190 research outputs found
A Comprehensive Bibliometric Analysis on Social Network Anonymization: Current Approaches and Future Directions
In recent decades, social network anonymization has become a crucial research
field due to its pivotal role in preserving users' privacy. However, the high
diversity of approaches introduced in relevant studies poses a challenge to
gaining a profound understanding of the field. In response to this, the current
study presents an exhaustive and well-structured bibliometric analysis of the
social network anonymization field. To begin our research, related studies from
the period of 2007-2022 were collected from the Scopus Database then
pre-processed. Following this, the VOSviewer was used to visualize the network
of authors' keywords. Subsequently, extensive statistical and network analyses
were performed to identify the most prominent keywords and trending topics.
Additionally, the application of co-word analysis through SciMAT and the
Alluvial diagram allowed us to explore the themes of social network
anonymization and scrutinize their evolution over time. These analyses
culminated in an innovative taxonomy of the existing approaches and
anticipation of potential trends in this domain. To the best of our knowledge,
this is the first bibliometric analysis in the social network anonymization
field, which offers a deeper understanding of the current state and an
insightful roadmap for future research in this domain.Comment: 73 pages, 28 figure
Influence maximization in the presence of vulnerable nodes: A ratio perspective
Influence maximization is a key problem seeking to identify users who will diffuse information to influence the largest number of other users in a social network. A drawback of the influence maximization problem is that it could be socially irresponsible to influence users many of whom would be harmed, due to their demographics, health conditions, or socioeconomic characteristics (e.g., predominantly overweight people influenced to buy junk food). Motivated by this drawback and by the fact that some of these vulnerable users will be influenced inadvertently, we introduce the problem of finding a set of users (seeds) that limits the influence to vulnerable users while maximizing the influence to the non-vulnerable users. We define a measure that captures the quality of a set of seeds as an additively smoothed ratio (ASR) between the expected number of influenced non-vulnerable users and the expected number of influenced vulnerable users. Then, we develop methods which aim to find a set of seeds that maximizes the measure: greedy heuristics, an approximation algorithm, as well as several variations of the approximation algorithm. We evaluate our methods on synthetic and real-world datasets and demonstrate they substantially outperform a state-of-the-art competitor in terms of both effectiveness and efficiency. We also demonstrate that the variations of our approximation algorithm offer different trade-offs between effectiveness and efficiency
Google matrix analysis of directed networks
In past ten years, modern societies developed enormous communication and
social networks. Their classification and information retrieval processing
become a formidable task for the society. Due to the rapid growth of World Wide
Web, social and communication networks, new mathematical methods have been
invented to characterize the properties of these networks on a more detailed
and precise level. Various search engines are essentially using such methods.
It is highly important to develop new tools to classify and rank enormous
amount of network information in a way adapted to internal network structures
and characteristics. This review describes the Google matrix analysis of
directed complex networks demonstrating its efficiency on various examples
including World Wide Web, Wikipedia, software architecture, world trade, social
and citation networks, brain neural networks, DNA sequences and Ulam networks.
