pp. 18-28.

76 www.jpis.az

Problems of information society, 2016, №1, 69-77

7. Benkler Y. The Wealth of Networks: How Social Production Transforms Markets and Freedom, Yale University Press, 2006, 527 p. 8. Alakbarova I.Y. On some approaches to the analysis of information impact of users in social networks // The Information society, M., 2012, №3, pp. 31-38. 9. Mayfield A. What Is Social Media? http://www.repromax.com/docs/113/854427515.pdf 10. Farrell H., Drezner D. W. The power and politics of blogs // Springer Science and Business Media, 2008, vol. 134, no. 2, pp. 15-30. 11. Perlmutter D. Blogwars. Oxford University Press, 2008, 272 p. 12. Christensen H. Social media, big data and the next generation of e-health interventions, https://www.psychology.org.au/Content.aspx?ID=5848 13. http://wikipedia.org 14. Pavlik J. Converging Media. Oxford University Press, 2014, 140 p. 15. http://www.creativecommons.ru/licenses 16. http://www.wikimapia.org 17. http://www.wikitravel.org/en/Main_Page 18. Baluev D.G. The political role of social media as a field of scientific research // Educational technologies and society. 2013, vol.16, № 2, pp. 604-616. 19. Nye J.S. The Powers to Lead. Oxford University Press, 2008, 240 p. 20. Halavais A., Lackaff D. An Analysis of Topical Coverage of Wikipedia // Computer- Mediated Communication, 2008, vol. 13, no. 2, pp. 429-440. 21. Alakbarova I.Y. The analysis of the socio-demographic portrait of wiki-environment // Problems of the Information Society, Baku, 2012, № 1, pp. 21-28. 22. Garifullin R.R. Wikipedia: psychology of virtual war, http://www.psyfactor.org/lib/garifullin11.htm 23. Alguliev R.M., Aliguliev R.M., Alakbarova I.Y. Wikimetric studies: the current state and perspectives // Telecommunications, 2014, №5, pp. 15-31. 24. http://www.hudong.com 25. https://en.wikipedia.org/wiki/Wikipedia:Sock_puppetry 26. Sumi R., Yasseri T., Rung A., Kornai A., Kertész J. Edit wars in Wikipedia / Proceedings of the IEEE Third International Conference on Social Computing, 9-11 Oct. 2011, pp. 724–727. 27. Awan A.N. Virtual Jihadist media: Function, legitimacy, and radicalizing efficacy, European Journal of Cultural Studies, 2007, vol. 10, no. 3, pp. 389-408.

www.jpis.az 77 Problems of information society, 2016, №1, 78-83

Rasim Sh. Mahmudov Institute of Information Technology ANAS, Baku, Azerbaijan [email protected] ABOUT FEATURES OF SOCIAL MEDIA The article examines the communications, information, value generation, organization, and entertainment functions of social media. The features of these functions are commented in the article. Respective features of traditional and social media are compared. Key words: social media, communication function, information function, value creation function, organizational function, entertainment function. Introduction The Internet and social media, its integral part, is attributed to social communication institution – communication tool and information exchange. The performance of social media, as a social institute, is determined by the requirements and interests of various social entities. In sociology, by investigating the Internet and social media, the impact of this global phenomenon on human life, the evaluation of alteration of reflections regarding the objective social needs of an individual, separate groups and the society as a whole are studied. Not only the fact of behavior, but also the motives behind this behavior are revealed in social studies. Sociologists attempt to study the factors (causes) facilitating the behavior and the outcomes of the use of corresponding communication system as well. They endeavor to forecast by evaluating (measuring), describing and interpreting the events occurring in this sphere and determining existing legal framework. Empirical investigations in social media sphere is mainly beneficial for the employees of this sphere. Therefore, such investigations are important for decision-making on new media- projects, editing the content and target audience. Moreover, sociologists and analysts analyzing social processes (Internet-media as an integral part of it), media experts analyzing various mass media activities and the consumer markets, marketing specialists, advertisers, and others are social research subjects also for experts of this sphere [1]. The outcomes of standard and regular investigations (mediametry), targeting the mass customers and potential users, are directed towards the satisfaction of market needs. Specific or exclusive studies are usually carried out by orders and by state or private grants. The results of mediametry is also important for socio-political analysts. Internet as a basis of social media is also an environment of operation of various communications. An American political scientist Harold Lasswell reckoned that every social communication fulfills the main three functions: executing the control on environment, acting as a communication tool among social entities and facilitating the culture (knowledge, values, norms, traditions) transmission to future generations [2,3]. Universal communication functions can also be attributed to the Internet. Historical development of mass media has caused the emergence of several specific functions in this sphere. Those functions have been carried out by the impact of enhancement of technological facilities of socio-political and social economic situations, information generation and dissemination in specific countries. For instance, the function of mass media, as a social inclusion, has started to be perceived since the midst of the past century. With the emergence of the Internet, the realization capacity of this function has significantly increased. However, this function is being realized at very low levels in such environment. In this regard, M. Castells mentions that a good or bad character of technology depends on how those technologies are applied by us [4]. Social media possesses traditional functions of mass media, and generates new functions pertaining to this technological environment as well. The study of characteristics of those functions has a socio-political and socio-cultural importance alongside the scientific relevance.

