首页 > 最新文献

2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)最新文献

英文 中文
The role of organization hierarchy in technology adoption at the workplace 组织层级在工作场所技术采用中的作用
C. Chelmis, V. Prasanna
Popular social networking sites have revolutionized the way people interact on the Web, enabling rapid information dissemination and search. In an enterprise, understanding how information flows within and between organizational levels and business units is of great importance. Despite numerous studies in information diffusion in online social networks, little is known about factors that affect the dynamics of technological adoption at the workplace. Here, we address this problem, by examining the impact of organizational hierarchy in adopting new technologies in the enterprise. Our study suggests that middle-level managers are more successful in influencing employees into adopting a new microblogging service. Further, we reveal two distinct patterns of peer pressure, based on which employees are not only more likely to adopt the service, but the rate at which they do so quickens as the popularity of the new technology increases. We integrate our findings into two intuitive, realistic agent-based computational models that capture the dynamics of adoption at both microscopic and macroscopic levels. We evaluate our models in a real-world dataset we collected from a multinational Fortune 500 company. Prediction results show that our models provide great improvements over commonly used diffusion models. Our findings provide significant insights to managers seeking to realize the dynamics of adoption of new technologies in their company, and could assist in designing better strategies for rapid and efficient technology adoption and information dissemination at the workplace.
流行的社交网站彻底改变了人们在网络上的互动方式,使信息的快速传播和搜索成为可能。在企业中,了解信息如何在组织级别和业务单元内部和之间流动是非常重要的。尽管对在线社交网络中的信息扩散进行了大量研究,但对影响工作场所技术采用动态的因素知之甚少。在这里,我们通过研究在企业中采用新技术时组织层次结构的影响来解决这个问题。我们的研究表明,中层管理者在影响员工采用新的微博服务方面更成功。此外,我们还揭示了同伴压力的两种不同模式,基于这种模式,员工不仅更有可能采用这项服务,而且随着新技术的普及,他们采用这项服务的速度也会加快。我们将我们的发现整合到两个直观的、现实的基于主体的计算模型中,这些模型在微观和宏观层面捕捉了采用的动态。我们用从一家财富500强跨国公司收集的真实数据集来评估我们的模型。预测结果表明,我们的模型比常用的扩散模型有很大的改进。我们的研究结果为寻求实现公司新技术采用动态的管理人员提供了重要的见解,并且可以帮助设计更好的战略,以便在工作场所快速有效地采用技术和信息传播。
{"title":"The role of organization hierarchy in technology adoption at the workplace","authors":"C. Chelmis, V. Prasanna","doi":"10.1145/2492517.2492566","DOIUrl":"https://doi.org/10.1145/2492517.2492566","url":null,"abstract":"Popular social networking sites have revolutionized the way people interact on the Web, enabling rapid information dissemination and search. In an enterprise, understanding how information flows within and between organizational levels and business units is of great importance. Despite numerous studies in information diffusion in online social networks, little is known about factors that affect the dynamics of technological adoption at the workplace. Here, we address this problem, by examining the impact of organizational hierarchy in adopting new technologies in the enterprise. Our study suggests that middle-level managers are more successful in influencing employees into adopting a new microblogging service. Further, we reveal two distinct patterns of peer pressure, based on which employees are not only more likely to adopt the service, but the rate at which they do so quickens as the popularity of the new technology increases. We integrate our findings into two intuitive, realistic agent-based computational models that capture the dynamics of adoption at both microscopic and macroscopic levels. We evaluate our models in a real-world dataset we collected from a multinational Fortune 500 company. Prediction results show that our models provide great improvements over commonly used diffusion models. Our findings provide significant insights to managers seeking to realize the dynamics of adoption of new technologies in their company, and could assist in designing better strategies for rapid and efficient technology adoption and information dissemination at the workplace.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129683819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Exploring friend's influence in cultures in Twitter 在推特上探索朋友对文化的影响
Anika Gupta, K. Sycara, Geoffrey J. Gordon, Ahmed S. Hefny
What does a user do when he logs in to the Twitter website? Does he merely browse through the tweets of all his friends as a source of information for his own tweets, or does he simply tweet a message of his own personal interest? Does he skim through the tweets of all his friends or only of a selected few? A number of factors might influence a user in these decisions. Does this social influence vary across cultures? In our work, we propose a simple yet effective model to predict the behavior of a user - in terms of which hashtag or named entity he might include in his future tweets. We have approached the problem as a classification task with the various influences contributing as features. Further, we analyze the contribution of the weights of the different features. Using our model we analyze data from different cultures and discover interesting differences in social influence.
