首页 > 最新文献

2013 International Conference on Social Computing最新文献

英文 中文
Access Control Policy Misconfiguration Detection in Online Social Networks 在线社交网络中访问控制策略配置错误检测
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.82
Yousra Javed, Mohamed Shehab
The ability to stay connected with friends online and share information, has accounted for the popularity of online social networking websites. However, the overwhelming task of access control policy management for information shared on these websites has resulted in various mental models of sharing with a false sense of privacy. The misalignment between a user's intended and actual privacy settings causes access control misconfigurations, raising the risk of unintentional privacy leaks. In this paper, we propose a scheme to extract the user's mental model of sharing, enhance this model using information learned from their existing policies, and enable them to compose misconfiguration free policies. We present the possible misconfiguration patterns based on which we scan the Facebook user's access control policies. We implemented a prototype Facebook application of our scheme and conducted a pilot study using Amazon Mechanical Turk. Our preliminary results show that the users' intended policies were significantly different than their actual policies. Our scheme was able to detect the misconfiguration patterns in album policies. However, the reduction in the number of misconfigurations after using our approach was not significant. Participants' perceptions of our proposed policy misconfiguration patterns and the usability of our scheme was positive.
在线与朋友保持联系和分享信息的能力是在线社交网站受欢迎的原因。然而,对这些网站上共享的信息进行访问控制策略管理的繁重任务导致了各种各样的共享心理模型,并带有错误的隐私意识。用户的预期隐私设置与实际隐私设置之间的不一致会导致访问控制配置错误,从而增加意外隐私泄露的风险。本文提出了一种提取用户共享心理模型的方案,利用从用户已有策略中学习到的信息对该模型进行增强,使用户能够组成无错配置的策略。我们提出了可能的错误配置模式,基于此我们扫描Facebook用户的访问控制策略。我们实现了我们的方案的原型Facebook应用程序,并使用Amazon Mechanical Turk进行了试点研究。我们的初步结果表明,用户的预期策略与实际策略存在显著差异。我们的方案能够检测到专辑策略中的错误配置模式。然而,使用我们的方法后,错误配置数量的减少并不显著。参与者对我们提出的政策错误配置模式和我们方案的可用性的看法是积极的。
{"title":"Access Control Policy Misconfiguration Detection in Online Social Networks","authors":"Yousra Javed, Mohamed Shehab","doi":"10.1109/SocialCom.2013.82","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.82","url":null,"abstract":"The ability to stay connected with friends online and share information, has accounted for the popularity of online social networking websites. However, the overwhelming task of access control policy management for information shared on these websites has resulted in various mental models of sharing with a false sense of privacy. The misalignment between a user's intended and actual privacy settings causes access control misconfigurations, raising the risk of unintentional privacy leaks. In this paper, we propose a scheme to extract the user's mental model of sharing, enhance this model using information learned from their existing policies, and enable them to compose misconfiguration free policies. We present the possible misconfiguration patterns based on which we scan the Facebook user's access control policies. We implemented a prototype Facebook application of our scheme and conducted a pilot study using Amazon Mechanical Turk. Our preliminary results show that the users' intended policies were significantly different than their actual policies. Our scheme was able to detect the misconfiguration patterns in album policies. However, the reduction in the number of misconfigurations after using our approach was not significant. Participants' perceptions of our proposed policy misconfiguration patterns and the usability of our scheme was positive.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"65 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132551406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Information Security Risk Management in a World of Services 服务世界中的信息安全风险管理
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.88
V. Lalanne, M. Munier, A. Gabillon
Service Oriented Architectures (SOA) offer new opportunities for the interconnection of systems. However, for a company, opening its Information System to the "world" is not insignificant in terms of security. Whether to use available services or provide its own services, new technologies have introduced new vulnerabilities and therefore new risks. Our work aims to propose an approach for risk management which is based on the ISO/IEC 27005:2011 standard: we propose a development of this standard (by an extension of Annex D) so that it can fully take into account the type "service" as web services and cloud services. Indeed, a world of services is not limited to link interconnected systems, it is more a relationship between customer and supplier, where notions of trust, accountability, trace ability and governance are developed. Following this study we introduce a new security criterion, controllability, to ensure that a company keeps control of its information even if it uses such outsourced services.