78 www.jpis.az

Problems of information society, 2016, №1, 78-83

Communication function of social media One of the most important functions carried out by social media is communication function. As known, communication tools are created in order to provide people with sociability tools. Mass communications serve to the creation of communications among mass entities. The communication is constructed via internet-media such that professional information producer and mass entities – the mass of anonymous users, the number of each is inestimable, stand on either sides. Internet-technologies globalize the communications. The dependence of communications on territorial factors evoperates emerges in such curcimstance. Internet-media, benefiting from such opportunities, shapes a new society based on unified information basis and the code of conduct. The general vector of the development of modern information transmission tools is based not on vertical (domination of a specific communication party upon other) but on heterarchical (horizontal, equal) principle. In other words, the transition from one-sided communication model to two-sided communication model takes place. Social media is not excluded from these changes in the communication sphere. Not only a journalist, but also the audience participates in information generation and exchange. However, the use of interactive opportunities in this sphere does not allow the distribution of responsibility division. Three aspects of network interactivity are distinguished [5]: . “People and documents” (the opportunity to shape and carry out information request for a user); . “People and technologies” (the convenience and the adaptability potential of information technologies for users); . “People and people” (social communication technologies, the appropriateness and convenience of those for mutual communication). While analyzing the communication function of the social media, essence of the notions such as “interactivity” and “feedback” must be explained. Firstly, it is to be mentioned that the first notion is wider than the latter. Feedback – is a reaction, a response of an entity to information influence. From this point of view, social media makes use of “forum” function in greater sense. Visitor indicators also act as feedback: it provides statistical information regarding the degree of interest of user in a web-site and its content. Interactivity reflects wider opportunities: it contemplates user control on content (request, evaluation), the participation in content creation, content discussion, conference with other users, and etc. Some of these opportunities used to pertain to media as well. But, the opportunity of horizontal communication among users is only present in social media. It is also impossible to maintain communication operativeness in traditional media. H. Lasswell distinguishes three levels of interactivity [2]: . Mutual, but non-interactive communication (for instance: phone calls, mails) . Reactive and quasi-reactive communication, i.e. one party receives information about the reaction of other party (feedback) . Fully interactive communication, i.e. all communication entities participate in information exchange based on equal opportunities. At present, the audience of social media is able to use sufficiently enhanced communication tools: discussion of a particular article or program, filling forms as a response or answers to editorial questions, the participation in rating evaluation of materials, sending questions to editorial office, a particular journalist or speaker, general evaluation of performance of a channel or web-site, the discussion of social problems and political issues, the dispatch of materials for publishing and etc.