The analytical and numerical matrix methods used in this analysis originate
from the fields of Markov chains, quantum chaos and Random Matrix theory.Comment: 56 pages, 58 figures. Missed link added in network example of Fig3
Identifying Influential Agents In Social Systems
This dissertation addresses the problem of influence maximization in social networks. In- fluence maximization is applicable to many types of real-world problems, including modeling contagion, technology adoption, and viral marketing. Here we examine an advertisement domain in which the overarching goal is to find the influential nodes in a social network, based on the network structure and the interactions, as targets of advertisement. The assumption is that advertisement budget limits prevent us from sending the advertisement to everybody in the network. Therefore, a wise selection of the people can be beneficial in increasing the product adoption. To model these social systems, agent-based modeling, a powerful tool for the study of phenomena that are difficult to observe within the confines of the laboratory, is used. To analyze marketing scenarios, this dissertation proposes a new method for propagating information through a social system and demonstrates how it can be used to develop a product advertisement strategy in a simulated market. We consider the desire of agents toward purchasing an item as a random variable and solve the influence maximization problem in steady state using an optimization method to assign the advertisement of available products to appropriate messenger agents. Our market simulation 1) accounts for the effects of group membership on agent attitudes 2) has a network structure that is similar to realistic human systems 3) models inter-product preference correlations that can be learned from market data. The results on synthetic data show that this method is significantly better than network analysis methods based on centrality measures. The optimized influence maximization (OIM) described above, has some limitations. For instance, it relies on a global estimation of the interaction among agents in the network, rendering it incapable of handling large networks. Although OIM is capable of finding the influential nodes in the social network in an optimized way and targeting them for advertising, in large networks, performing the matrix operations required to find the optimized solution is intractable. To overcome this limitation, we then propose a hierarchical influence maximization (HIM) iii algorithm for scaling influence maximization to larger networks. In the hierarchical method the network is partitioned into multiple smaller networks that can be solved exactly with optimization techniques, assuming a generalized IC model, to identify a candidate set of seed nodes. The candidate nodes are used to create a distance-preserving abstract version of the network that maintains an aggregate influence model between partitions. The budget limitation for the advertising dictates the algorithm’s stopping point. On synthetic datasets, we show that our method comes close to the optimal node selection, at substantially lower runtime costs. We present results from applying the HIM algorithm to real-world datasets collected from social media sites with large numbers of users (Epinions, SlashDot, and WikiVote) and compare it with two benchmarks, PMIA and DegreeDiscount, to examine the scalability and performance. Our experimental results reveal that HIM scales to larger networks but is outperformed by degreebased algorithms in highly-connected networks. However, HIM performs well in modular networks where the communities are clearly separable with small number of cross-community edges. This finding suggests that for practical applications it is useful to account for network properties when selecting an influence maximization method
Measures of Privacy Protection on Social Environments
Tesis por compendio[EN] Nowadays, online social networks (OSNs) have become a mainstream cultural phenomenon for millions of Internet users. Social networks are an ideal environment for
generating all kinds of social benefits for users. Users share experiences, keep in touch
with their family, friends and acquaintances, and earn economic benefits from the
power of their influence (which is translated into new job opportunities). However,
the use of social networks and the action of sharing information imply the loss of the
users’ privacy.
Recently, a great interest in protecting the privacy of users has emerged. This situation
has been due to documented cases of regrets in users’ actions, company scandals produced by misuse of personal information, and the biases introduced by privacy mechanisms. Social network providers have included improvements in their systems to reduce
users’ privacy risks; for example, restricting privacy policies by default, adding new privacy settings, and designing quick and easy shortcuts to configure user privacy settings.
In the privacy researcher area, new advances are proposed to improve privacy mechanisms, most of them focused on automation, fine-grained systems, and the usage of
features extracted from the user’s profile information and interactions to recommend
the best privacy policy for the user. Despite these advances, many studies have shown
that users’ concern for privacy does not match the decisions they ultimately make in
social networks. This misalignment in the users’ behavior might be due to the complexity of the privacy concept itself. This drawback causes users to disregard privacy risks,
or perceive them as temporarily distant. Another cause of users’ behavior misalignment might be due to the complexity of the privacy decision-making process. This is
because users should consider all possible scenarios and the factors involved (e.g., the
number of friends, the relationship type, the context of the information, etc.) to make
an appropriate privacy decision.
The main contributions of this thesis are the development of metrics to assess privacy
risks, and the proposal of explainable privacy mechanisms (using the developed metrics) to assist and raise awareness among users during the privacy decision process.
Based on the definition of the concept of privacy, the dimensions of information scope
and information sensitivity have been considered in this thesis to assess privacy risks.
For explainable privacy mechanisms, soft paternalism techniques and gamification elements that make use of the proposed metrics have been designed. These mechanisms
have been integrated into the social network PESEDIA and evaluated in experiments
with real users. PESEDIA is a social network developed in the framework of the Master’s
thesis of the Ph.D. student [15], this thesis, and the national projects “Privacy in Social Educational Environments during Childhood and Adolescence” (TIN2014-55206-
R) and “Intelligent Agents for Privacy Advice in Social Networks” (TIN2017-89156-R).