面向服务的体系结构(SOA)为系统互连提供了新的机会。然而,对于一个公司来说,将其信息系统向“世界”开放在安全方面并非微不足道。无论是使用现有服务还是提供自己的服务,新技术都引入了新的漏洞,从而带来了新的风险。我们的工作旨在提出一种基于ISO/IEC 27005:2011标准的风险管理方法:我们建议开发该标准(通过扩展附件D),以便它可以充分考虑“服务”类型,如web服务和云服务。事实上,服务的世界并不局限于连接相互连接的系统,它更多的是客户和供应商之间的关系,在这种关系中,信任、责任、可追溯性和治理的概念得到了发展。在这项研究之后,我们引入了一个新的安全标准,可控性,以确保公司即使使用此类外包服务也能保持对其信息的控制。
{"title":"Information Security Risk Management in a World of Services","authors":"V. Lalanne, M. Munier, A. Gabillon","doi":"10.1109/SocialCom.2013.88","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.88","url":null,"abstract":"Service Oriented Architectures (SOA) offer new opportunities for the interconnection of systems. However, for a company, opening its Information System to the \"world\" is not insignificant in terms of security. Whether to use available services or provide its own services, new technologies have introduced new vulnerabilities and therefore new risks. Our work aims to propose an approach for risk management which is based on the ISO/IEC 27005:2011 standard: we propose a development of this standard (by an extension of Annex D) so that it can fully take into account the type \"service\" as web services and cloud services. Indeed, a world of services is not limited to link interconnected systems, it is more a relationship between customer and supplier, where notions of trust, accountability, trace ability and governance are developed. Following this study we introduce a new security criterion, controllability, to ensure that a company keeps control of its information even if it uses such outsourced services.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
"I Like" - Analysing Interactions within Social Networks to Assert the Trustworthiness of Users, Sources and Content “我喜欢”-分析社交网络中的互动,以断言用户,来源和内容的可信度
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.78
Owen Sacco, J. Breslin
Online Social Network platforms provide users to create sensitive personal information such as user profiles that can be shared with other users within their social graph. Whilst these sites provide users with generic privacy settings to control who can be granted access, these platforms assume that all users in a social graph share the same level of trust. Moreover, these platforms also assume that what is shared within the Social Network can be trusted. Therefore, Social Networks do not take into consideration the notion of trust whilst users share or consume information. In this work, we conduct a user study to analyse the trends of interactions amongst users. We also analyse in detail the user's perception of trust whilst interacting within Social Networks. The results from this user study will help us understand how trust values can be asserted for users, sources and content by using information from within Social Networks.