www.jpis.az 79 Problems of information society, 2016, №1, 78-83

Consequently, unlike traditional media, social media possesses more specific communicative functions. Internet creates enhanced opportunities for maintenance of mutual communication and interactivity. The information contained in social media pages is accessible by everyone. Only limitations related to payment can occur. The problem of maintenance of equal accessibility to resources is one of the major issues related to sociological studies and practical development of the Internet. Optimists reckon that social media created feasible conditions for maintenance of equal opportunities for groups previously deprived of these opportunities with other groups. However, in presence of digital inequality, the process can develop in reverse direction, i.e. the social gap can widen. Information in social media possesses several following features as in traditional media [5]: . operativeness; . Illumination of social life; . Universality and versatility of subject matter (even being a specialized media tool); . Genre-type variety of materials. The absence of specification of legal responsibility relieves the sense of responsibility for materials posted in social media. This leads to the increase of misinformation, unclarified and unreliable information. Information function of social media Multimedia feature of social media creates new opportunities for realization of information function. It is well known from the practice of traditional media that different marking and influence tools or the variety of information introduction-reception channels ease the information and knowledge assimilation. Hypertext feature of social media significantly enhances the opportunities of information function. Therefore, it is to be mentioned that multimedia as a new and universal sphere of social media makes information more multi-colored and interesting in terms of type, form and genre. Internet possessing multimedia and hypertext features transforms the information into more enriched, comprehensive and solid form [1]. Value creation function of social media It must be noted that family and schools shape the first socialization. Thus, an individual familiarizes himself with knowledge, norms, values, practice and traditions collected in society and surrounding social microenvironment. In a modern society, this function substantially lies on media. Media serves to value creation and conservation. Social media takes the freedom of information exchange to the next quality level. Global network also aggrandizes the issue of social identity (belonging of individual to particular social groups). If traditional communications (mail, book, telephone and etc.) have eliminated space- time obstacles, Internet has gone further – it eliminated social identity. It means that the Internet has become a space of rapidly alternating wide-spectrum virtual societies. As a result, global value-norm basis started to be formed [1]. In a modern independent journalism, a fact is accurately distinguished from an opinion. Therefore, an opportunity is created for a reader, listener and spectator to draw one’s own conclusions. The realization of this function in internet-journalism is dependent upon the journalist culture, admission of responsibility for editorial policy, possession of skills of various genres and methods of expression in relation to an object of illustration. It also depends upon user culture – the ability to use the Internet opportunities for shaping personal position. It is known from the investigation of traditional media that some users try to use various, also alternative information in order to shape his views, whereas other users only wish to benefit from suggested position.

80 www.jpis.az

Problems of information society, 2016, №1, 78-83

Value creation function is focused on the information sharing and attraction of attention of audience towards events and problems, and shaping the agenda. On the Internet, the process of division and split of audience to several groups is observed. In general, social media is able to carry out this function pertaining to traditional media. Moreover, the features of Internet such as operativeness, interactivity and hypertexting ascends this function onto a new qualitative level. The expansion of division process of the audience of offline and online channels, asyncronization of information perception by audience disturbs communion of information-value platform and “agenda” [6]. Organizational function of social media Media participates in operation of real social groups and institutions – town residents, employees of a particular field or members of public union, and in realization of their functions. This is called organizational function [1]. It is affirmed that mass media is a specific society comprising the activities on satisfaction of information requests via a particular channel. Based on long-term practice, the proximity of views is strengthened, base of general information and values is established, the processes of exchanging opinions, related to socio-political issues, are developing. According to several sociologists, new groups emerge in general communication base related to general cultural interests, similar problems and needs to express own views [7]. Therefore, the Internet creates a feasible environment for formation of social unity, solidarity and identity. Sociology and social sciences affirm that the audience of each media tool constitutes a specific society. Common views, information reserves and values of individuals, united to satisfy information needs from the same channel, are created. Internet breathes a new life into this process. It becomes an easy and rapid process to unite people around particular interests via social networks, forums, chats [8]. According to M. Castells, Internet upgrades old communication tools of an individual and society. If previously these methods were based on areal factor, now it is based on “network individuality”. Multiple links are referred to “weak links” on the Internet; however, they are very important and can even maintain family societies [9]. In the first years of mass penetration of the Internet, activists of various public unions reckoned that the global network cannot supersede the real human communication. However, subsequent practice demonstrated that new technological communication tools among individuals have own benefits. It is revealed that these communication tools are very suitable for social solidarity and elimination of digital inequilaty. Therefore, it can be stated that social media cannot supplant real human communication, but it can enrich such communication channels. Social inclusion function of social media Another function of media created by the Internet is a social inclusion function. The notion of the “social inclusion” has emerged in the 30’s of the past century. By “social inclusion”, various methods of citizen activity in discussion and solution of important issues are understood [1]. Communicative participation or inclusion in social communication is deemed more accessible form of social inclusion for population stratums. The necessity, possibility and effectiveness of this participation via traditional media has been discussed for several decades. If in totalitarian and authoritarian regimes a journalist is a guarantor information interests of a government and protector of information gate, in open societies a journalist strives to open those doors wider. In modern society, media acts as an important integral part of public sphere. Here, mutual relations of main social entities – society, government and business is transformed into discussion and judgement with journalist participation. Some sociologists contend that the rapid development of information technologies creates new expectations in this sphere. Hence, it

