2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing最新文献

筛选
英文 中文
Private Facebook Chat 私人Facebook聊天
C. Robison, Scott Ruoti, Timothy W. van der Horst, K. Seamons
{"title":"Private Facebook Chat","authors":"C. Robison, Scott Ruoti, Timothy W. van der Horst, K. Seamons","doi":"10.1109/SocialCom-PASSAT.2012.58","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.58","url":null,"abstract":"The number of instant messages sent per year now exceeds that of email. Recently users have been moving away from traditional instant messaging applications and instead using social networks as their primary communications platform. To discover attitudes related to instant messaging and its security, we have conducted a user survey. This paper also presents the design of PFC (Private Facebook Chat), a system providing convenient, secure instant messaging within Facebook Chat. PFC offers end-to-end encryption in order to thwart any eavesdropper, including Facebook itself. Finally, we have conducted a usability study of a PFC prototype.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125952104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Artificial Inflation: The Real Story of Trends and Trend-Setters in Sina Weibo 人为通胀:新浪微博趋势和引领者的真实故事
L. Yu, S. Asur, B. Huberman
{"title":"Artificial Inflation: The Real Story of Trends and Trend-Setters in Sina Weibo","authors":"L. Yu, S. Asur, B. Huberman","doi":"10.1109/SocialCom-PASSAT.2012.45","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.45","url":null,"abstract":"There has been a tremendous rise in the growth of online social networks all over the world in recent years. This has resulted in a large amount of content created and propagated at an incessant rate, all competing with each other to attract enough attention and become trends. In this paper, we analyze the temporal aspect of trends and trend-setters in Sina Weibo, contrasting it with earlier observations on Twitter. First, we look at the formation, persistence and decay of trends and examine the key topics that trend in Sina Weibo. We find that retweeting activity is very predominant in Sina Weibo. Furthermore we discover that many of the trends in Sina Weibo are due to continuous retweets by a small percentage of fraudulent accounts set up for the purpose of artificially inflating certain posts.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130092900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships 基于关系的在线社交网络访问控制:超越用户对用户关系
Yuan Cheng, Jaehong Park, R. Sandhu
{"title":"Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships","authors":"Yuan Cheng, Jaehong Park, R. Sandhu","doi":"10.1109/SocialCom-PASSAT.2012.57","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.57","url":null,"abstract":"User-to-user (U2U) relationship-based access control has become the most prevalent approach for modeling access control in online social networks (OSNs), where authorization is typically made by tracking the existence of a U2U relationship of particular type and/or depth between the accessing user and the resource owner. However, today's OSN applications allow various user activities that cannot be controlled by using U2U relationships alone. In this paper, we develop a relationship-based access control model for OSNs that incorporates not only U2U relationships but also user-to-resource (U2R) and resource-to-resource (R2R) relationships. Furthermore, while most access control proposals for OSNs only focus on controlling users' normal usage activities, our model also captures controls on users' administrative activities. Authorization policies are defined in terms of patterns of relationship paths on social graph and the hop count limits of these path. The proposed policy specification language features hop count skipping of resource-related relationships, allowing more flexibility and expressive power. We also provide simple specifications of conflict resolution policies to resolve possible conflicts among authorization policies.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128931935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 101
On Identifying Conflict Related Stances in Political Debates 论政治辩论中冲突相关立场的识别
J. Allwood, Massimo Chindamo, E. Ahlsén
{"title":"On Identifying Conflict Related Stances in Political Debates","authors":"J. Allwood, Massimo Chindamo, E. Ahlsén","doi":"10.1109/SocialCom-PASSAT.2012.90","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.90","url":null,"abstract":"The purpose of this paper is to discuss some problems in identifying stances and the features that express these stances in televised political debates where there is conflict escalation. The study is based on an analysis of video-recorded political debates in different European languages (Italian (1), German (2) and US-American English (1)) and consists of a qualitative analysis of the videos in order to understand the similarities and differences in the use of social signals for stances in conflict situations in a similar setting (televised political debate) in three western cultures.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Facial Action Detection Using Block-Based Pyramid Appearance Descriptors 基于块的金字塔外观描述符的面部动作检测
Bihan Jiang, M. Valstar, M. Pantic
{"title":"Facial Action Detection Using Block-Based Pyramid Appearance Descriptors","authors":"Bihan Jiang, M. Valstar, M. Pantic","doi":"10.1109/SocialCom-PASSAT.2012.69","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.69","url":null,"abstract":"Facial expression is one of the most important non-verbal behavioural cues in social signals. Constructing an effective face representation from images is an essential step for successful facial behaviour analysis. Most existing face descriptors operate on the same scale, and do not leverage coarse v.s. fine methods such as image pyramids. In this work, we propose the sparse appearance descriptors Block-based Pyramid Local Binary Pattern (B-PLBP) and Block-based Pyramid Local Phase Quantisation (B-PLPQ). The effectiveness of our proposed descriptors is evaluated by a real-time facial action recognition system. The performance of B-PLBP and B-PLPQ is also compared with Block-based Local Binary Patterns (B-LBP) and Block-based Local Phase Quantisation (B-LPQ). The system proposed here enables detection a much larger range of facial behaviour by detecting 22 facial muscle actions (Action Units, AUs), which can be practically applied for social behaviour analysis and synthesis. Results show that our proposed descriptor B-PLPQ outperforms all other tested methods for the problem of FACS Action Unit analysis and that systems which utilise a pyramid representation outperform those that use basic appearance descriptors.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128998843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
User Behavior Modelling Approach for Churn Prediction in Online Games 在线游戏用户流失预测的用户行为建模方法
Z. Borbora, J. Srivastava