在线社交网络平台为用户提供创建敏感个人信息的功能,例如用户档案,这些信息可以在他们的社交图谱中与其他用户共享。虽然这些网站为用户提供通用的隐私设置,以控制谁可以被授予访问权限,但这些平台假设社交图谱中的所有用户都具有相同的信任水平。此外,这些平台还假定在社交网络中共享的内容是可信的。因此,当用户分享或消费信息时,社交网络没有考虑到信任的概念。在这项工作中,我们进行了一项用户研究,以分析用户之间的交互趋势。我们还详细分析了用户在社交网络中互动时对信任的看法。这项用户研究的结果将帮助我们理解如何通过使用来自社交网络的信息来断言用户、来源和内容的信任值。
{"title":"\"I Like\" - Analysing Interactions within Social Networks to Assert the Trustworthiness of Users, Sources and Content","authors":"Owen Sacco, J. Breslin","doi":"10.1109/SocialCom.2013.78","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.78","url":null,"abstract":"Online Social Network platforms provide users to create sensitive personal information such as user profiles that can be shared with other users within their social graph. Whilst these sites provide users with generic privacy settings to control who can be granted access, these platforms assume that all users in a social graph share the same level of trust. Moreover, these platforms also assume that what is shared within the Social Network can be trusted. Therefore, Social Networks do not take into consideration the notion of trust whilst users share or consume information. In this work, we conduct a user study to analyse the trends of interactions amongst users. We also analyse in detail the user's perception of trust whilst interacting within Social Networks. The results from this user study will help us understand how trust values can be asserted for users, sources and content by using information from within Social Networks.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130776034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How Increased Awareness Can Impact Attitudes and Behaviors toward Online Privacy Protection 提高意识如何影响对网络隐私保护的态度和行为
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.15
Delfina Malandrino, V. Scarano, Raffaele Spinelli
People on the Web are generating and disclosing an ever-increasing amounts of data, often without full awareness of who is recording what about them, and who is aggregating and linking pieces of data with context information, for a variety of purposes. Awareness can help users to be informed about what silently happens during their navigation while learning from disclosure of personal information may help to discriminate potential harmful activities from daily and regular activities that can be performed online. Our main objective is to study whether a highly customized tool can help users to learn the value of privacy from their behaviors and make informed decisions to reduce their degree of exposure. To this aim, we present an evaluation study to analyze general perceptions, attitudes, and beliefs about privacy online, and to explore the resultant behaviors for two different groups of participants from an academic environment. Results show that users from the ICT field (Information and Communication Technology) are less concerned than non-ICT ones (i.e., not technological-oriented students), and that skill and expertise can influence the perception of the risks as well as the corresponding behaviors. Finally, students with less expertise in the ICT field learned more than the others, by showing greater willingness to adopt technologies to protect their privacy online.
Web上的人们正在生成和披露越来越多的数据,通常没有充分意识到是谁在记录关于他们的哪些信息,以及是谁在将数据片段与上下文信息进行聚合和链接,以实现各种目的。意识可以帮助用户了解在浏览过程中悄无声息地发生了什么,而从个人信息的披露中学习可能有助于区分潜在的有害活动和可以在网上进行的日常和常规活动。我们的主要目标是研究一个高度定制的工具是否可以帮助用户从他们的行为中了解隐私的价值,并做出明智的决定来减少他们的暴露程度。为此,我们提出了一项评估研究,分析了关于在线隐私的一般看法、态度和信念,并探讨了来自学术环境的两组不同参与者的结果行为。结果表明,ICT领域的用户(信息通信技术)比非ICT领域的用户(即非技术导向的学生)更不关心,技能和专业知识可以影响风险的感知以及相应的行为。最后,在资讯及通讯科技领域的专业知识较少的学生比其他学生学得更多,表现出更大的意愿采用技术来保护他们的网上隐私。
{"title":"How Increased Awareness Can Impact Attitudes and Behaviors toward Online Privacy Protection","authors":"Delfina Malandrino, V. Scarano, Raffaele Spinelli","doi":"10.1109/SocialCom.2013.15","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.15","url":null,"abstract":"People on the Web are generating and disclosing an ever-increasing amounts of data, often without full awareness of who is recording what about them, and who is aggregating and linking pieces of data with context information, for a variety of purposes. Awareness can help users to be informed about what silently happens during their navigation while learning from disclosure of personal information may help to discriminate potential harmful activities from daily and regular activities that can be performed online. Our main objective is to study whether a highly customized tool can help users to learn the value of privacy from their behaviors and make informed decisions to reduce their degree of exposure. To this aim, we present an evaluation study to analyze general perceptions, attitudes, and beliefs about privacy online, and to explore the resultant behaviors for two different groups of participants from an academic environment. Results show that users from the ICT field (Information and Communication Technology) are less concerned than non-ICT ones (i.e., not technological-oriented students), and that skill and expertise can influence the perception of the risks as well as the corresponding behaviors. Finally, students with less expertise in the ICT field learned more than the others, by showing greater willingness to adopt technologies to protect their privacy online.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"97 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133321335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Finding Participants in a Chat: Authorship Attribution for Conversational Documents 在聊天中寻找参与者:会话文档的作者归属
Pub Date : 2013-09-08 DOI: 10.1109/SOCIALCOM.2013.45
Giacomo Inches, Morgan Harvey, F. Crestani
In this work we study the problem of Authorship Attribution for a novel set of documents, namely online chats. Although the problem of Authorship Attribution has been extensively investigated for different document types, from books to letters and from emails to blog posts, to the best of our knowledge this is the first study of Authorship Attribution for conversational documents (IRC chat logs) using statistical models. We experimentally demonstrate the unsuitability of the classical statistical models for conversational documents and propose a novel approach which is able to achieve a high accuracy rate (up to 95%) for hundreds of authors.