当用户登录到Twitter网站时,他会做什么?他只是浏览他所有朋友的推文,作为他自己推文的信息来源,还是他只是发一条他个人感兴趣的消息?他是浏览所有朋友的推文,还是只浏览少数几个?许多因素可能会影响用户做出这些决定。这种社会影响是否因文化而异?在我们的工作中,我们提出了一个简单而有效的模型来预测用户的行为——根据他在未来的推文中可能包含的标签或命名实体。我们把这个问题作为一个分类任务来处理,其中各种影响作为特征。进一步,我们分析了不同特征权重的贡献。使用我们的模型,我们分析来自不同文化的数据,发现社会影响的有趣差异。
{"title":"Exploring friend's influence in cultures in Twitter","authors":"Anika Gupta, K. Sycara, Geoffrey J. Gordon, Ahmed S. Hefny","doi":"10.1145/2492517.2492549","DOIUrl":"https://doi.org/10.1145/2492517.2492549","url":null,"abstract":"What does a user do when he logs in to the Twitter website? Does he merely browse through the tweets of all his friends as a source of information for his own tweets, or does he simply tweet a message of his own personal interest? Does he skim through the tweets of all his friends or only of a selected few? A number of factors might influence a user in these decisions. Does this social influence vary across cultures? In our work, we propose a simple yet effective model to predict the behavior of a user - in terms of which hashtag or named entity he might include in his future tweets. We have approached the problem as a classification task with the various influences contributing as features. Further, we analyze the contribution of the weights of the different features. Using our model we analyze data from different cultures and discover interesting differences in social influence.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"15 3-4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127521425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On the use of mobility data for discovery and description of social ties 利用流动数据发现和描述社会关系
Mitra Baratchi, N. Meratnia, P. Havinga
Ever-increasing emergence of location-aware ubiquitous devices has facilitated collection of time-stamped mobility data. This large volume of data not only provides trajectory information but also information about social interaction between individuals. Unlike trajectory representation and discovery, discovery of social ties and interactions hidden in mobility data has not yet been fully explored. To identify such interaction, social network analysis has been recently used. However, compared with data from emails, phone calls, and messages, which are commonly used for social network analysis, mobility data convey less information about interaction between entities. Therefore, identifying the type of tie between two entities using only mobility data is a great challenge. In this paper, we propose a method for measuring the strength and type of social ties between people only based on their spatio-temporal correlations. Using mutual information metric, we propose utilization of two types of measures for identifying the purpose of being in a certain location. Our experimental results using a location-aware sensing device show that our method can identify different social ties between various entities successfully.
越来越多的位置感知无处不在的设备的出现促进了时间戳移动数据的收集。大量的数据不仅提供了轨迹信息,还提供了个体之间社会互动的信息。与轨迹表示和发现不同,隐藏在移动数据中的社会联系和互动的发现尚未得到充分探索。为了确定这种相互作用,最近使用了社会网络分析。然而,与通常用于社交网络分析的电子邮件、电话和消息数据相比,移动数据传达的实体之间交互的信息较少。因此,仅使用移动性数据来识别两个实体之间的联系类型是一个巨大的挑战。在本文中,我们提出了一种仅基于时空相关性来衡量人与人之间社会联系强度和类型的方法。利用互信息度量,我们建议利用两种类型的度量来确定在某个位置的目的。使用位置感知传感装置的实验结果表明,我们的方法可以成功地识别不同实体之间的不同社会关系。
{"title":"On the use of mobility data for discovery and description of social ties","authors":"Mitra Baratchi, N. Meratnia, P. Havinga","doi":"10.1145/2492517.2500263","DOIUrl":"https://doi.org/10.1145/2492517.2500263","url":null,"abstract":"Ever-increasing emergence of location-aware ubiquitous devices has facilitated collection of time-stamped mobility data. This large volume of data not only provides trajectory information but also information about social interaction between individuals. Unlike trajectory representation and discovery, discovery of social ties and interactions hidden in mobility data has not yet been fully explored. To identify such interaction, social network analysis has been recently used. However, compared with data from emails, phone calls, and messages, which are commonly used for social network analysis, mobility data convey less information about interaction between entities. Therefore, identifying the type of tie between two entities using only mobility data is a great challenge. In this paper, we propose a method for measuring the strength and type of social ties between people only based on their spatio-temporal correlations. Using mutual information metric, we propose utilization of two types of measures for identifying the purpose of being in a certain location. Our experimental results using a location-aware sensing device show that our method can identify different social ties between various entities successfully.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131942346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Which crime features are important for criminal network members? 哪些犯罪特征对犯罪网络成员来说是重要的?
