43,310 research outputs found
Studying User Footprints in Different Online Social Networks
With the growing popularity and usage of online social media services, people
now have accounts (some times several) on multiple and diverse services like
Facebook, LinkedIn, Twitter and YouTube. Publicly available information can be
used to create a digital footprint of any user using these social media
services. Generating such digital footprints can be very useful for
personalization, profile management, detecting malicious behavior of users. A
very important application of analyzing users' online digital footprints is to
protect users from potential privacy and security risks arising from the huge
publicly available user information. We extracted information about user
identities on different social networks through Social Graph API, FriendFeed,
and Profilactic; we collated our own dataset to create the digital footprints
of the users. We used username, display name, description, location, profile
image, and number of connections to generate the digital footprints of the
user. We applied context specific techniques (e.g. Jaro Winkler similarity,
Wordnet based ontologies) to measure the similarity of the user profiles on
different social networks. We specifically focused on Twitter and LinkedIn. In
this paper, we present the analysis and results from applying automated
classifiers for disambiguating profiles belonging to the same user from
different social networks. UserID and Name were found to be the most
discriminative features for disambiguating user profiles. Using the most
promising set of features and similarity metrics, we achieved accuracy,
precision and recall of 98%, 99%, and 96%, respectively.Comment: The paper is already published in ASONAM 201
Privacy in Social Media: Identification, Mitigation and Applications
The increasing popularity of social media has attracted a huge number of
people to participate in numerous activities on a daily basis. This results in
tremendous amounts of rich user-generated data. This data provides
opportunities for researchers and service providers to study and better
understand users' behaviors and further improve the quality of the personalized
services. Publishing user-generated data risks exposing individuals' privacy.
Users privacy in social media is an emerging task and has attracted increasing
attention in recent years. These works study privacy issues in social media
from the two different points of views: identification of vulnerabilities, and
mitigation of privacy risks. Recent research has shown the vulnerability of
user-generated data against the two general types of attacks, identity
disclosure and attribute disclosure. These privacy issues mandate social media
data publishers to protect users' privacy by sanitizing user-generated data
before publishing it. Consequently, various protection techniques have been
proposed to anonymize user-generated social media data. There is a vast
literature on privacy of users in social media from many perspectives. In this
survey, we review the key achievements of user privacy in social media. In
particular, we review and compare the state-of-the-art algorithms in terms of
the privacy leakage attacks and anonymization algorithms. We overview the
privacy risks from different aspects of social media and categorize the
relevant works into five groups 1) graph data anonymization and
de-anonymization, 2) author identification, 3) profile attribute disclosure, 4)
user location and privacy, and 5) recommender systems and privacy issues. We
also discuss open problems and future research directions for user privacy
issues in social media.Comment: This survey is currently under revie
Learning multi-faceted representations of individuals from heterogeneous evidence using neural networks
Inferring latent attributes of people online is an important social computing
task, but requires integrating the many heterogeneous sources of information
available on the web. We propose learning individual representations of people
using neural nets to integrate rich linguistic and network evidence gathered
from social media. The algorithm is able to combine diverse cues, such as the
text a person writes, their attributes (e.g. gender, employer, education,
location) and social relations to other people. We show that by integrating
both textual and network evidence, these representations offer improved
performance at four important tasks in social media inference on Twitter:
predicting (1) gender, (2) occupation, (3) location, and (4) friendships for
users. Our approach scales to large datasets and the learned representations
can be used as general features in and have the potential to benefit a large
number of downstream tasks including link prediction, community detection, or
probabilistic reasoning over social networks
The Security of Organizations and Individuals in Online Social Networks
The serious privacy and security problems related to online social networks
(OSNs) are what fueled two complementary studies as part of this thesis. In the
first study, we developed a general algorithm for the mining of data of
targeted organizations by using Facebook (currently the most popular OSN) and
socialbots. By friending employees in a targeted organization, our active
socialbots were able to find new employees and informal organizational links
that we could not find by crawling with passive socialbots. We evaluated our
method on the Facebook OSN and were able to reconstruct the social networks of
employees in three distinct, actual organizations. Furthermore, in the crawling
process with our active socialbots we discovered up to 13.55% more employees
and 22.27% more informal organizational links in contrast to the crawling
process that was performed by passive socialbots with no company associations
as friends.