www.jpis.az 81 Problems of information society, 2016, №1, 78-83 enables the gap elimination, and establishment of communication between citizens and the government. In other words, this new situation acts as a stage of realization of electronic democracy or direct democracy. Social media is an environment, in which not only the space limitations, but also the obstacles in realization of separate spheres of human activity – work and everyday life, hobby and civil status, and the differences between education and entertainment are eliminated. Information maintenance of these spheres and tools for participation in them located in a unified media environment, and the distances among different spheres are almost absent. Before the Internet, some of these facilities were provided by traditional media, including television. However, interactive and online opportunities of Internet sustain its supremacy against traditional media. Entertainment function of social media The function of entertainment captures a significant place in operation of social media. The rapid increase of Internet users, widening of social-demographical composition and geography, elimination of differences in Internet access among population groups have transformed the social media into the most interesting entertainment place. Nevertheless, experts held a different opinion 15 years ago in this regard. M.Castells excepted the opinion that Internet would be able to compete with traditional entertainment tools and places. He considered that Internet is not an entertainment, but a communication tool [8]. Traditional and social media are capable to support each other in a more effective conduction of social functions. Modern tendencies indicate that centralization, convergence and integration in a single center (holding, editorial office, publishing house and etc.) of all types of media tools are taking place. Electronic versions of almost all traditional media tools are present. In the days of the Soviet era, different incentives have been suggested regarding the necessity of mutual functioning of different media instruments. At that time, different ideas such as “The Union of microphone, pen and video camera” (V. Khelmendik), “Solo parts in ensemble” (V. Sesyunin) had been discussed [5]. The essence of these incentives suggested the necessity of comprising specific facilities of each media tool and acting on a unified platform in order to effectively impact the audience. The most prominent social outcomes of joint, mutual functioning of traditional and social media are the enhancement of information volume and variety, and the increase of operativeness, in which the main role is attributed to the Internet. On the one hand social media accelerates the tendency of audience fragmentation and performs in a reverse direction, on the other hand it crystalizes same brand in different channels. For instance, if the audience of a traditional publication – a newspaper, is mainly constituted of middle-aged and old generation, and the electronic version of that publication attracts teenagers and young people. By using information update tools of various speed, the integration of facilities of offline and online versions is very effective for satisfaction of different audience groups. In traditional media, especially in radio and television, different contents are updated or repeated several times during a day. For instance, news program is broadcasted several times during a day, weekly information-analytical programs, monthly thematic programs are prepared. In social media, the programs, updated with different periodicity, can be placed on the same web site, i.e., different user groups, at the same time, can select the contents they are interested in. Hence, audience segmentations (fragmentation) and diversification of information materials (the increase in variety) take place. Alongside, coordination facilities of paper and electronic media is being widened, the processes of labor division and specialization in journalism are accelerated due to the audience with different needs (the increase in information needs of different purposes) [1]. In the environment of mutual functioning, the greatest cooperation opportunities are created from the point of view of mutual communication of journalists with the audience and

82 www.jpis.az

Problems of information society, 2016, №1, 78-83 within the audience. The audience using the Internet can influence the content and editorial plans, which is called “social control over media”. Conclusion Distinctive features of social media against traditional media are clearly reflected in functions carried out by social media. Traditional functions of media have acquired enhanced opportunities in quantitative and qualitative terms in the social media era. Moreover, social media carries out news and unique functions. which are beyond the capacity of traditional media. All these facilities, based on technological foundations, are directed towards the comprehensive satisfaction of information, communication and other civil needs of people. The emergence of more unique functions of social media is expected within dynamic development process of social media technologies. All these necessitate non-stop expansion of social media audience and acquisition of the competitive dominance over the traditional media. References 1. Alguliyev R.M., Mahmudov R.Sh. The emergence and development of Internet-media: main trends and features. Express-information. Information society series. Baku, “Information Technologies” publishing house, 2012, 58 p. 2. Lasswell H. Structure and Function of Communication in Society / Bryson J.(ed.) The Communication of Ideas, N.Y., The Free Press, 1948, 315 p. 3. Casmir F.L. Building Communication Theories: A Socio/cultural Approach, Psychology Press, 1994, 321 p. 4. Castells M. Information age: Economy, Society and Culture. Trans. in Russian by State Univ. of Higher school of Economics. Moscow, 2000, 606 pp. 5. Gnatyuk O.L. Foundations of communication theory. Moscow, “Knorus”, 2010, 256 pp. 6. Fomicheva I.D. Mass media sociology: manual for graduate students. Moscow: “Aspect Press”, 2007, 335 p. 7. Reitz A. Social Media’s Function in Organizations: A Functional Analysis Approach // Global Media Journal - Canadian Edition, 2012, Volume 5, Issue 2, pp. 41-56 8. Reinhold G. Smart mobs: The next social revolution, Moscow, “FAIR-PRESS”, 2006, 416 p. 9. Castells M. The Internet Galaxy: Reflections on the Internet, Business and Society /Trans. from English, Ekaterinburg, “U-Faktoria”, 2004, 328 p.