Fatih Özgül, Z. Erdem
Most of the criminals choose each other to commit crime together. They choose each other based on their similarity or need for particular skills and expertise. Research shows that some features of crime and criminals are important for their decisions to commit crime together. Co-offending history of criminals and similarity of hometown and kinship between criminals are important. Choice of crime location, time and similarity of crime committing methods between criminals are other important factors. To see which crime features are important for committing crime together, two data sets which contain thousands of crimes and hundreds of criminals records, are tested for which features are the most important for criminal network members to work together.
大多数罪犯互相选择一起犯罪。他们根据彼此的相似性或对特定技能和专业知识的需求来选择对方。研究表明,犯罪分子和罪犯的某些特征对他们共同犯罪的决定很重要。罪犯的共同犯罪历史、同乡和亲属关系是重要的。犯罪地点的选择、犯罪时间的选择以及犯罪分子之间犯罪方式的相似性也是其他重要因素。为了了解哪些犯罪特征对于共同作案是重要的,我们测试了两个包含数千起犯罪和数百起犯罪记录的数据集,以确定哪些特征对犯罪网络成员共同作案是最重要的。
{"title":"Which crime features are important for criminal network members?","authors":"Fatih Özgül, Z. Erdem","doi":"10.1145/2492517.2500319","DOIUrl":"https://doi.org/10.1145/2492517.2500319","url":null,"abstract":"Most of the criminals choose each other to commit crime together. They choose each other based on their similarity or need for particular skills and expertise. Research shows that some features of crime and criminals are important for their decisions to commit crime together. Co-offending history of criminals and similarity of hometown and kinship between criminals are important. Choice of crime location, time and similarity of crime committing methods between criminals are other important factors. To see which crime features are important for committing crime together, two data sets which contain thousands of crimes and hundreds of criminals records, are tested for which features are the most important for criminal network members to work together.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127944885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analyzing the scalability of a social network of agents 分析代理社会网络的可扩展性
Mohammad Moshirpour, Shimaa M. El-Sherif, R. Alhajj, B. Far
Social networks are ever-growing systems by inheritance. The increase in the number nodes in these systems often brings forth the need to add additional functionalities. However due to the distributed nature of social networks, system growth can be a challenging task. Therefore scalability of the system is of vital importance in the design of social networks. This research attempts to establish a comprehensive framework for analysis and validation of requirements and design documents for software systems. In previous work, we applied this framework to analyze the requirements of a social network of agents; expressed using scenario-based specifications. Scenarios are appealing because of their expressive power and simplicity. Moreover due to the clear and concise notation of scenarios, they can be used to analyze the system requirements for general validity, lack of deadlock, and existence of emergent behavior. In this paper a methodology to analyze the scalability of social networks is presented. This methodology is devised to indicate whether or not the new requirements of the system are consistent with the current requirements in place. A larger prototype of a social network of MSA for semantic search is utilized to illustrate the developed methodology.