在这项工作中,我们研究了一组新颖文档的作者归属问题,即在线聊天。虽然作者归属的问题已经广泛地研究了不同类型的文档,从书籍到信件,从电子邮件到博客文章,据我们所知,这是第一次使用统计模型研究会话文档(IRC聊天日志)的作者归属。我们通过实验证明了经典统计模型对会话文档的不适用性,并提出了一种能够对数百位作者实现高准确率(高达95%)的新方法。
{"title":"Finding Participants in a Chat: Authorship Attribution for Conversational Documents","authors":"Giacomo Inches, Morgan Harvey, F. Crestani","doi":"10.1109/SOCIALCOM.2013.45","DOIUrl":"https://doi.org/10.1109/SOCIALCOM.2013.45","url":null,"abstract":"In this work we study the problem of Authorship Attribution for a novel set of documents, namely online chats. Although the problem of Authorship Attribution has been extensively investigated for different document types, from books to letters and from emails to blog posts, to the best of our knowledge this is the first study of Authorship Attribution for conversational documents (IRC chat logs) using statistical models. We experimentally demonstrate the unsuitability of the classical statistical models for conversational documents and propose a novel approach which is able to achieve a high accuracy rate (up to 95%) for hundreds of authors.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114500614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Impact of a Non-linear Pay-Off Function on Pairwise Stable Collaborative Oligopolies 非线性回报函数对两两稳定合作寡头的影响
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.112
Shaun Lichter, T. Friesz, C. Griffin
We extend the results of Goyal and Joshi (S. Goyal and S. Joshi. Networks of collaboration in oligopoly. Games and Economic behavior, 43(1):57-85, 2003), who first considered the problem of collaboration networks of oligopolies and showed that under certain linear assumptions network collaboration produced a stable complete graph through selfish competition. We show with nonlinear cost functions and player payoff alteration that stable collaboration graphs with an arbitrary degree sequence can result. We also show a generalized non-linear extension for the result in the aforementioned paper in which the complete graph is stable. An example is provided in which the complete set of pair wise stable collaborations is computed for an oligopoly consisting of five firms.
我们推广了Goyal和Joshi的结果(S. Goyal和S. Joshi)。寡头垄断中的合作网络。博弈论与经济行为,43(1):57-85,2003),他首先考虑了寡头合作网络的问题,并证明了在一定的线性假设下,网络合作通过自私竞争产生稳定的完全图。我们展示了非线性成本函数和玩家收益变化可以产生具有任意度序列的稳定协作图。我们还给出了上述论文中完全图稳定的结果的广义非线性推广。给出了一个例子,其中计算了由五家公司组成的寡头垄断的成对稳定合作的完整集合。
{"title":"Impact of a Non-linear Pay-Off Function on Pairwise Stable Collaborative Oligopolies","authors":"Shaun Lichter, T. Friesz, C. Griffin","doi":"10.1109/SocialCom.2013.112","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.112","url":null,"abstract":"We extend the results of Goyal and Joshi (S. Goyal and S. Joshi. Networks of collaboration in oligopoly. Games and Economic behavior, 43(1):57-85, 2003), who first considered the problem of collaboration networks of oligopolies and showed that under certain linear assumptions network collaboration produced a stable complete graph through selfish competition. We show with nonlinear cost functions and player payoff alteration that stable collaboration graphs with an arbitrary degree sequence can result. We also show a generalized non-linear extension for the result in the aforementioned paper in which the complete graph is stable. An example is provided in which the complete set of pair wise stable collaborations is computed for an oligopoly consisting of five firms.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114969697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Clusterization of Political Tweets Using Kurtosis and Community Duration 基于峰度和社区持续时间的政治推文有效聚类
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.144
Hiroshi Itsuki, H. Matsubara, Kazuki Arita, Kazunari Omi
Exploration of voter opinions is important for policy making. While opinion polls have long played an important role in this process, big data analysis of social media, i.e. "social listening", is becoming important. This is because social listening involves the collection of a huge amount of data on opinions that are transmitted spontaneously by people in real time. The amount is so huge that the data needs to be aggregated and summarized. Graph theory is an effective way of aggregating into groups network structured data collected from social media such as Twitter. However, there are two challenges. One is to combine the groups, i.e. "communities", into clusters because the granularity of the community is too fine for understanding the big picture. The other is to distinguish insignificant clusters from those that contain relevant information. In this paper, we describe a method for community clustering that is based on kurtosis and duration in time series of each community.