The findings confirm the validity of the proposed metrics for computing the users’ scope
and the sensitivity of social network publications. For the scope metric, the results also
showed the possibility of estimating it through local and social centrality metrics for
scenarios with limited information access. For the sensitivity metric, the results also
remarked the users’ misalignment for some information types and the consensus for a
majority of them. The usage of these metrics as part of messages about potential consequences of privacy policy choices and information sharing actions to users showed
positive effects on users’ behavior regarding privacy. Furthermore, the findings of exploring the users’ trade-off between costs and benefits during disclosure actions of personal information showed significant relationships with the usual social circles (family
members, friends, coworkers, and unknown users) and their properties. This allowed
designing better privacy mechanisms that appropriately restrict access to information and reduce regrets. Finally, gamification elements applied to social networks and
users’ privacy showed a positive effect on the users’ behavior towards privacy and safe
practices in social networks.[ES] En la actualidad, las redes sociales se han convertido en un fenómeno cultural dominante para millones de usuarios de Internet. Las redes sociales son un entorno ideal
para la generación de todo tipo de beneficios sociales para los usuarios. Los usuarios
comparten experiencias, mantienen el contacto con sus familiares, amigos y conocidos,
y obtienen beneficios económicos gracias al poder de su influencia (lo que se traduce en
nuevas oportunidades de trabajo). Sin embargo, el uso de las redes sociales y la acción
de compartir información implica la perdida de la privacidad de los usuarios.
Recientemente ha emergido un gran interés en proteger la privacidad de los usuarios. Esta situación se ha debido a los casos de arrepentimientos documentados en las
acciones de los usuarios, escándalos empresariales producidos por usos indebidos de
la información personal, y a los sesgos que introducen los mecanismos de privacidad.
Los proveedores de redes sociales han incluido mejoras en sus sistemas para reducir los
riesgos en privacidad de los usuarios; por ejemplo, restringiendo las políticas de privacidad por defecto, añadiendo nuevos elementos de configuración de la privacidad, y
diseñando accesos fáciles y directos para configurar la privacidad de los usuarios. En el
campo de la investigación de la privacidad, nuevos avances se proponen para mejorar
los mecanismos de privacidad la mayoría centrados en la automatización, selección de
grano fino, y uso de características extraídas de la información y sus interacciones para
recomendar la mejor política de privacidad para el usuario. A pesar de estos avances,
muchos estudios han demostrado que la preocupación de los usuarios por la privacidad no se corresponde con las decisiones que finalmente toman en las redes sociales.
Este desajuste en el comportamiento de los usuarios podría deberse a la complejidad
del propio concepto de privacidad. Este inconveniente hace que los usuarios ignoren
los riesgos de privacidad, o los perciban como temporalmente distantes. Otra causa
del desajuste en el comportamiento de los usuarios podría deberse a la complejidad
del proceso de toma de decisiones sobre la privacidad. Esto se debe a que los usuarios
deben considerar todos los escenarios posibles y los factores involucrados (por ejemplo, el número de amigos, el tipo de relación, el contexto de la información, etc.) para
tomar una decisión apropiada sobre la privacidad.
Las principales contribuciones de esta tesis son el desarrollo de métricas para evaluar los riesgos de privacidad, y la propuesta de mecanismos de privacidad explicables
(haciendo uso de las métricas desarrolladas) para asistir y concienciar a los usuarios
durante el proceso de decisión sobre la privacidad. Atendiendo a la definición del
concepto de la privacidad, las dimensiones del alcance de la información y la sensibilidad de la información se han considerado en esta tesis para evaluar los riesgos de privacidad. En cuanto a los mecanismos de privacidad explicables, se han diseñado utilizando técnicas de paternalismo blando y elementos de gamificación que hacen uso de
las métricas propuestas. Estos mecanismos se han integrado en la red social PESEDIA
y evaluado en experimentos con usuarios reales. PESEDIA es una red social desarrollada en el marco de la tesina de Master del doctorando [15], esta tesis y los proyectos
nacionales “Privacidad en Entornos Sociales Educativos durante la Infancia y la Adolescencia” (TIN2014-55206-R) y “Agentes inteligentes para asesorar en privacidad en
redes sociales” (TIN2017-89156-R).