社交网络是不断增长的继承系统。随着这些系统中节点数量的增加,通常需要添加额外的功能。然而,由于社交网络的分布式特性,系统增长可能是一项具有挑战性的任务。因此,在社交网络的设计中,系统的可扩展性是至关重要的。本研究试图为软件系统的需求和设计文档的分析和验证建立一个全面的框架。在之前的工作中,我们应用该框架来分析代理社会网络的需求;使用基于场景的规范表示。场景因其表现力和简单性而具有吸引力。此外,由于场景的符号清晰而简洁,它们可以用于分析系统对一般有效性、缺乏死锁和存在紧急行为的需求。本文提出了一种分析社交网络可扩展性的方法。设计此方法是为了指示系统的新需求是否与现有的需求一致。一个更大的用于语义搜索的MSA社会网络原型被用来说明所开发的方法。
{"title":"Analyzing the scalability of a social network of agents","authors":"Mohammad Moshirpour, Shimaa M. El-Sherif, R. Alhajj, B. Far","doi":"10.1145/2492517.2492571","DOIUrl":"https://doi.org/10.1145/2492517.2492571","url":null,"abstract":"Social networks are ever-growing systems by inheritance. The increase in the number nodes in these systems often brings forth the need to add additional functionalities. However due to the distributed nature of social networks, system growth can be a challenging task. Therefore scalability of the system is of vital importance in the design of social networks. This research attempts to establish a comprehensive framework for analysis and validation of requirements and design documents for software systems. In previous work, we applied this framework to analyze the requirements of a social network of agents; expressed using scenario-based specifications. Scenarios are appealing because of their expressive power and simplicity. Moreover due to the clear and concise notation of scenarios, they can be used to analyze the system requirements for general validity, lack of deadlock, and existence of emergent behavior. In this paper a methodology to analyze the scalability of social networks is presented. This methodology is devised to indicate whether or not the new requirements of the system are consistent with the current requirements in place. A larger prototype of a social network of MSA for semantic search is utilized to illustrate the developed methodology.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131621748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
I act, therefore I judge: Network sentiment dynamics based on user activity change 我行动,因此我判断:基于用户活动变化的网络情绪动态
Kathy Macropol, Petko Bogdanov, Ambuj K. Singh, L. Petzold, Xifeng Yan
The study of influence, persuasion, and user sentiment dynamics within online communities has recently emerged as a highly active area of research. In this paper, we focus on analyzing and modeling user sentiment dynamics within a real-world social media such as Twitter. Beyond text and connectivity, we are interested in exploring the level of topical user posting activity and its effect on sentiment change. We perform topic-wise analysis of tweeting behavior that reveals a strong relationship between users' activity acceleration and topic sentiment change. Inspired by this empirical observation, we develop a new generative and predictive model that extends classical neighborhood-based influence propagation with the notion of user activation. We fit the parameters of our model to a large, real-world Twitter dataset and evaluate its utility to predict future sentiment change. Our model outperforms significantly (1 order of magnitude in accuracy) existing alternatives in identifying the individuals who are most likely to change sentiment based on past information. When predicting the next sentiment of users who actually change their opinion (a relatively rare event), our model is twice more accurate than alternatives, while its overall network accuracy is 94% on average. We also study the effect of inactive users on consensus efficiency in the opinion dynamics process both analytically and in simulation within the context of our model.
对网络社区中影响力、说服力和用户情绪动态的研究最近成为一个非常活跃的研究领域。在本文中,我们专注于分析和建模现实世界社交媒体(如Twitter)中的用户情绪动态。除了文本和连接性,我们感兴趣的是探索主题用户发布活动的水平及其对情绪变化的影响。我们对推文行为进行了主题分析,揭示了用户活动加速和主题情绪变化之间的密切关系。受这一经验观察的启发,我们开发了一种新的生成和预测模型,该模型扩展了经典的基于用户激活的基于社区的影响传播。我们将模型的参数拟合到一个大型的、真实的Twitter数据集,并评估其在预测未来情绪变化方面的效用。我们的模型在识别最有可能根据过去的信息改变情绪的个体方面,明显优于现有的替代方案(准确性提高了1个数量级)。当预测用户的下一个情绪时,他们实际上改变了他们的观点(一个相对罕见的事件),我们的模型比其他选择准确两倍,而它的整体网络准确率平均为94%。我们还研究了不活跃用户对意见动态过程中共识效率的影响,分析和模拟我们的模型。
