38 research outputs found
Towards a semantic modeling of learners for social networks
The Friend of a Friend (FOAF) ontology is a vocabulary for mapping social networks. In this paper we propose an extension to FOAF in order to allow it to model learners and their social networks. We analyse FOAF alongside different learner modeling standards and specifications, and based on this analysis we introduce a taxonomy of the different features found in those models. We then compare the learner models and FOAF against the taxonomy to see how their characteristics have been shaped by their purpose. Based on this we propose extensions to FOAF in order to produce a learner model that is capable of forming the basis of a semantic social network.<br/
Hybrid Spam Filtering for Mobile Communication
Spam messages are an increasing threat to mobile communication. Several
mitigation techniques have been proposed, including white and black listing,
challenge-response and content-based filtering. However, none are perfect and
it makes sense to use a combination rather than just one. We propose an
anti-spam framework based on the hybrid of content-based filtering and
challenge-response. There is the trade-offs between accuracy of anti-spam
classifiers and the communication overhead. Experimental results show how,
depending on the proportion of spam messages, different filtering %%@
parameters should be set.Comment: 6 pages, 5 figures, 1 tabl
Let Your CyberAlter Ego Share Information and Manage Spam
Almost all of us have multiple cyberspace identities, and these {\em
cyber}alter egos are networked together to form a vast cyberspace social
network. This network is distinct from the world-wide-web (WWW), which is being
queried and mined to the tune of billions of dollars everyday, and until
recently, has gone largely unexplored. Empirically, the cyberspace social
networks have been found to possess many of the same complex features that
characterize its real counterparts, including scale-free degree distributions,
low diameter, and extensive connectivity. We show that these topological
features make the latent networks particularly suitable for explorations and
management via local-only messaging protocols. {\em Cyber}alter egos can
communicate via their direct links (i.e., using only their own address books)
and set up a highly decentralized and scalable message passing network that can
allow large-scale sharing of information and data. As one particular example of
such collaborative systems, we provide a design of a spam filtering system, and
our large-scale simulations show that the system achieves a spam detection rate
close to 100%, while the false positive rate is kept around zero. This system
has several advantages over other recent proposals (i) It uses an already
existing network, created by the same social dynamics that govern our daily
lives, and no dedicated peer-to-peer (P2P) systems or centralized server-based
systems need be constructed; (ii) It utilizes a percolation search algorithm
that makes the query-generated traffic scalable; (iii) The network has a built
in trust system (just as in social networks) that can be used to thwart
malicious attacks; iv) It can be implemented right now as a plugin to popular
email programs, such as MS Outlook, Eudora, and Sendmail.Comment: 13 pages, 10 figure
Camouflages and Token Manipulations-The Changing Faces of the Nigerian Fraudulent 419 Spammers
The inefficiencies of current spam filters against fraudulent (419) mails is not unrelated to the use by spammers of good-word
attacks, topic drifts, parasitic spamming, wrong categorization and recategorization of electronic mails by e-mail clients and of
course the fuzzy factors of greed and gullibility on the part of the recipients who responds to fraudulent spam mail offers. In this
paper, we establish that mail token manipulations remain, above any other tactics, the most potent tool used by Nigerian
scammers to fool statistical spam filters. While hoping that the uncovering of these manipulative evidences will prove useful in
future antispam research, our findings also sensitize spam filter developers on the need to inculcate within their antispam
architecture robust modules that can deal with the identified camouflages
A Method of Evaluating Trust and Reputation for Online Transaction
The widespread use of the Internet and evaluater-based technologies has transformed the way business is conducted. Traditional offline businesses have increasingly become online, and there are new kinds of businesses that solely exist online. Unlike offline business environments, interpersonal trust is generally lacking in online business settings. Trading partners might feel insecure about the exchange of products and services over the net as they have limited information about each other's reliability or about the product quality. Considering that enough trust needs to be created to get the online buyer and seller to take actions, trust is a precious asset in online transactions. In order to address the issue of evaluating trust and reputation in online transaction environments, this paper makes use of a social network that graphically represents interpersonal relationships. This paper proposes computational models that systematically evaluate the quantitative level of trust and reputation based on the social network. A method that combines the evaluated trust and reputation levels is also proposed to increase the reliability of online transactions
Using Header Session Messages to Filter-out Junk E-mails
Due to the popularity of Internet, e-mail use is the major activity when surfing Internet. However, in recent years, spam has become a major problem that is bothering the use of the e-mail. Many anti-spam filtering techniques have been implemented so far, such as RIPPER rule learning algorithm, Naïve Bayesian classifier, Support Vector Machine, Centroid Based, Decision trees or Memory-base filter. Most existed anti-spamming techniques filter junk emails out according to e-mail subjects and body messages. Nevertheless, subjects and e-mail contents are not the only cues for spamming judgment. In this paper, we present a new idea of filtering junk e-mail by utilizing the header session messages. In message head session, besides sender\u27s mail address, receiver\u27s mail address and time etc, users are not interested in other information. This paper conducted two content analyses. The first content analysis adopted 10,024 Junk e-mails collected by Spam Archive (http://spamarchive.org) in a two-months period. The second content analysis adopted 3,482 emails contributed by three volunteers for a one week period. According to content analysis results, this result shows that at most 92.5% of junk e-mails would be filtered out using message-ID, mail user agent, sender and receiver addresses in the header session as cues. In addition, the idea this study proposed may induce zero over block errors rate. This characteristic of zero over block errors rate is an important advantage for the antispamming approach this study proposed. This proposed idea of using header session messages to filter-out junk e-mails may coexist with other anti-spamming approaches. Therefore, no conflict would be found between the proposed idea and existing anti-spamming approaches
Similarity-based Techniques for Trust Management
A network of people having established trust relations and a model for propagation of related trust scores are fundamental building blocks in many of todayŠs most successful e-commerce and recommendation systems. Many online communities are only successful if sufficient mu-tual trust between their members exists. Users want to know whom to trust and how muc
What kind of e-mail information is more effective in communicating with the client? Application of game theory
Using game theory, this study analyzed clients' decisions after receiving digital relational marketing campaigns via email for two types of products: apparel and electronics-music-video. The objectives were to analyze the promotional and relational e-mails to discern which of the two is most effective in achieving marketing objectives and short-term business objectives. A cross-sectional study was carried out, with samples from Spain and Colombia, starting from a total of 400 surveys, a game based on the Nash Theory was proposed, having as a more important result, regardless of the type of email received by the client, the last action of the client will be marked as 'spam'. Likewise, differences were found by country and by gender depending on the type of product and no conclusive differences were found on which type of communication (promotional or differential) is better received by the client