Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.

Slides:



Advertisements
Similar presentations
Ubiquity of Grey Literature in a Connected Content Context Julia Gelfand University of California, Irvine Paper presented at GL5 Conference.
Advertisements

Information Society Technologies Third Call for Proposals Norbert Brinkhoff-Button DG Information Society European Commission Key action III: Multmedia.
Distributed Advice-Seeking on an Evolving Social Network Dept Computer Science and Software Engineering The University of Melbourne - Australia Golriz.
Near East Plant Protection Network for Regional Cooperation & Knowledge Sharing Food and Agriculture Organization of the United Nations An Overview on.
High Performance Computing Course Notes Grid Computing.
Linking the Fairs to the 2013 Ontario Curriculum Social Studies 1 to 6 and History and Geography 7 and 8.
Xiaowei Ying, Xintao Wu, Daniel Barbara Spectrum based Fraud Detection in Social Networks 1.
Enabling the Social Web Krishna P. Gummadi Networked Systems Group Max Planck Institute for Software Systems.
Network of Excellence in Internet Science 3 rd EINS Summer School Volos, July 2014 Anna Satsiou (CERTH) FP7-ICT EINS Network of Excellence.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Open Workshop on e-Infrastructures, Helsinki October 4 – 5, 2006 Roadmap Parallel Session on last chapter of e-IRG Roadmap: Crossing the Boundaries of.
Funding Networks Abdullah Sevincer University of Nevada, Reno Department of Computer Science & Engineering.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
IMPLEMENTATION OF AN E-LEARNING PLATFORM USING CMS
12 -1 Lecture 12 User Modeling Topics –Basics –Example User Model –Construction of User Models –Updating of User Models –Applications.
Overview of Web Data Mining and Applications Part I
From Information Literacy to Scholarly Identity: Effective Pedagogical Strategies for Social Bookmarking EDUCAUSE 07 - Deborah Everhart, Adjunct Assistant.
Knowledge Management C S R PRABHU BY Deputy Director General
Computational Thinking Related Efforts. CS Principles – Big Ideas  Computing is a creative human activity that engenders innovation and promotes exploration.
Designing the Marketing Channel
Ethics of personalized information filtering Ansgar Koene, Elvira Perez, Christopher J. Carter, Ramona Statache, Svenja Adolphs, Claire O’Malley, Tom Rodden,
CRIS 2012 Input for Topic, PC, Keynote. CRIS 2004: Putting the Sparkle on the Knowledge Society CRIS 2006: Enabling Interaction and Quality: Beyond the.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
1 Use of electronic information resources among the Croatian scientists in the field of social sciences in a pre-digital library environment: obstacles.
The Live Social Semantics. Goals Enhance the social experience of an event – Social networking Integrate – Data from social networking systems – Semantic.
D2.TTO.CL4.12 Slide 1. Subject Elements This unit comprises five Elements: 1.Describe the social and cultural impacts of tourism operations 2.Describe.
Modeling Relationship Strength in Online Social Networks Rongjing Xiang: Purdue University Jennifer Neville: Purdue University Monica Rogati: LinkedIn.
1 Common Challenges Across Scientific Disciplines Laurence Field CERN 18 th November 2013.
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) Joint Workshop and 4 th Plenary Meeting Bologna June 13, 2014.
Social scope: Enabling Information Discovery On Social Content Sites
Using Transactional Information to Predict Link Strength in Online Social Networks Indika Kahanda and Jennifer Neville Purdue University.
DIGITAL COMMUNITIES Chapter Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall.
Web Science Subject Categorization: a proposal for discussion version 0.2 Michalis Vafopoulos 23/9/2010 Curriculum Workshop, University of Southampton.
THOMSON SCIENTIFIC Patricia Brennan Thomson Scientific January 10, 2008.
A.ABDULLAEV, Director of the Public Fund for Support and Development of Print Media and Information Agencies of Uzbekistan.
Network of Excellence in Internet Science Network of Excellence in Internet Science (EINS) 1 st REVIEW Brussels, 12th April 2013 FP7-ICT
Wang-Chien Lee i Pervasive Data Access ( i PDA) Group Pennsylvania State University Mining Social Network Big Data Intelligent.
1 Personalization and Trust Personalization Mass Customization One-to-One Marketing Structure content & navigation to meet the needs of individual users.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Responding to the Unexpected Yigal Arens Paul Rosenbloom Information Sciences Institute University of Southern California.
Collaborative Information Retrieval - Collaborative Filtering systems - Recommender systems - Information Filtering Why do we need CIR? - IR system augmentation.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
1 Innovation in Services Business Service Design and Innovation Fostering the Economic and Legal Framework for Innovation Performance and Development of.
Preventing Private Information Inference Attacks on Social Networks.
BREMEN September 19-21, 2011 European Commission Information Society and Media GaLA Game and Learning Alliance The European Network of Excellence on Serious.
Computational Tools for Population Biology Tanya Berger-Wolf, Computer Science, UIC; Daniel Rubenstein, Ecology and Evolutionary Biology, Princeton; Jared.
Measuring Behavioral Trust in Social Networks
+ Big Data, Network Analysis Week How is date being used Predict Presidential Election - Nate Silver –
Web Information Retrieval Prof. Alessandro Agostini 1 Context in Web Search Steve Lawrence Speaker: Antonella Delmestri IEEE Data Engineering Bulletin.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
The Role of International Standards for National Statistical Offices Andrew Hancock Statistics New Zealand Prepared for 2013 Meeting of the UN Expert Group.
Marketing Research An introduction. Marketing Research Marketing research is a combination of two words i.e marketing and research Marketing is essentially.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Collaboration to Clarify the Costs of Curation CERN Costs Workshop Activities and Approaches to Cost Modelling in the 4C Project 13 – 14 January 2014 Germán.
How to measure the impact of R&D on SD ? Laurence Esterle, MD, PhD Cermes and Ifris France Cyprus, 16 – 17 October L. ESTERLE Linking science and.
University of Malta CSA4080: Topic 7 © Chris Staff 1 of 15 CSA4080: Adaptive Hypertext Systems II Dr. Christopher Staff Department.
Paper Study – Propagation of Trust in E-commerce Communities, and others YuanDa Cao (曹元大), etc. Beijing Institute of Technology Presented by Vincent Dec/2004.
Co-funded by European Commission eContentplus Sharing Practices and Experiences on the Authoring and Adaptation of Open Educational Resources Alexander.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
+ Welcome to PAHO/WHO Sustainable Development and Health Toolkit for the UN Global Conference RIO + 20 Welcome to PAHO/WHO Sustainable Development and.
Wiki Use In Education By Dona Sisk EDUC 8841 Dr. Foley Walden University Spring 2010.
Context-driven Access to Personalized Digital Multimedia Libraries Invited Talk at the 1st International Conference on Digital Libraries New Dehli, India.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
GUILLOU Frederic. Outline Introduction Motivations The basic recommendation system First phase : semantic similarities Second phase : communities Application.
Research on Knowledge Element Relation and Knowledge Service for Agricultural Literature Resource Xie nengfu; Sun wei and Zhang xuefu 3rd April 2017.
Dieudo Mulamba November 2017
Privacy Through Anonymous Connection and Browsing
Introduction of KNS55 Platform
ROLE OF «electronic virtual enhanced research-engaged student teams» WEB PORTAL IN SOLUTION OF PROBLEM OF COLLABORATION INTERNATIONAL TEAMS INSIDE ONE.
Presentation transcript:

Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos

Evolution of the on-line social networks research field in WWW conf. series until 2005 the papers are few (1 to 3 per year) increase of scientific interest from 2006, when online social networks are recognized as an autonomous track numbers keep rising: 28 in WWW2010 In WWW2011 out of 90 regular papers 12 contained the term “social” in their title 18 out of 89 posters were classified in “Social Systems and Graph Analysis” Frequency of papers on social networks in WWW conferences in the period

Web Science Subject Categorization* E.Web Society E.2 Social Engagement and Social Science E.2.1 Social networks E.2.7 Virtual communities, groups and identity E.6 Politics and Governance E.6.2 Policy and Regulation E Privacy E Trust E Security 3 * “The Web Science Subject Categorization (WSSC) system aims to facilitate communication and collaboration among scholars of the Web from various perspectives i.e. computational, mathematical, social, economic and legal”

Our categorisation Social Engagement and Social Science ◦ Social networks  Web as a Complex System  Systems, Social structures and processes  Technologies used ◦ Virtual communities, groups and identity (Personalisation / Adaptation)  Social interaction and behaviour  Information propagation  Social interest discovery, personalisation  Community structure, evolution Politics and Governance Policy and Regulation (Security, Privacy, Trust)  User anonymization  Groups and mixed user profiles  Collective privacy management  User Reputation 4

How we worked… an example In degree Out degree

Social Networks See the Web as a Complex System: ◦ Graphs Systems, Social structures and processes ◦ Network applications Technologies used ◦ Services, Games 6

Social Networks

Virtual communities, groups and identity Social interaction and behaviour -relation between a person’s social interactions and personal behavior -Positive / Negative links Information propagation -how quickly does information propagate -how widely does information propagate in the social network -what is the role of word-of-mouth exchanges between friends in the overall propagation of information in the network. Social interest discovery, personalisation Community structure, evolution -discovering and processing some of the community characteristics in order to predict their future evolution 8

Virtual communities, groups and identity Profile / Group based Behaviour based Collaboration based Implicit Explicit Hybrid

Security, Privacy, Trust User anonymization has to do with identifying security and privacy in on-line social networks and how this ensures, that the users are protected by malicious targeted attacks. Groups and mixed user profiles attacks that exploit the user groups with mixed profiles, in an effort to predict the users’ sensitive private attributes. Collective privacy management data that do not necessarily belong to the users that publish them. Privacy wizard Solutions and models that help users to describe their preferences and define their privacy settings automatically. User Reputation 10

11 Security, Privacy, Trust

12 Relevancy between E.2.1/E.2.7 and E.6.2

Graph Statistics 222 papers from which 104 and 31 concern categories E.2.1/E.2.7 and E % on the total papers are isolated nodes on average, each node is connected to two other nodes generally, most nodes have low in/out degree 13 there are links with papers from almost all other tracks! high efficiency in information exchanging (network’s efficiency value was 0.5)

Generic Conclusions Number of research efforts in social networks is still increasing Existing problems become more intense and new arise as on- line users’ numbers increase The topic of security and privacy seems to gain ground for now Almost all other web topics are affected as well as other science fields Semantic web research / semi-automatic information organisation can benefit from the study of social networks Verify relations and weights between already established categorisations / semantic networks, or even exploit new ones (by graph clustering) 14

Future work explore in detail network’s structure and evolution by including data from other sources / network graphs examine the graph association of a specific topic with other topics (below an example from WWW conf. series) 15 Connections of E.6.2 with other topics: black  E.6.2 grey  other

Thank you …!!! Questions ???

Specific Conclusions Social networking services fail to provide users the necessary protection and users tend to compromise their privacy neglecting necessary precautions Community structure and activities within the communities have become more and more complicated but if studied can provide valuable information about human behavior and interaction Similarity measurement among user profiles could be exploited in marketing methods and undergoing semantic web research 17