{"title":"I act, therefore I judge: Network sentiment dynamics based on user activity change","authors":"Kathy Macropol, Petko Bogdanov, Ambuj K. Singh, L. Petzold, Xifeng Yan","doi":"10.1145/2492517.2492623","DOIUrl":"https://doi.org/10.1145/2492517.2492623","url":null,"abstract":"The study of influence, persuasion, and user sentiment dynamics within online communities has recently emerged as a highly active area of research. In this paper, we focus on analyzing and modeling user sentiment dynamics within a real-world social media such as Twitter. Beyond text and connectivity, we are interested in exploring the level of topical user posting activity and its effect on sentiment change. We perform topic-wise analysis of tweeting behavior that reveals a strong relationship between users' activity acceleration and topic sentiment change. Inspired by this empirical observation, we develop a new generative and predictive model that extends classical neighborhood-based influence propagation with the notion of user activation. We fit the parameters of our model to a large, real-world Twitter dataset and evaluate its utility to predict future sentiment change. Our model outperforms significantly (1 order of magnitude in accuracy) existing alternatives in identifying the individuals who are most likely to change sentiment based on past information. When predicting the next sentiment of users who actually change their opinion (a relatively rare event), our model is twice more accurate than alternatives, while its overall network accuracy is 94% on average. We also study the effect of inactive users on consensus efficiency in the opinion dynamics process both analytically and in simulation within the context of our model.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129297277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Measurement and understanding of Cyberlocker URL-sharing sites: Focus on movie files 对Cyberlocker url共享站点的测量和理解:以电影文件为重点
Mengjuan Liu, Zhuo Zhang, P. Hui, Yujie Qin, S. Kulkarni
Recently, Cyberlocker services have gained great popularity in the file-sharing market. Driven by tremendous benefits a large number of files such as popular movies are uploaded to Cyberlockers. We explore the profit chain of file-sharing networks based on Cyberlockers and find that an important issue is how to collect the download URLs of popular files stored at different Cyberlockers and share them with public users. In this paper, we focus on these sites collecting and sharing the Cyberlocker URLs of movies, called Cyberlocker URL-sharing sites. First, we extract 1,587 URL-sharing sites based on 31,525 valid pages returned by Google search and demonstrate that the quality distribution of these sites follows a power-law. Second, we analyze the link citations among URL-sharing sites and build the directed link citation graph. By characterizing basic metrics of the graph, such as cited strength and in/out-degree, we understand the structure of URL-sharing sites in depth. Furthermore, we discover that Cyberlocker URLs can be disseminated dynamically through crawler mechanisms among different sites, and highlight the implications of such metrics in this context. Additionally, we study the security risks of 1,587 URL-sharing sites. The results show that security risks do exist when surfing 155 suspicious URL-sharing sites such as myrls.me and rapid4me.com although the majority sites (90.23%) are safe. Finally, some preliminary suggestions are discussed from the industry point of view for how to improve the effectiveness of searching, collecting and disseminating Cyberlocker URLs. To the best of our knowledge, this is the first work on the measurement and understanding of Cyberlocker URL-sharing sites.
最近,Cyberlocker服务在文件共享市场上大受欢迎。在巨大利益的驱动下,大量的文件,如流行电影上传到cyberlocker。我们探索了基于cyberlocker的文件共享网络的利润链,发现如何收集存储在不同cyberlocker上的热门文件的下载url并与公众用户共享是一个重要的问题。本文主要针对这些网站收集并共享电影的Cyberlocker网址,称为Cyberlocker网址共享网站。首先,我们从Google搜索返回的31,525个有效页面中提取了1,587个url共享站点,并证明了这些站点的质量分布遵循幂律。其次,对url共享站点间的链接引用进行分析,构建有向链接引用图。通过描述图表的基本指标,如引用强度和进出度,我们深入了解了url共享网站的结构。此外,我们发现Cyberlocker url可以通过爬虫机制在不同站点之间动态传播,并强调了这种情况下此类指标的含义。此外,我们还研究了1587个url共享站点的安全风险。结果表明,在浏览155个可疑的url共享网站(如myrls)时,确实存在安全风险。Me和rapid4me.com,尽管大多数网站(90.23%)是安全的。最后,从行业的角度对如何提高Cyberlocker url的搜索、收集和传播效率提出了一些初步建议。据我们所知,这是对Cyberlocker网址共享网站进行测量和理解的第一项工作。