了解选民的意见对制定政策很重要。虽然民意调查在这一过程中一直发挥着重要作用,但社交媒体的大数据分析,即“社会倾听”正变得越来越重要。这是因为社交倾听涉及收集大量的意见数据,这些意见是人们实时自发传播的。数量如此之大,需要对数据进行汇总和汇总。图论是将从Twitter等社交媒体收集的网络结构化数据聚合成组的有效方法。然而,有两个挑战。一种是将两组组合起来,即。“社区”,因为社区的粒度太细,无法理解大局。另一种方法是将无关紧要的集群与包含相关信息的集群区分开来。本文描述了一种基于各群落时间序列峰度和持续时间的群落聚类方法。
{"title":"Effective Clusterization of Political Tweets Using Kurtosis and Community Duration","authors":"Hiroshi Itsuki, H. Matsubara, Kazuki Arita, Kazunari Omi","doi":"10.1109/SocialCom.2013.144","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.144","url":null,"abstract":"Exploration of voter opinions is important for policy making. While opinion polls have long played an important role in this process, big data analysis of social media, i.e. \"social listening\", is becoming important. This is because social listening involves the collection of a huge amount of data on opinions that are transmitted spontaneously by people in real time. The amount is so huge that the data needs to be aggregated and summarized. Graph theory is an effective way of aggregating into groups network structured data collected from social media such as Twitter. However, there are two challenges. One is to combine the groups, i.e. \"communities\", into clusters because the granularity of the community is too fine for understanding the big picture. The other is to distinguish insignificant clusters from those that contain relevant information. In this paper, we describe a method for community clustering that is based on kurtosis and duration in time series of each community.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116025747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Dynamic Pricing Game in a Model of New Product Adoption with Social Influence 具有社会影响的新产品采用模型中的动态定价博弈
Pub Date : 2013-09-08 DOI: 10.1109/SOCIALCOM.2013.114
H. Thille, M. Cojocaru, E. Thommes, Dominic Nelson, S. Greenhalgh
We examine a pricing game between firms that produce differentiated products and in which consumer preferences evolve in response to the market shares of the available products. One of the products is new and a subset of consumers (early adopters) have a relatively strong preference for it, while the remaining consumers are influenced by the relative market shares of the two products, being drawn to the product with the higher market share. We use a system of PDEs to specify the evolution of the preferences for the alternative goods. This system is nonlinear due to the influence of existing consumption choice on the distribution of preferences. The pricing game allows firms to react to the changing distribution of consumer preference. We find that allowing for the evolution of consumer preference in this way results in interesting dynamics for prices. In particular, price paths can be non-monotonic over time.
