The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the popularity of social networks, users can communicate with each other in a more convenient way. However, the increasing amount of data poses new challenges for the analysis of the social activities of the users. In this paper, we propose to visualize the heterogeneous information of user interactions in a social network in a three-dimensional way using the concept of solar systems. The target...
In 2015, around 3,000 websites, including Google, Yahoo, Facebook, Youtube and Twitter were blocked in mainland China under the policy of Internet censorship. Quite a number of these websites are social media and instant messaging related. This motivates us to investigate about the relationship between online activities and offline activities. We are especially interested in whether online political...
Motivated by the relevance of clustering or transitivity to a variety of network applications, we study the Triangle Interdiction Problem (TIP), which is to find a minimum-size set of edges that intersects all triangles of a network. As existing approximation algorithms for this NP-hard problem either do not scale well to massive networks or have poor solution quality, we formulate two algorithms,...
Background: While bug bounty programs are not new in software development, an increasing number of companies, as well as open source projects, rely on external parties to perform the security assessment of their software for reward. However, there is relatively little empirical knowledge about the characteristics of bug bounty program contributors. Aim: This paper aims to understand those contributors...
Millions of users harvest their personal information (photo, video, status) on different online social networks (OSNs). Hence, these rich repositories of sensitive information attract the eyes of adversary to launch variety of cyber attacks on OSN. Here we have identified all crucial threats on social network that may lead to severe risks. In this paper, we have formalized possible social network...
In this work we demonstrate a method to detect controversy on news issues. This is done by performing an analysis of people's reaction on social media to news articles reporting these issues. Detecting controversial news topics on web is a relevant problem today. It helps to identify the issues upon which people have divided opinion and is specially useful on topics such as a presidential election,...
Due to the rapid increase in the number of users owning location-based devices, there is a considerable amount of geo-tagged data available on social media websites, such as Twitter and Facebook. This geo-tagged data can be useful in a variety of ways to extract location-specific information, as well as to comprehend the variation of information across different geographical regions. A lot of techniques...
An individual's personality determines the probable repertoire of their reactions to a particular situation. A social robot is much more effective if it is able to learn and so take into account the properties of the humans around it, including personalities. We investigate how well personality can be estimated based on modest amounts of speech or writing, which a social robot might (over)hear. Such...
The current privacy protection methods adopted by social network providers rely on restricting users' access rights. They force a user to rigidly divide other users into two categories only: friends and strangers. Based on this classification, they prevent non-friends from accessing to the user's data while provide full access for friends regardless of how close they are to her. However, the level...
Following the trend of privacy preserving online social network publishing, various anonymization mechanisms have been designed and employed. Many differential privacybased mechanisms claim that they can preserve the utility as well as guarantee the privacy. Their utility analysis are always based on some specifically chosen metrics.This paper aims to find a novel angle that describing the network...
Web development shows itself in the e-learning environment. Developments in the e-learning environment are expected to provide high motivation, cooperative and more constructive experiences for students. In terms of being able to provide convenience in technological harmonization process which is in need of professionalism, programming skills are also included in today's needs. E-learning environments...
Millions of data are collected daily in the social media environment. This data mostly reflects people's ideas in a certain topic. Emotion analysis is a new data mining subfield and is usually concerned with information extraction and identification from emotions in social media. Twitter is a platform where users share their ideas through messages. These messages can be classified to analyze the feelings...
The amount of data circulating on the Internet is increasing day by day. With the increasing use of social media in particular, the importance of analyzing these data is increasing. The use of machine learning approaches to analyze large amounts of data is still popular today. Today, the social network Facebook is the most popular social networking sites. In this study, some data taken on Facebook...
Social media is very important factor in analyzing modern society as a whole, their values, norms, and behaviors, as being a part of our everyday life. This study is oriented towards analyzing social media in order to allow users to create their own preferences to follow (analyze) a specific social media source. The web application has been developed to allow a user to follow specific Facebook accounts...
Online social networks have become the major source of information and entertainment for millions of users due to the tremendous increase of the accessibility options. Mobile internet has revolutionized the users to access social networking sites with ease and also allows to various social multimedia content anytime, anywhere and on behalf of any identity. This makes the analysis of user interactions...
Some online social networks (OSNs) allow users to define friendship-groups as reusable shortcuts for sharing information with multiple contacts. Posting exclusively to a friendship-group gives some privacy control, while supporting communication with (and within) this group. However, recipients of such posts may want to reuse content for their own social advantage, and can bypass existing controls...
Tweets are frequently used to express opinions, specifically when the topic of choice is polarizing, as it is in politics. With many variables effecting the choice of vote, the most effective method of determining election outcome is through public opinion polling. We seek to determine whether Twitter can be an effective polling method for the 2016 United States general election. To this aim, we create...
Online social network services (OSNSs) have become an integral part of our daily lives. At the same time, the aggressive market competition has led to the emergence of multiple competing siloed OSNSs that cannot interoperate. As a consequence, people face the burden of creating and managing multiple OSNS accounts and learning how to use them to stay connected. This paper is concerned with relieving...
The communication of the homework assigned to elementary school students between teachers and parents is limited given that there are no electronic alternatives originated within the elementary schools in the State of Zacatecas México. Therefore the homework is a generally unknown activity for the parents. For this reason to improve the communication process between teachers and parents we developed...
The paper proposes a data mining method to find the relationships between fan page users' sentiment and customers' purchase behavior in order to predict those customers' purchase intention in the future. The business companies create their own fan pages and post advertisements to prompt their products. The fan page users always post their opinions on the wall to tell the feelings about products. Since...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.