{"title":"Measurement and understanding of Cyberlocker URL-sharing sites: Focus on movie files","authors":"Mengjuan Liu, Zhuo Zhang, P. Hui, Yujie Qin, S. Kulkarni","doi":"10.1145/2492517.2500303","DOIUrl":"https://doi.org/10.1145/2492517.2500303","url":null,"abstract":"Recently, Cyberlocker services have gained great popularity in the file-sharing market. Driven by tremendous benefits a large number of files such as popular movies are uploaded to Cyberlockers. We explore the profit chain of file-sharing networks based on Cyberlockers and find that an important issue is how to collect the download URLs of popular files stored at different Cyberlockers and share them with public users. In this paper, we focus on these sites collecting and sharing the Cyberlocker URLs of movies, called Cyberlocker URL-sharing sites. First, we extract 1,587 URL-sharing sites based on 31,525 valid pages returned by Google search and demonstrate that the quality distribution of these sites follows a power-law. Second, we analyze the link citations among URL-sharing sites and build the directed link citation graph. By characterizing basic metrics of the graph, such as cited strength and in/out-degree, we understand the structure of URL-sharing sites in depth. Furthermore, we discover that Cyberlocker URLs can be disseminated dynamically through crawler mechanisms among different sites, and highlight the implications of such metrics in this context. Additionally, we study the security risks of 1,587 URL-sharing sites. The results show that security risks do exist when surfing 155 suspicious URL-sharing sites such as myrls.me and rapid4me.com although the majority sites (90.23%) are safe. Finally, some preliminary suggestions are discussed from the industry point of view for how to improve the effectiveness of searching, collecting and disseminating Cyberlocker URLs. To the best of our knowledge, this is the first work on the measurement and understanding of Cyberlocker URL-sharing sites.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126613377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Shallow parsing for recognizing threats in Dutch tweets 浅层解析识别荷兰语推文中的威胁
Nelleke Oostdijk, H. V. Halteren
In this paper, we investigate the recognition of threats in Dutch tweets. As tweets often display irregular grammatical form and deviant orthography, analysis by standard means is problematic. Therefore, we have implemented a new shallow parsing mechanism which is driven by handcrafted rules. Experimental results are encouraging, with an F-measure of about 40% on a random sample of Dutch tweets. Moreover, the error analysis shows some clear avenues for further improvement.
在本文中,我们研究了荷兰语推文中的威胁识别。由于推文经常显示不规则的语法形式和偏离正字法,用标准方法分析是有问题的。因此,我们实现了一种新的浅层解析机制,它由手工制作的规则驱动。实验结果令人鼓舞,在随机抽取的荷兰推文样本中,f值约为40%。此外,误差分析还为进一步改进提供了明确的途径。
{"title":"Shallow parsing for recognizing threats in Dutch tweets","authors":"Nelleke Oostdijk, H. V. Halteren","doi":"10.1145/2492517.2500271","DOIUrl":"https://doi.org/10.1145/2492517.2500271","url":null,"abstract":"In this paper, we investigate the recognition of threats in Dutch tweets. As tweets often display irregular grammatical form and deviant orthography, analysis by standard means is problematic. Therefore, we have implemented a new shallow parsing mechanism which is driven by handcrafted rules. Experimental results are encouraging, with an F-measure of about 40% on a random sample of Dutch tweets. Moreover, the error analysis shows some clear avenues for further improvement.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126729961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Detecting changes in content and posting time distributions in social media 检测社交媒体内容和发布时间分布的变化
Kazumi Saito, K. Ohara, M. Kimura, H. Motoda
We address a problem of detecting changes in information posted to social media taking both content and posting time distributions into account. To this end, we introduce a generative model consisting of two components, one for a content distribution and the other for a timing distribution, approximating the shape of the parameter change by a series of step functions. We then propose an efficient algorithm to detect change points by maximizing the likelihood of generating the observed sequence data, which has time complexity almost proportional to the length of observed sequence (possible change points). We experimentally evaluate the method on synthetic data streams and demonstrate the importance of considering both distributions to improve the accuracy. We, further, apply our method to real scoring stream data extracted from a Japanese word-of-mouth communication site for cosmetics and show that it can detect change points and the detected parameter change patterns are interpretable through an in-depth investigation of actual reviews.