Los resultados confirman la validez de las métricas propuestas para calcular el alcance
de los usuarios y la sensibilidad de las publicaciones de las redes sociales. En cuanto
a la métrica del alcance, los resultados también mostraron la posibilidad de estimarla
mediante métricas de centralidad local y social para escenarios con acceso limitado a
la información. En cuanto a la métrica de sensibilidad, los resultados también pusieron
de manifiesto la falta de concordancia de los usuarios en el caso de algunos tipos de información y el consenso en el caso de la mayoría de ellos. El uso de estas métricas como
parte de los mensajes sobre las posibles consecuencias de las opciones de política de
privacidad y las acciones de intercambio de información a los usuarios mostró efectos
positivos en el comportamiento de los usuarios con respecto a la privacidad. Además,
los resultados de la exploración de la compensación de los usuarios entre los costos y
los beneficios durante las acciones de divulgación de información personal mostraron
relaciones significativas con los círculos sociales habituales (familiares, amigos, compañeros de trabajo y usuarios desconocidos) y sus propiedades. Esto permitió diseñar
mejores mecanismos de privacidad que restringen adecuadamente el acceso a la información y reducen los arrepentimientos. Por último, los elementos de gamificación
aplicados a las redes sociales y a la privacidad de los usuarios mostraron un efecto positivo en el comportamiento de los usuarios hacia la privacidad y las prácticas seguras
en las redes sociales.[CA] En l’actualitat, les xarxes socials s’han convertit en un fenomen cultural dominant per
a milions d’usuaris d’Internet. Les xarxes socials són un entorn ideal per a la generació
de tota mena de beneficis socials per als usuaris. Els usuaris comparteixen experiències, mantenen el contacte amb els seus familiars, amics i coneguts, i obtenen beneficis
econòmics gràcies al poder de la seva influència (el que es tradueix en noves oportunitats de treball). No obstant això, l’ús de les xarxes socials i l’acció de compartir
informació implica la perduda de la privacitat dels usuaris.
Recentment ha emergit un gran interès per protegir la privacitat dels usuaris. Aquesta
situació s’ha degut als casos de penediments documentats en les accions dels usuaris,
escàndols empresarials produïts per usos indeguts de la informació personal, i als caires
que introdueixen els mecanismes de privacitat. Els proveïdors de xarxes socials han inclòs millores en els seus sistemes per a reduir els riscos en privacitat dels usuaris; per exemple, restringint les polítiques de privacitat per defecte, afegint nous elements de configuració de la privacitat, i dissenyant accessos fàcils i directes per a configurar la privacitat dels usuaris. En el camp de la recerca de la privacitat, nous avanços es proposen
per a millorar els mecanismes de privacitat la majoria centrats en l’automatització,
selecció de gra fi, i ús de característiques extretes de la informació i les seues interaccions per a recomanar la millor política de privacitat per a l’usuari. Malgrat aquests
avanços, molts estudis han demostrat que la preocupació dels usuaris per la privacitat
no es correspon amb les decisions que finalment prenen en les xarxes socials. Aquesta
desalineació en el comportament dels usuaris podria deure’s a la complexitat del propi
concepte de privacitat. Aquest inconvenient fa que els usuaris ignorin els riscos de privacitat, o els percebin com temporalment distants. Una altra causa de la desalineació
en el comportament dels usuaris podria deure’s a la complexitat del procés de presa de
decisions sobre la privacitat. Això es deu al fet que els usuaris han de considerar tots
els escenaris possibles i els factors involucrats (per exemple, el nombre d’amics, el tipus
de relació, el context de la informació, etc.) per a prendre una decisió apropiada sobre
la privacitat.
