The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A content analysis of online sex worker advertisements suggests specific terms, sources and patterns of behavior that may help identify potential sex trafficked victims within these virtual environments. While some ads are posted by independent sex workers, others may have been posted by traffickers or pimps, advertising the women they have under their control. A total of 600 ads from the Backpage...
We have built a tool for inspecting and managing data lakes. The motivations for creating this tool are 1) schema discovery (determining links pertinent to solving a data analysis problem), 2) discovering high risk links in data schemas that give rise to Information Security problems and 3) discovering high value relationships enabling data asset curation. The tool works by extracting metadata from...
Changes in social networks may reflect an underlying significant events or behaviors within an organization. Detecting these changes effectively and efficiently could have the potential to enable the early warning, and faster response to both positive and negative organizational activities. In this paper, we use a genetic algorithm based back propagation (GABP) neural network model to quantitatively...
Microblogging sites like Twitter provide a platform for sharing ideas and expressing opinions. The widespread popularity of these platforms and the complex social structure that arises within these communities provides a unique opportunity to understand the interactions between users. The political domain, especially in a multi-party system, presents compelling challenges, as political parties have...
This paper amalgamates the field of positive psychology and social network analysis to explore what are the character strengths and virtues of individuals with high centrality measures within a close group of adolescent females. Research in the field of social network analysis in the last few decades has given a good understanding of different centrality measures. Today, we know what does an individual...
Nowadays, communication between people is mediated by technology and more specifically via Internet either by using email or social networking sites. Since any online activity generates an electronic trace, creating an automated tool to collect and analyze the communication between people can be valuable for extracting useful information about their behavioral characteristics. Combining these characteristics,...
This research studies community detection in multiplex dark networks. Our method seeks to intelligently select appropriate layers for aggregation to approximate communities in the whole network, while reducing the impact of over-modeling the network. Community evolution is explored as layers of different types of information are added to the partial picture of the network. We determine the set of...
The realization that scholarly publications are discussed and have influence on discourse outside scientific and academic domains has given rise to area of scientometrics called alternative metrics or “altmetrics”. Furthermore, researchers in this field tend to focus primarily on measuring scientific activity on social media platforms such as Twitter, however these count-based metrics are vulnerable...
The participation inequality phenomenon in online social networks between the niche of super contributors and the crowd of silent users, a.k.a. lurkers, has been witnessed in many domains. Within this view, understanding the role that lurkers take in the network is essential to develop innovative strategies to delurk them, i.e., to engage such users into a more active participation in the social network...
Network integration refers to a process of building links between two networks so that they dissolve into a single unified network. Togetherness measures the proximity of these two networks as they integrate; this notion is fundamental to social networks as it is relevant to important concepts such as trust, coherence and solidarity. In this paper, we study the algorithmic nature of network integration...
This paper presents a novel approach to estimating healthcare fraud (HCF) risk that applies network algorithms to graphs derived from open source datasets. One group of algorithms calculates behavioral similarity to known fraudulent and non-fraudulent healthcare providers with respect to measurable healthcare activities, such as medical procedures and drug prescriptions. Another set of algorithms...
The advent of modern forms of information and communication technologies (ICTs), such as social media, has modified the ways people communicate and enables an inimitable way of connectivity promoting the advancement and diffusion of information. Given that, individuals within social movements bringing influence from other movements makes the study of spillover within social movements an important...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.