10,798 research outputs found
Organizational Chart Inference
Nowadays, to facilitate the communication and cooperation among employees, a
new family of online social networks has been adopted in many companies, which
are called the "enterprise social networks" (ESNs). ESNs can provide employees
with various professional services to help them deal with daily work issues.
Meanwhile, employees in companies are usually organized into different
hierarchies according to the relative ranks of their positions. The company
internal management structure can be outlined with the organizational chart
visually, which is normally confidential to the public out of the privacy and
security concerns. In this paper, we want to study the IOC (Inference of
Organizational Chart) problem to identify company internal organizational chart
based on the heterogeneous online ESN launched in it. IOC is very challenging
to address as, to guarantee smooth operations, the internal organizational
charts of companies need to meet certain structural requirements (about its
depth and width). To solve the IOC problem, a novel unsupervised method Create
(ChArT REcovEr) is proposed in this paper, which consists of 3 steps: (1)
social stratification of ESN users into different social classes, (2)
supervision link inference from managers to subordinates, and (3) consecutive
social classes matching to prune the redundant supervision links. Extensive
experiments conducted on real-world online ESN dataset demonstrate that Create
can perform very well in addressing the IOC problem.Comment: 10 pages, 9 figures, 1 table. The paper is accepted by KDD 201
Solutions to Detect and Analyze Online Radicalization : A Survey
Online Radicalization (also called Cyber-Terrorism or Extremism or
Cyber-Racism or Cyber- Hate) is widespread and has become a major and growing
concern to the society, governments and law enforcement agencies around the
world. Research shows that various platforms on the Internet (low barrier to
publish content, allows anonymity, provides exposure to millions of users and a
potential of a very quick and widespread diffusion of message) such as YouTube
(a popular video sharing website), Twitter (an online micro-blogging service),
Facebook (a popular social networking website), online discussion forums and
blogosphere are being misused for malicious intent. Such platforms are being
used to form hate groups, racist communities, spread extremist agenda, incite
anger or violence, promote radicalization, recruit members and create virtual
organi- zations and communities. Automatic detection of online radicalization
is a technically challenging problem because of the vast amount of the data,
unstructured and noisy user-generated content, dynamically changing content and
adversary behavior. There are several solutions proposed in the literature
aiming to combat and counter cyber-hate and cyber-extremism. In this survey, we
review solutions to detect and analyze online radicalization. We review 40
papers published at 12 venues from June 2003 to November 2011. We present a
novel classification scheme to classify these papers. We analyze these
techniques, perform trend analysis, discuss limitations of existing techniques
and find out research gaps
Recommended from our members
A Cultural Criminology of ‘New’ Jihad: Insights from Propaganda Magazines
The backgrounds and modus operandi of more recent jihadi terrorists tend to share factors and characteristics more typically associated with non-political violence such as mass- killings and gang violence. Their attacks, moreover, seem to have been precipitated not by the direct instructions of a formal hierarchy but by the encouragement of propaganda produced and disseminated by networked, media-savvy terrorist groups. It is necessary to explain how these ‘recruitment’ efforts work. Cultural criminology with its understanding of the relationship between mediated meaning and individual experience, can provide such an analysis. The paper presents a qualitative document analysis of 32 propaganda magazines produced by the Islamic State and Al-Qaeda. It demonstrates that they contain significantly more than religious rhetoric and military strategy. Rather, they are part of a process that crystalizes a jihadi subculture that appeals to disaffected and/or marginalized, excitement- seeking youths. The magazines cultivate violence by constructing a militarized style that celebrates outlaw status, where violence is eroticized and aestheticized. They idealize the notion of a jihadi terrorist that is tough and willing to commit brutal violence. The lifestyle portrayed offers the possibility of heroism, excitement, belonging and imminent fame, themes often espoused by conventional, Western consumer culture. The magazines occasionally draw on street jargon, urban music, fashion, films and video games. The subcultural model of jihadi propaganda we explicate provides a novel way of understanding terrorist recruiting tactics and motivations that are not necessarily in opposition to contemporary conventional criminal and ‘mainstream’ cultures, but in resonance with them
Weak nodes detection in urban transport systems: Planning for resilience in Singapore
The availability of massive data-sets describing human mobility offers the
possibility to design simulation tools to monitor and improve the resilience of
transport systems in response to traumatic events such as natural and man-made
disasters (e.g. floods terroristic attacks, etc...). In this perspective, we
propose ACHILLES, an application to model people's movements in a given
transport system mode through a multiplex network representation based on
mobility data. ACHILLES is a web-based application which provides an
easy-to-use interface to explore the mobility fluxes and the connectivity of
every urban zone in a city, as well as to visualize changes in the transport
system resulting from the addition or removal of transport modes, urban zones,
and single stops. Notably, our application allows the user to assess the
overall resilience of the transport network by identifying its weakest node,
i.e. Urban Achilles Heel, with reference to the ancient Greek mythology. To
demonstrate the impact of ACHILLES for humanitarian aid we consider its
application to a real-world scenario by exploring human mobility in Singapore
in response to flood prevention.Comment: 9 pages, 6 figures, IEEE Data Science and Advanced Analytic
- …