Les principals contribucions d’aquesta tesi són el desenvolupament de mètriques per a
avaluar els riscos de privacitat, i la proposta de mecanismes de privacitat explicables
(fent ús de les mètriques desenvolupades) per a assistir i conscienciar als usuaris durant
el procés de decisió sobre la privacitat. Atesa la definició del concepte de la privacitat,
les dimensions de l’abast de la informació i la sensibilitat de la informació s’han considerat en aquesta tesi per a avaluar els riscos de privacitat. Respecte als mecanismes
de privacitat explicables, aquests s’han dissenyat utilitzant tècniques de paternalisme bla i elements de gamificació que fan ús de les mètriques propostes. Aquests mecanismes s’han integrat en la xarxa social PESEDIA i avaluat en experiments amb usuaris
reals. PESEDIA és una xarxa social desenvolupada en el marc de la tesina de Màster del
doctorant [15], aquesta tesi i els projectes nacionals “Privacitat en Entorns Socials Educatius durant la Infància i l’Adolescència” (TIN2014-55206-R) i “Agents Intel·ligents
per a assessorar en Privacitat en xarxes socials” (TIN2017-89156-R).
Els resultats confirmen la validesa de les mètriques propostes per a calcular l’abast de
les accions dels usuaris i la sensibilitat de les publicacions de les xarxes socials. Respecte a la mètrica de l’abast, els resultats també van mostrar la possibilitat d’estimarla mitjançant mètriques de centralitat local i social per a escenaris amb accés limitat
a la informació. Respecte a la mètrica de sensibilitat, els resultats també van posar
de manifest la falta de concordança dels usuaris en el cas d’alguns tipus d’informació
i el consens en el cas de la majoria d’ells. L’ús d’aquestes mètriques com a part dels
missatges sobre les possibles conseqüències de les opcions de política de privacitat i les
accions d’intercanvi d’informació als usuaris va mostrar efectes positius en el comportament dels usuaris respecte a la privacitat. A més, els resultats de l’exploració de la
compensació dels usuaris entre els costos i els beneficis durant les accions de divulgació
d’informació personal van mostrar relacions significatives amb els cercles socials habituals (familiars, amics, companys de treball i usuaris desconeguts) i les seves propietats. Això ha permés dissenyar millors mecanismes de privacitat que restringeixen
adequadament l’accés a la informació i redueixen els penediments. Finalment, els elements de gamificació aplicats a les xarxes socials i a la privacitat dels usuaris van
mostrar un efecte positiu en el comportament dels usuaris cap a la privacitat i les pràctiques segures en les xarxes socials.Alemany Bordera, J. (2020). Measures of Privacy Protection on Social Environments [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/151456TESISCompendi
Cyberethics of E-Business social networking
The digital technologies open a virtual world where making successful business over the Internet and especially on social networks imply unusual ethical dilemmas. This chapter will seek to handle this problem, characteristic of the information age, highlighting ethical challenges surrounding the participation in a new electronic dimension which quickly became ubiquitous. In the same line of the marketing model entitled “Marketing-mix”, a new mnemonical model is presented. This model will be designated as “Cyberethics
-mix”, and is composed by four elements, all of them having the initial letter "P". These elements represent the following ethical issues that should be carefully taken into account when practicing business on the Internet:
1. Property of intellectual rights over digitized contents;
2. Precision of the content and data made available on the www;
3. Possibility to access the on-line information flow;
4. Privacy of personal data on Internet networking.info:eu-repo/semantics/publishedVersio
Overexposure-aware influence maximization
Viral marketing campaigns are often negatively affected by overexposure. Overexposure occurs when users become less likely to favor a promoted product, after receiving information about the product from too large a fraction of their friends. Yet, existing influence diffusion models do not take overexposure into account, effectively overestimating the number of users who favor the product and diffuse information about it. In this work, we propose the first influence diffusion model that captures overexposure. In our model, LAICO (Latency Aware Independent Cascade Model with Overexposure), the activation probability of a node representing a user is multiplied (discounted) by an overexposure score, which is calculated based on the ratio between the estimated and the maximum possible number of attempts performed to activate the node. We also study the influence maximization problem under LAICO. Since the spread function in LAICO is non-submodular, algorithms for submodular maximization are not appropriate to address the problem. Therefore, we develop an approximation algorithm which exploits monotone submodular upper and lower bound functions of spread, and a heuristic which aims to maximize a proxy function of spread iteratively. Our experiments show the effectiveness and efficiency of our algorithms
- …