www.jpis.az 83 Problems of ABOUTinformation AUTHORS society, 2016, №1, 78-83

Alguliyev Rasim Mahammad Alakbarova Irada Yavar Academician, director of the Institute of Sector chief of the Institute of Information Information Technology of ANAS Technology of ANAS

Imamverdiyev Yadigar Nasib Yusifov Farhad Firudin PhD, head of department of the Institute of PhD, head of department of the Institute of Information Technology of ANAS Information Technology of ANAS

Aliyev Alovsat Garaja Hajirahimova Makrufa Sharif PhD, head of department of the Institute of PhD, chief project engineer of the Institute Information Technology of ANAS of Information Technology of ANAS

Jabrayilova Zarifa Gasim Shahverdiyeva Roza Ordukhan PhD, chief expert of the Institute of Senior research fellow of the Institute of Information Technology of ANAS Information Technology of ANAS

Hajizadeh Mahmud Elshan Mahmudov Rasim Sharif PhD Student of the Institute for Scientific Sector chief of the Institute of Information Research on Economic Reforms under the Technology of ANAS Ministry of Economy and Industry of the Republic of Azerbaijan

Gurbanova Afruz Mukhtar Shikhaliyev Ramiz Huseyn Sector chief of the Institute of Information PhD, senior research fellow of the Institute Technology of ANAS of Information Technology of ANAS

84 www.jpis.az

N o t e s

www.jpis.az 85

Requirements on design of articles published in the journal

Articles published in the paper, as well as in electronic form will be submitted.

The following requirements must be taken into account while designing the article:

1. Articles should be prepared in one of the languages - Azerbaijani, Russian and English, the title of the article, abstract and keywords should be submitted. 2. The articles should be submitted in the Microsoft Word text editor A4 format (from left - 2 cm., above, below and right - 2.5 cm.), Times New Roman 12 font., 1 cm inter-text interval, remaining paragraphs and not exceeding 12 pages. 3. Article text consisting the following sections is recommended: • Introduction (the problem relevance, state-of-the-art of the problem) • The purpose of the research, statement of the problem • The problem solution methods and approbation • Application of achieved results • Conclusion 4. The articles must be prepared in the following sequence: UOT - from left, bold, 6 font. interval; initials and surname of authors - from the left, and bold italic; author’s place of work, city, country and e-mail address - from the left, in the end 6 font, interval; the title of the article - from the middle, capitalized, bold, 6 font, interval; abstract (in the language of the article) - italics, in the end 6 font, interval; interval; keywords - italics, in the end 6 font, interval; introduction and other sub-headings - from left, bold, and at the beginning and end 6 font, interval. 5. References: each referred source must be numbered in accordance with the sequence used in the article and remained untranslated. 6. References must be followed by the article title, abstract and key words in 2 specified languages. 7. The tables and pictures in the article must be numbered: Table – at the top of the table, from the right (eg, Table 1.), a picture - below the picture, from the middle (eg, Picture 1.) remaining parts (from the above and below) a blank line. 8. Formulas must be set in standard parameters - Microsoft Equation. Only formulas used in the text must be numbered. The formula numbers must be written in brackets in the right. 9. The articles submitted to the editorial board must contain information about the authors: first name, last name, middle name, scientific degree, scientific rank, place of work, position, phone number, or e-mail address. 10. The author is responsible for the information and facts mentioned in the article. 11. The articles received by the editorial office are presented for review and the articles with positive reviews are recommended for publication. 12. Editorial Board Address: AZ 1141, Baku city., B.Vahabzadeh str.,9. Institute of Information Technology, ANAS, "Problems of Information Technologies" journal editorial board. E-mail: [email protected] Technical editor: Anar Samidov Correctors: Sabina Mammadzade Computer design: Gulnar Cabarli Zulfiya Hanifayeva

The journal was registered at the Ministry of Justice of the Republic of Azerbaijan on February 11, 2010. Registration number of adoption into publication:3104 Signed for publication 22.01.2016. Printed pages 60x84. Order №13. Copies 500 ədəd. 86 www.jpis.az

www.jpis.az 87