我们研究了生产差异化产品的公司之间的定价博弈,其中消费者偏好随着可用产品的市场份额而变化。其中一种产品是新的,一部分消费者(早期采用者)对它有相对强烈的偏好,而其余的消费者则受到两种产品相对市场份额的影响,被市场份额较高的产品所吸引。我们使用偏微分方程系统来指定对替代商品的偏好演变。由于现有消费选择对偏好分布的影响,该系统是非线性的。定价博弈使企业能够对消费者偏好分布的变化做出反应。我们发现,以这种方式考虑消费者偏好的演变会产生有趣的价格动态。特别是,随着时间的推移,价格路径可能是非单调的。
{"title":"A Dynamic Pricing Game in a Model of New Product Adoption with Social Influence","authors":"H. Thille, M. Cojocaru, E. Thommes, Dominic Nelson, S. Greenhalgh","doi":"10.1109/SOCIALCOM.2013.114","DOIUrl":"https://doi.org/10.1109/SOCIALCOM.2013.114","url":null,"abstract":"We examine a pricing game between firms that produce differentiated products and in which consumer preferences evolve in response to the market shares of the available products. One of the products is new and a subset of consumers (early adopters) have a relatively strong preference for it, while the remaining consumers are influenced by the relative market shares of the two products, being drawn to the product with the higher market share. We use a system of PDEs to specify the evolution of the preferences for the alternative goods. This system is nonlinear due to the influence of existing consumption choice on the distribution of preferences. The pricing game allows firms to react to the changing distribution of consumer preference. We find that allowing for the evolution of consumer preference in this way results in interesting dynamics for prices. In particular, price paths can be non-monotonic over time.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116367842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Measuring Inherent Privacy Concern and Desire for Privacy - A Pilot Survey Study of an Instrument to Measure Dispositional Privacy Concern 测量固有隐私关注和隐私渴望——一种测量性格性隐私关注的工具的试点调查研究
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.73
A. Morton
With the increasing ubiquity and power of technology for collecting, storing, processing and disseminating personal information, a model of privacy concern is required - richer than that provided by existing classifications based on general privacy concern, or measures of concern about organizations' information handling practices. The author has previously proposed a model of users' privacy concerns encompassing: a) general, or inherent, privacy concern, b) environmental influences, and c) organization- and technology-specific attributes. As part of the development of this model, this paper describes a pilot survey study using an online survey instrument (N = 353) and structural equation modeling, to develop a measure of inherent privacy concern: Dispositional Privacy Concern (DPC). Two constructs within DPC were extracted from the survey data: 1) Concern about the Privacy Behavior of Organizations and Governments (CPBOG), and 2) Desire for Privacy (DFP). The study found the two personality metatraits of the Big Five - Stability and Plasticity - were negatively related to CPBOG and DFP, respectively. In turn, CPBOG and DFP were found to be positively related to the Internet Users' Information Privacy Concerns (Malhotra et al., 2004). The paper concludes with a discussion of the study's identification of the CPBOG and DFP constructs, the influence of personality traits on privacy concern, and the implications of the study's findings for research of general privacy concern.
随着收集、存储、处理和传播个人信息的技术日益普及和强大,需要一种隐私关注模型——比现有的基于一般隐私关注的分类或对组织信息处理实践的关注度量提供的模型更丰富。作者之前提出了一个用户隐私关注的模型,包括:a)一般或固有的隐私关注,b)环境影响,以及c)组织和技术特定属性。作为该模型发展的一部分,本文描述了一项使用在线调查工具(N = 353)和结构方程模型的试点调查研究,以开发固有隐私关注的度量:性情隐私关注(DPC)。从调查数据中提取了DPC中的两个结构:1)关注组织和政府的隐私行为(CPBOG), 2)隐私欲望(DFP)。研究发现,大五人格元特征中的稳定性和可塑性分别与CPBOG和DFP呈负相关。反过来,CPBOG和DFP与互联网用户的信息隐私关注呈正相关(Malhotra et al., 2004)。文章最后讨论了本研究对CPBOG和DFP构式的识别、人格特质对隐私关注的影响,以及本研究结果对一般隐私关注研究的启示。
