2,862 research outputs found
On the Feasibility of Social Network-based Pollution Sensing in ITSs
Intense vehicular traffic is recognized as a global societal problem, with a
multifaceted influence on the quality of life of a person. Intelligent
Transportation Systems (ITS) can play an important role in combating such
problem, decreasing pollution levels and, consequently, their negative effects.
One of the goals of ITSs, in fact, is that of controlling traffic flows,
measuring traffic states, providing vehicles with routes that globally pursue
low pollution conditions. How such systems measure and enforce given traffic
states has been at the center of multiple research efforts in the past few
years. Although many different solutions have been proposed, very limited
effort has been devoted to exploring the potential of social network analysis
in such context. Social networks, in general, provide direct feedback from
people and, as such, potentially very valuable information. A post that tells,
for example, how a person feels about pollution at a given time in a given
location, could be put to good use by an environment aware ITS aiming at
minimizing contaminant emissions in residential areas. This work verifies the
feasibility of using pollution related social network feeds into ITS
operations. In particular, it concentrates on understanding how reliable such
information is, producing an analysis that confronts over 1,500,000 posts and
pollution data obtained from on-the- field sensors over a one-year span.Comment: 10 pages, 15 figures, Transaction Forma
What Trends in Chinese Social Media
There has been a tremendous rise in the growth of online social networks all
over the world in recent times. While some networks like Twitter and Facebook
have been well documented, the popular Chinese microblogging social network
Sina Weibo has not been studied. In this work, we examine the key topics that
trend on Sina Weibo and contrast them with our observations on Twitter. We find
that there is a vast difference in the content shared in China, when compared
to a global social network such as Twitter. In China, the trends are created
almost entirely due to retweets of media content such as jokes, images and
videos, whereas on Twitter, the trends tend to have more to do with current
global events and news stories
An Empirical Study on Android for Saving Non-shared Data on Public Storage
With millions of apps that can be downloaded from official or third-party
market, Android has become one of the most popular mobile platforms today.
These apps help people in all kinds of ways and thus have access to lots of
user's data that in general fall into three categories: sensitive data, data to
be shared with other apps, and non-sensitive data not to be shared with others.
For the first and second type of data, Android has provided very good storage
models: an app's private sensitive data are saved to its private folder that
can only be access by the app itself, and the data to be shared are saved to
public storage (either the external SD card or the emulated SD card area on
internal FLASH memory). But for the last type, i.e., an app's non-sensitive and
non-shared data, there is a big problem in Android's current storage model
which essentially encourages an app to save its non-sensitive data to shared
public storage that can be accessed by other apps. At first glance, it seems no
problem to do so, as those data are non-sensitive after all, but it implicitly
assumes that app developers could correctly identify all sensitive data and
prevent all possible information leakage from private-but-non-sensitive data.
In this paper, we will demonstrate that this is an invalid assumption with a
thorough survey on information leaks of those apps that had followed Android's
recommended storage model for non-sensitive data. Our studies showed that
highly sensitive information from billions of users can be easily hacked by
exploiting the mentioned problematic storage model. Although our empirical
studies are based on a limited set of apps, the identified problems are never
isolated or accidental bugs of those apps being investigated. On the contrary,
the problem is rooted from the vulnerable storage model recommended by Android.
To mitigate the threat, we also propose a defense framework
False News On Social Media: A Data-Driven Survey
In the past few years, the research community has dedicated growing interest
to the issue of false news circulating on social networks. The widespread
attention on detecting and characterizing false news has been motivated by
considerable backlashes of this threat against the real world. As a matter of
fact, social media platforms exhibit peculiar characteristics, with respect to
traditional news outlets, which have been particularly favorable to the
proliferation of deceptive information. They also present unique challenges for
all kind of potential interventions on the subject. As this issue becomes of
global concern, it is also gaining more attention in academia. The aim of this
survey is to offer a comprehensive study on the recent advances in terms of
detection, characterization and mitigation of false news that propagate on
social media, as well as the challenges and the open questions that await
future research on the field. We use a data-driven approach, focusing on a
classification of the features that are used in each study to characterize
false information and on the datasets used for instructing classification
methods. At the end of the survey, we highlight emerging approaches that look
most promising for addressing false news
- …