我们解决了检测发布到社交媒体上的信息变化的问题,同时考虑了内容和发布时间分布。为此,我们引入了一个由两部分组成的生成模型,一个用于内容分布,另一个用于时间分布,通过一系列阶跃函数近似参数变化的形状。然后,我们提出了一种有效的算法,通过最大化产生观测序列数据的可能性来检测变化点,该算法的时间复杂度几乎与观测序列(可能的变化点)的长度成正比。我们在合成数据流上对该方法进行了实验评估,并证明了考虑两种分布对提高准确性的重要性。我们进一步将我们的方法应用于从日本化妆品口碑传播网站中提取的真实评分流数据,并表明它可以检测到变化点,并且通过对实际评论的深入调查可以解释检测到的参数变化模式。
{"title":"Detecting changes in content and posting time distributions in social media","authors":"Kazumi Saito, K. Ohara, M. Kimura, H. Motoda","doi":"10.1145/2492517.2492618","DOIUrl":"https://doi.org/10.1145/2492517.2492618","url":null,"abstract":"We address a problem of detecting changes in information posted to social media taking both content and posting time distributions into account. To this end, we introduce a generative model consisting of two components, one for a content distribution and the other for a timing distribution, approximating the shape of the parameter change by a series of step functions. We then propose an efficient algorithm to detect change points by maximizing the likelihood of generating the observed sequence data, which has time complexity almost proportional to the length of observed sequence (possible change points). We experimentally evaluate the method on synthetic data streams and demonstrate the importance of considering both distributions to improve the accuracy. We, further, apply our method to real scoring stream data extracted from a Japanese word-of-mouth communication site for cosmetics and show that it can detect change points and the detected parameter change patterns are interpretable through an in-depth investigation of actual reviews.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120884318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Community detection in social networks through similarity virtual networks 基于相似虚拟网络的社交网络社区检测
Kanna AlFalahi, Yacine Atif, S. Harous
Smart marketing models could utilize communities within the social Web to target advertisements. However, providing accurate community partitions in a reasonable time is challenging for current online large-scale social networks. In this paper, we propose an approach to enhance community detection in online social networks using node similarity techniques. We apply these techniques on unweighted social networks to detect community structure. Our proposed approach creates a virtual network based on the original social network. Virtual edges are added during this pre-processing step based on nodes' similarity in the original social network. Hence, a virtual link is established between any two similar nodes. Then the landmark CNM algorithm is applied on the generated virtual network to detect communities. This approach, labelled Similarity-CNM is expected to further maximize the quality of the inferred communities in terms of modularity and detection speed. Our experimental evaluation study asserts these gains, which accuracy is supported by a study based on Normalized Mutual Information Measure to determine how similar are the actual communities in the original network and the ones found by the proposed approach in this paper.
聪明的营销模式可以利用社交网络中的社区来定位广告。然而,在合理的时间内提供准确的社区分区对于当前的在线大型社交网络来说是一个挑战。在本文中,我们提出了一种使用节点相似度技术来增强在线社交网络中的社区检测的方法。我们将这些技术应用于非加权社交网络来检测社区结构。我们提出的方法是在原始社交网络的基础上创建一个虚拟网络。在这一预处理步骤中,根据原始社会网络中节点的相似度添加虚拟边。因此,在任意两个相似的节点之间建立虚连接。然后在生成的虚拟网络上应用地标性CNM算法进行社区检测。这种被称为相似性- cnm的方法有望在模块化和检测速度方面进一步提高推断社区的质量。我们的实验评估研究证实了这些增益,其准确性得到了基于标准化互信息度量的研究的支持,该研究用于确定原始网络中实际社区与本文提出的方法发现的社区的相似程度。
{"title":"Community detection in social networks through similarity virtual networks","authors":"Kanna AlFalahi, Yacine Atif, S. Harous","doi":"10.1145/2492517.2500299","DOIUrl":"https://doi.org/10.1145/2492517.2500299","url":null,"abstract":"Smart marketing models could utilize communities within the social Web to target advertisements. However, providing accurate community partitions in a reasonable time is challenging for current online large-scale social networks. In this paper, we propose an approach to enhance community detection in online social networks using node similarity techniques. We apply these techniques on unweighted social networks to detect community structure. Our proposed approach creates a virtual network based on the original social network. Virtual edges are added during this pre-processing step based on nodes' similarity in the original social network. Hence, a virtual link is established between any two similar nodes. Then the landmark CNM algorithm is applied on the generated virtual network to detect communities. This approach, labelled Similarity-CNM is expected to further maximize the quality of the inferred communities in terms of modularity and detection speed. Our experimental evaluation study asserts these gains, which accuracy is supported by a study based on Normalized Mutual Information Measure to determine how similar are the actual communities in the original network and the ones found by the proposed approach in this paper.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124926990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1