In our second study, we developed a general algorithm for reaching specific
OSN users who declared themselves to be employees of targeted organizations,
using the topologies of organizational social networks and utilizing
socialbots. We evaluated the proposed method on targeted users from three
actual organizations on Facebook, and two actual organizations on the Xing OSN
(another popular OSN platform). Eventually, our socialbots were able to reach
specific users with a success rate of up to 70% on Facebook, and up to 60% on
Xing
Friend or Foe? Fake Profile Identification in Online Social Networks
The amount of personal information unwillingly exposed by users on online
social networks is staggering, as shown in recent research. Moreover, recent
reports indicate that these networks are infested with tens of millions of fake
users profiles, which may jeopardize the users' security and privacy. To
identify fake users in such networks and to improve users' security and
privacy, we developed the Social Privacy Protector software for Facebook. This
software contains three protection layers, which improve user privacy by
implementing different methods. The software first identifies a user's friends
who might pose a threat and then restricts this "friend's" exposure to the
user's personal information. The second layer is an expansion of Facebook's
basic privacy settings based on different types of social network usage
profiles. The third layer alerts users about the number of installed
applications on their Facebook profile, which have access to their private
information. An initial version of the Social Privacy Protection software
received high media coverage, and more than 3,000 users from more than twenty
countries have installed the software, out of which 527 used the software to
restrict more than nine thousand friends. In addition, we estimate that more
than a hundred users accepted the software's recommendations and removed at
least 1,792 Facebook applications from their profiles. By analyzing the unique
dataset obtained by the software in combination with machine learning
techniques, we developed classifiers, which are able to predict which Facebook
profiles have high probabilities of being fake and therefore, threaten the
user's well-being. Moreover, in this study, we present statistics on users'
privacy settings and statistics of the number of applications installed on
Facebook profiles...Comment: Draft Versio
Online Social Networks: Threats and Solutions
Many online social network (OSN) users are unaware of the numerous security
risks that exist in these networks, including privacy violations, identity
theft, and sexual harassment, just to name a few. According to recent studies,
OSN users readily expose personal and private details about themselves, such as
relationship status, date of birth, school name, email address, phone number,
and even home address. This information, if put into the wrong hands, can be
used to harm users both in the virtual world and in the real world. These risks
become even more severe when the users are children. In this paper we present a
thorough review of the different security and privacy risks which threaten the
well-being of OSN users in general, and children in particular. In addition, we
present an overview of existing solutions that can provide better protection,
security, and privacy for OSN users. We also offer simple-to-implement
recommendations for OSN users which can improve their security and privacy when
using these platforms. Furthermore, we suggest future research directions.Comment: Draft Versio
A Survey on Privacy and Security in Online Social Networks
Online Social Networks (OSN) are a permanent presence in today's personal and
professional lives of a huge segment of the population, with direct
consequences to offline activities. Built on a foundation of trust-users
connect to other users with common interests or overlapping personal
trajectories-online social networks and the associated applications extract an
unprecedented volume of personal information. Unsurprisingly, serious privacy
and security risks emerged, positioning themselves along two main types of
attacks: attacks that exploit the implicit trust embedded in declared social
relationships; and attacks that harvest user's personal information for
ill-intended use. This article provides an overview of the privacy and security
issues that emerged so far in OSNs. We introduce a taxonomy of privacy and
security attacks in OSNs, we overview existing solutions to mitigate those
attacks, and outline challenges still to overcome
Systems Applications of Social Networks
The aim of this article is to provide an understanding of social networks as
a useful addition to the standard tool-box of techniques used by system
designers. To this end, we give examples of how data about social links have
been collected and used in di erent application contexts. We develop a broad
taxonomy-based overview of common properties of social networks, review how
they might be used in di erent applications, and point out potential pitfalls
where appropriate. We propose a framework, distinguishing between two main
types of social network-based user selection-personalised user selection which
identi es target users who may be relevant for a given source node, using the
social network around the source as a context, and generic user selection or
group delimitation, which lters for a set of users who satisfy a set of
application requirements based on their social properties. Using this
framework, we survey applications of social networks in three typical kinds of
application scenarios: recommender systems, content-sharing systems (e.g., P2P
or video streaming), and systems which defend against users who abuse the
system (e.g., spam or sybil attacks). In each case, we discuss potential
directions for future research that involve using social network properties.Comment: Will appear in ACM computing Survey
Community structure and interaction dynamics through the lens of quotes
This is the first work investigating community structure and interaction
dynamics through the lens of quotes in online discussion forums. We examine
four forums of different size, language, and topic. Quote usage, which is
surprisingly consistent over time and users, appears to have an important role
in aiding intra-thread navigation, and uncovers a hidden "social" structure in
communities otherwise lacking all trappings (from friends and followers to
reputations) of today's social networks
AI for Trustworthiness! Credible User Identification on Social Web for Disaster Response Agencies
Although social media provides a vibrant platform to discuss real-world
events, the quantity of information generated can overwhelm decision making
based on that information. By better understanding who is participating in
information sharing, we can more effectively filter information as the event
unfolds. Fine-grained understanding of credible sources can even help develop a
trusted network of users for specific events or situations. Given the culture
of relying on trusted actors for work practices in the humanitarian and
disaster response domain, we propose to identify potential credible users as
organizational and organizational-affiliated user accounts on social media in
realtime for effective information collection and dissemination. Therefore, we
examine social media using AI and Machine Learning methods during three types
of humanitarian or disaster events and identify key actors responding to social
media conversations as organization (business, group, or institution),
organization-affiliated (individual with an organizational affiliation), and
non-affiliated (individual without organizational affiliation) identities. We
propose a credible user classification approach using a diverse set of social,
activity, and descriptive representation features extracted from user profile
metadata. Our extensive experiments showed a contrasting participation behavior
of the user identities by their content practices, such as the use of higher
authoritative content sharing by organization and organization-affiliated
users. This study provides a direction for designing realtime credible content
analytics systems for humanitarian and disaster response agencies.Comment: Presented at AAAI FSS-18: Artificial Intelligence in Government and
Public Sector, Arlington, Virginia, US
- …