{"title":"Measuring Inherent Privacy Concern and Desire for Privacy - A Pilot Survey Study of an Instrument to Measure Dispositional Privacy Concern","authors":"A. Morton","doi":"10.1109/SocialCom.2013.73","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.73","url":null,"abstract":"With the increasing ubiquity and power of technology for collecting, storing, processing and disseminating personal information, a model of privacy concern is required - richer than that provided by existing classifications based on general privacy concern, or measures of concern about organizations' information handling practices. The author has previously proposed a model of users' privacy concerns encompassing: a) general, or inherent, privacy concern, b) environmental influences, and c) organization- and technology-specific attributes. As part of the development of this model, this paper describes a pilot survey study using an online survey instrument (N = 353) and structural equation modeling, to develop a measure of inherent privacy concern: Dispositional Privacy Concern (DPC). Two constructs within DPC were extracted from the survey data: 1) Concern about the Privacy Behavior of Organizations and Governments (CPBOG), and 2) Desire for Privacy (DFP). The study found the two personality metatraits of the Big Five - Stability and Plasticity - were negatively related to CPBOG and DFP, respectively. In turn, CPBOG and DFP were found to be positively related to the Internet Users' Information Privacy Concerns (Malhotra et al., 2004). The paper concludes with a discussion of the study's identification of the CPBOG and DFP constructs, the influence of personality traits on privacy concern, and the implications of the study's findings for research of general privacy concern.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128371314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
State History Tree: An Incremental Disk-Based Data Structure for Very Large Interval Data 状态历史树:用于超大间隔数据的基于磁盘的增量数据结构
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.107
A. Montplaisir-Goncalves, Naser Ezzati-Jivan, Florian Wininger, M. Dagenais
In this paper, we propose the State History Tree, a disk-based data structure to manage large streaming interval data. The State History Tree provides an efficient way to store interval data on permanent storage with a logarithmic access time. The disk-based structure ensures that extremely large data sets can be accommodated. The State History Tree stores intervals in blocks on disk in a tree organization. Unlike other interval management data structures like R-Trees, our solution avoids re-balancing the nodes, speeding up the tree construction. The proposed method is implemented in Java, and evaluated using large data sets (up to one terabyte). Those data sets were obtained from the state intervals computed from system events traced with the LTTng kernel tracer. The evaluation results demonstrate the performance and efficiency of the method, as compared with other solutions to managing huge interval data sets.
在本文中,我们提出了状态历史树,一种基于磁盘的数据结构来管理大的流间隔数据。状态历史树提供了一种将间隔数据存储在具有对数访问时间的永久存储器上的有效方法。基于磁盘的结构确保可以容纳非常大的数据集。状态历史树将时间间隔以块的形式存储在磁盘上。与其他区间管理数据结构(如R-Trees)不同,我们的解决方案避免了重新平衡节点,从而加快了树的构建。所建议的方法是用Java实现的,并使用大型数据集(高达1tb)进行评估。这些数据集是从ltng内核跟踪器跟踪的系统事件计算的状态间隔中获得的。评价结果证明了该方法的性能和效率,与其他解决方案相比,管理巨大的区间数据集。
{"title":"State History Tree: An Incremental Disk-Based Data Structure for Very Large Interval Data","authors":"A. Montplaisir-Goncalves, Naser Ezzati-Jivan, Florian Wininger, M. Dagenais","doi":"10.1109/SocialCom.2013.107","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.107","url":null,"abstract":"In this paper, we propose the State History Tree, a disk-based data structure to manage large streaming interval data. The State History Tree provides an efficient way to store interval data on permanent storage with a logarithmic access time. The disk-based structure ensures that extremely large data sets can be accommodated. The State History Tree stores intervals in blocks on disk in a tree organization. Unlike other interval management data structures like R-Trees, our solution avoids re-balancing the nodes, speeding up the tree construction. The proposed method is implemented in Java, and evaluated using large data sets (up to one terabyte). Those data sets were obtained from the state intervals computed from system events traced with the LTTng kernel tracer. The evaluation results demonstrate the performance and efficiency of the method, as compared with other solutions to managing huge interval data sets.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128438389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
期刊
2013 International Conference on Social Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1