Offense: Planetary-Scale Views on a Large Instant Messaging Network J. Leskovec, et al.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 6: Meeting People Online.
Advertisements

Presented by: Kim Kay and Delicia Lewis Sponsored by:
EFFECTIVE LEARNING MANAGEMENT
Cyberbullying When good technology goes bad…….. Stay safe in cyberspace.
Jure Leskovec Joint work with Eric Horvitz, Microsoft Research.
Safe Online Talk. Today’s Objective To be able to describe positive aspects of online talking and messaging, and to identify situations in which flirting.
Theoretical Probability Distributions We have talked about the idea of frequency distributions as a way to see what is happening with our data. We have.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
UNDERSTANDING VISIBLE AND LATENT INTERACTIONS IN ONLINE SOCIAL NETWORK Presented by: Nisha Ranga Under guidance of : Prof. Augustin Chaintreau.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 IM Analysis Shruti.
Lecture 2: Thu, Jan 16 Hypothesis Testing – Introduction (Ch 11)
Measurement and Analysis of Online Social Networks By Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, Bobby Bhattacharjee Attacked.
Defense: Knowledge Sharing and Yahoo Answers: Everyone Knows Something L. A. Adamic, et al.
Ostra: Leveraging trust to thwart unwanted communication A. Mislove, et al. Offense - Marcel Flores.
Consumers on the Web: Identification of usage patterns Consumers on the Web: Identification of usage patterns by Nina Koiso-Kanttila
Evaluate potential limitations with current foodborne illness source attribution estimates obtained from outbreak reports. Neal Golden, Ph.D. January 31.
Presented by Eroika Jeniffer.  What are we going to learn? - the use of chat in classroom - the most likely application on chat. And many more….. So,
Application Layer. Applications A program or group of programs designed for end users. A program or group of programs designed for end users. Software.
Starter for 10 Unit 7: Using Messenger Transform IT SFT07_messenger.
Measurement and Evolution of Online Social Networks Review of paper by Ophir Gaathon Analysis of Social Information Networks COMS , Spring 2011,
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
English Comprehension and Composition – Lecture 25 Objectives: What is an ? Basics of an Tips for Writing Effective s.
Sources of Long-run Growth
Networking I Chapter II The Internet. How does one Connect? Dial-Up Connection – Modem ISDN – Integrated Services Digital Network DSL – Digital Subscriber.
Cs423-cotter1 P2P Discovering P2P (Miller) Internet.
Internet...? Definition: The Internet is millions of computers around the world connected to each other. Explanation: When you're on the Internet, your.
Video: SNL Clip Quick Facts Online teens admit that they frequently communicate with people they have never met. – 54% have Instant Messaged a stranger.
Using IChat Instant Messaging Software Dean McKinney Greater St. Albert Catholic Schools January, 2006.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
Anti- bullying week Year 4.
Cyber Bullying A guide for parents understanding the “hidden” bully.
Jure Leskovec Joint work with Eric Horvitz, Microsoft Research.
Jure Leskovec, CMU Eric Horwitz, Microsoft Research.
Procedures for reviewing and/or editing an article Role of the members of the editorial board in the reviewing process:. 1.Role of the editor in chief.
Mrs. Kinsler’s Class.  With a table partner, make a list of some of the things you do on the Internet.  Be ready to share your list with the class!
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
8 1 ADVANCED COMMUNICATION TOOLS Using Chat, Virtual Worlds, and Newsgroups New Perspectives on THE INTERNET.
1D-Star Network. D-Star call sign terminology The terminology is from the viewpoint of the communication link! “MyCall” is really YOUR call sign; that.
What curriculum areas does this resource cover? The main focus of this resource is aiming to educate students between a foundation and year 2 level in.
By: Brenna Langham. Netiquette: Some Basic Rules Be careful of the words chosen when writing a statement for others to read! The other person might misinterpret.
Choosing an Instant Messenger Would you like to send Instant Messages, but aren’t sure which tool to use? Here’s help to decide. Skip to Main Menu.
THE DIGITAL DIVIDE. What is the digital divide? The digital divide refers to the inequalities in opportunities between individuals households, businesses.
ONLINE COMMUNICATION 2 Lesson 5. Starter  How has online communication changed the way in which we communicate?  How has online communication affected.
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
Microsoft Instant Messenger Communication Network How does the world communicate? Jure Leskovec Machine Learning Department
Internet Safety. Let’s Take Questions First! ● On your notecard, please write down 1- 2 questions you have regarding internet safety.
LPM – Unit 1 L 4 Socialising on the internet. How do you keep in contact with your friends and family? List all of the different types of technology.
By: Sabrina Rodriguez. A computer network is a collection of computers and devices connected by communication channels. A computer network is a group.
Overview of the IWB Research. The IWB Research Literature: Is overwhelmingly positive about their potential. Primarily based on the views of teachers.
Communicating on the Internet Technology Literacy Mr. Whipple.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Julie Latham Digital Citizenship: An Informational Guide.
AUTISM YOU ARE REQUIRED TO KNOW ONE DEVELOPMENTAL ISSUE THAT AFFECTS A CHILD'S DEVELOPMENT. WE LOOK AT AUTISM AS YOU CAN ALSO USE IT AS A KEY ISSUE FOR.
By:miguel iturrade.  A computer network is a group of computers that are connected to each other for the purpose of communication.
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
What is ?? A simple introduction. Ground mail You write a letter and mail it. It goes by truck, airplane, or boat. Mail goes to one special mailbox.
Presentation on “Technology used by university student”
Measuring User Influence in Twitter: The Million Follower Fallacy Meeyoung Cha Hamed Haddadi Fabricio Benevenuto Krishna P. Gummadi.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
Guide By Phoebi Stewart. has changed the way we communicate with each other. Being able to send information quickly across the internet.
ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts Internet Slang Internet SlangInternet SlangInternet Slang Internet Slang Internet SlangInternet.
Routers and Redundancy
Routers and Redundancy
What is instant messaging?
Fix AOL Mail GAH Error Call AOL Support
Relationship between Current, Voltage, and Resistance
CYBER- BULLYING.
Communicators iCAN personal goals Milepost 2 Milepost 3.
COMPUTER SAFTEY IS IMPORTANT….
Presentation transcript:

Offense: Planetary-Scale Views on a Large Instant Messaging Network J. Leskovec, et al.

As a whole…  Provides a strong analysis  Considers a variety of approaches  However, it falls prey to a number of critical pitfalls  Provides a strong analysis  Considers a variety of approaches  However, it falls prey to a number of critical pitfalls

The Data Set  Only includes data from MSN Messenger  Other networks may have different usage patterns  Paper suggests MSN accounts for ~50% at the time (seems to be correct)  Each network could draw an entirely different type of user (CompuServe vs. AOL)  What about spam/bots?  Are these a relevant portion?  Only includes data from MSN Messenger  Other networks may have different usage patterns  Paper suggests MSN accounts for ~50% at the time (seems to be correct)  Each network could draw an entirely different type of user (CompuServe vs. AOL)  What about spam/bots?  Are these a relevant portion?

Communication Demographics  Only look at ages 10-60, to correct for any misrepresented ages  Any theoretical backing?  Conversations depend only on number of messages  What about non-symmetric conversations? (one user sending messages, another not replying)  Only look at ages 10-60, to correct for any misrepresented ages  Any theoretical backing?  Conversations depend only on number of messages  What about non-symmetric conversations? (one user sending messages, another not replying)

World Geography and Communication  Show us distribution of MSN users by World population  What does this really tell us?  Better to instead look per capita to computer users?  Perhaps internet use?  Would take into account areas where no one is on the internet and therefore not on MSN  Show us distribution of MSN users by World population  What does this really tell us?  Better to instead look per capita to computer users?  Perhaps internet use?  Would take into account areas where no one is on the internet and therefore not on MSN

The Communication Network  Only consider those who communicated during time period  A limitation of the data set  Doesn’t acknowledge the possibility of large amounts of potential links that were just not active during the month  Really need a larger data set to deal with this  Only consider those who communicated during time period  A limitation of the data set  Doesn’t acknowledge the possibility of large amounts of potential links that were just not active during the month  Really need a larger data set to deal with this

Milgram  Data is not actually comparable to Milgram’s!  Milgram focused on drawing connections with a letter  These connections are more incidental (based around some sort of social network, but are not “focused” in the same way)  Many people may be “on a first name basis” with someone, but just not normally talk to them  Data is not actually comparable to Milgram’s!  Milgram focused on drawing connections with a letter  These connections are more incidental (based around some sort of social network, but are not “focused” in the same way)  Many people may be “on a first name basis” with someone, but just not normally talk to them

Milgram  Temporally incomparability  This data relies only on 1 month of communication  In Milgram’s study, people could use anyone that they knew on a first name basis  A whole lifetime!  Implication: MSN may be much better connected than these results show!  Temporally incomparability  This data relies only on 1 month of communication  In Milgram’s study, people could use anyone that they knew on a first name basis  A whole lifetime!  Implication: MSN may be much better connected than these results show!

A Purpose?  All this information is good to know  But what can we really do with it?  Generally speaking, seems people use it as an extension of their real world networks  Experiment like this unable to describe any motivation, which would be helpful  All this information is good to know  But what can we really do with it?  Generally speaking, seems people use it as an extension of their real world networks  Experiment like this unable to describe any motivation, which would be helpful