38 research outputs found

    Towards a semantic modeling of learners for social networks

    No full text
    The Friend of a Friend (FOAF) ontology is a vocabulary for mapping social networks. In this paper we propose an extension to FOAF in order to allow it to model learners and their social networks. We analyse FOAF alongside different learner modeling standards and specifications, and based on this analysis we introduce a taxonomy of the different features found in those models. We then compare the learner models and FOAF against the taxonomy to see how their characteristics have been shaped by their purpose. Based on this we propose extensions to FOAF in order to produce a learner model that is capable of forming the basis of a semantic social network.<br/

    Hybrid Spam Filtering for Mobile Communication

    Full text link
    Spam messages are an increasing threat to mobile communication. Several mitigation techniques have been proposed, including white and black listing, challenge-response and content-based filtering. However, none are perfect and it makes sense to use a combination rather than just one. We propose an anti-spam framework based on the hybrid of content-based filtering and challenge-response. There is the trade-offs between accuracy of anti-spam classifiers and the communication overhead. Experimental results show how, depending on the proportion of spam messages, different filtering %%@ parameters should be set.Comment: 6 pages, 5 figures, 1 tabl

    Let Your CyberAlter Ego Share Information and Manage Spam

    Full text link
    Almost all of us have multiple cyberspace identities, and these {\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of billions of dollars everyday, and until recently, has gone largely unexplored. Empirically, the cyberspace social networks have been found to possess many of the same complex features that characterize its real counterparts, including scale-free degree distributions, low diameter, and extensive connectivity. We show that these topological features make the latent networks particularly suitable for explorations and management via local-only messaging protocols. {\em Cyber}alter egos can communicate via their direct links (i.e., using only their own address books) and set up a highly decentralized and scalable message passing network that can allow large-scale sharing of information and data. As one particular example of such collaborative systems, we provide a design of a spam filtering system, and our large-scale simulations show that the system achieves a spam detection rate close to 100%, while the false positive rate is kept around zero. This system has several advantages over other recent proposals (i) It uses an already existing network, created by the same social dynamics that govern our daily lives, and no dedicated peer-to-peer (P2P) systems or centralized server-based systems need be constructed; (ii) It utilizes a percolation search algorithm that makes the query-generated traffic scalable; (iii) The network has a built in trust system (just as in social networks) that can be used to thwart malicious attacks; iv) It can be implemented right now as a plugin to popular email programs, such as MS Outlook, Eudora, and Sendmail.Comment: 13 pages, 10 figure

    Leveraging social networking services to encourage interaction in public spaces

    Full text link

    Camouflages and Token Manipulations-The Changing Faces of the Nigerian Fraudulent 419 Spammers

    Full text link
    The inefficiencies of current spam filters against fraudulent (419) mails is not unrelated to the use by spammers of good-word attacks, topic drifts, parasitic spamming, wrong categorization and recategorization of electronic mails by e-mail clients and of course the fuzzy factors of greed and gullibility on the part of the recipients who responds to fraudulent spam mail offers. In this paper, we establish that mail token manipulations remain, above any other tactics, the most potent tool used by Nigerian scammers to fool statistical spam filters. While hoping that the uncovering of these manipulative evidences will prove useful in future antispam research, our findings also sensitize spam filter developers on the need to inculcate within their antispam architecture robust modules that can deal with the identified camouflages

    A Method of Evaluating Trust and Reputation for Online Transaction

    Get PDF
    The widespread use of the Internet and evaluater-based technologies has transformed the way business is conducted. Traditional offline businesses have increasingly become online, and there are new kinds of businesses that solely exist online. Unlike offline business environments, interpersonal trust is generally lacking in online business settings. Trading partners might feel insecure about the exchange of products and services over the net as they have limited information about each other's reliability or about the product quality. Considering that enough trust needs to be created to get the online buyer and seller to take actions, trust is a precious asset in online transactions. In order to address the issue of evaluating trust and reputation in online transaction environments, this paper makes use of a social network that graphically represents interpersonal relationships. This paper proposes computational models that systematically evaluate the quantitative level of trust and reputation based on the social network. A method that combines the evaluated trust and reputation levels is also proposed to increase the reliability of online transactions

    Using Header Session Messages to Filter-out Junk E-mails

    Get PDF
    Due to the popularity of Internet, e-mail use is the major activity when surfing Internet. However, in recent years, spam has become a major problem that is bothering the use of the e-mail. Many anti-spam filtering techniques have been implemented so far, such as RIPPER rule learning algorithm, Naïve Bayesian classifier, Support Vector Machine, Centroid Based, Decision trees or Memory-base filter. Most existed anti-spamming techniques filter junk emails out according to e-mail subjects and body messages. Nevertheless, subjects and e-mail contents are not the only cues for spamming judgment. In this paper, we present a new idea of filtering junk e-mail by utilizing the header session messages. In message head session, besides sender\u27s mail address, receiver\u27s mail address and time etc, users are not interested in other information. This paper conducted two content analyses. The first content analysis adopted 10,024 Junk e-mails collected by Spam Archive (http://spamarchive.org) in a two-months period. The second content analysis adopted 3,482 emails contributed by three volunteers for a one week period. According to content analysis results, this result shows that at most 92.5% of junk e-mails would be filtered out using message-ID, mail user agent, sender and receiver addresses in the header session as cues. In addition, the idea this study proposed may induce zero over block errors rate. This characteristic of zero over block errors rate is an important advantage for the antispamming approach this study proposed. This proposed idea of using header session messages to filter-out junk e-mails may coexist with other anti-spamming approaches. Therefore, no conflict would be found between the proposed idea and existing anti-spamming approaches

    Similarity-based Techniques for Trust Management

    Get PDF
    A network of people having established trust relations and a model for propagation of related trust scores are fundamental building blocks in many of todayŠs most successful e-commerce and recommendation systems. Many online communities are only successful if sufficient mu-tual trust between their members exists. Users want to know whom to trust and how muc

    What kind of e-mail information is more effective in communicating with the client? Application of game theory

    Get PDF
    Using game theory, this study analyzed clients' decisions after receiving digital relational marketing campaigns via email for two types of products: apparel and electronics-music-video. The objectives were to analyze the promotional and relational e-mails to discern which of the two is most effective in achieving marketing objectives and short-term business objectives. A cross-sectional study was carried out, with samples from Spain and Colombia, starting from a total of 400 surveys, a game based on the Nash Theory was proposed, having as a more important result, regardless of the type of email received by the client, the last action of the client will be marked as 'spam'. Likewise, differences were found by country and by gender depending on the type of product and no conclusive differences were found on which type of communication (promotional or differential) is better received by the client
    corecore