{"title":"User Behavior Modelling Approach for Churn Prediction in Online Games","authors":"Z. Borbora, J. Srivastava","doi":"10.1109/SocialCom-PASSAT.2012.84","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.84","url":null,"abstract":"Massively Multiplayer Online Role-Playing Games (MMORPGs) are persistent virtual environments where millions of players interact in an online manner. Game logs capture player activities in great detail and user behavior modeling approaches can help to build accurate models of player behavior from these logs. We are interested in modeling player churn behavior and we use a lifecycle-based approach for this purpose. In a player lifecycle-based approach, we analyze the activity traits of churners in the weeks leading up to their point of leaving the game and compare it with the activity traits of a regular player. We identify several intuitive yet distinct behavioral profiles associated with churners and active players which can discriminate between the two populations. We use these insights to propose three semantic dimensions of engagement, enthusiasm and persistence to construct derived features. Using three session-related variables and the features derived from them, we are able to achieve good classification performance with the churn prediction models. Finally, we propose a distance-based classification scheme, which we call wClusterDist, which benefits from these distinct behavioral profiles of the two populations. Experimental results show that the proposed classification scheme is well-suited for this problem formulation and its performance is better than or comparable to other traditional classification schemes.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126635729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Analysis of Ego Network Structure in Online Social Networks 在线社交网络中的自我网络结构分析
V. Arnaboldi, M. Conti, A. Passarella, F. Pezzoni
{"title":"Analysis of Ego Network Structure in Online Social Networks","authors":"V. Arnaboldi, M. Conti, A. Passarella, F. Pezzoni","doi":"10.1109/SocialCom-PASSAT.2012.41","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.41","url":null,"abstract":"Results about offline social networks demonstrated that the social relationships that an individual (ego) maintains with other people (alters) can be organised into different groups according to the ego network model. In this model the ego can be seen as the centre of a series of layers of increasing size. Social relationships between ego and alters in layers close to ego are stronger than those belonging to more external layers. Online Social Networks are becoming a fundamental medium for humans to manage their social life, however the structure of ego networks in these virtual environments has not been investigated yet. In this work we contribute to fill this gap by analysing a large data set of Facebook relationships. We filter the data to obtain the frequency of contact of the relationships, and we check - by using different clustering techniques - whether structures similar to those found in offline social networks can be observed. The results show a strikingly similarity between the social structures in offline and Online Social Networks. In particular, the social relationships in Facebook share three of the most important features highlighted in offline ego networks: (i) they appear to be organised in four hierarchical layers, (ii) the sizes of the layers follow a scaling factor near to three, and (iii) the number of active social relationships is close to the well-known Dunbar's number. These results strongly suggest that, even if the ways to communicate and to maintain social relationships are changing due to the diffusion of Online Social Networks, the way people organise their social relationships seems to remain unaltered.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"13 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115307292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 110
PESAP: A Privacy Enhanced Social Application Platform PESAP:一个隐私增强的社交应用平台
Tom Reynaert, Willem De Groef, Dominique Devriese, Lieven Desmet, F. Piessens
{"title":"PESAP: A Privacy Enhanced Social Application Platform","authors":"Tom Reynaert, Willem De Groef, Dominique Devriese, Lieven Desmet, F. Piessens","doi":"10.1109/SocialCom-PASSAT.2012.39","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.39","url":null,"abstract":"Nowadays, social networking sites provide third party application developers with means to access their social graph, by providing a social application platform. Through their users, these developers acquire a significant set of personal information from the social graph. The current protection mechanisms, such as privacy policies and access control mechanisms fall short on protecting the privacy of the users. In this paper we present a framework for a privacy enhanced social application platform, called PESAP, that technically enforces the protection of the personal information of a user, when interacting with social applications. The framework is based on two pillars: anonymization of the social graph and secure information flow inside the browser. PESAP is targeted to be as compatible as possible with the current state-of-the-art design of social application platforms, while technically enforcing the protection of user privacy. We evaluate this compliance, based on a classification of applications in different categories.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122523215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Los Twindignados: The Rise of the Indignados Movement on Twitter 《愤怒者:愤怒者运动在推特上的崛起
N. Vallina-Rodriguez, S. Scellato, H. Haddadi, C. Forsell, J. Crowcroft, C. Mascolo
{"title":"Los Twindignados: The Rise of the Indignados Movement on Twitter","authors":"N. Vallina-Rodriguez, S. Scellato, H. Haddadi, C. Forsell, J. Crowcroft, C. Mascolo","doi":"10.1109/SOCIALCOM-PASSAT.2012.120","DOIUrl":"https://doi.org/10.1109/SOCIALCOM-PASSAT.2012.120","url":null,"abstract":"Twitter has already become an important facet of the social Web, allowing users and organizations to share their ideas and subscribe to others' updates. Notably, it has been actively used during political events such as the recent elections in Iran, Spain and the USA, or the uprisings in the Middle East, to the extent that it is claimed that revolutions will be tweeted. However such claims are yet to be empirically established. In this work we study an extensive set of millions of tweets themed around the 2011 regional and local elections in Spain and their accompanying civil unrest. Our analysis shows that mainstream political entities were overshadowed on Twitter by grassroots movements discussing alternative points of view, at both regional and national levels. By tracking temporal trends we discover an explosion of interest in the Spanish protests following the establishment of the first protest camps in Madrid. The subsequent spontaneous setting up of similar camps in almost every town in Spain was widely reported at the time, and our spatial analysis quantitatively attests that the protests were indeed widely discussed in all parts of the country. Our results suggest that online social networks serve more as media for interactive engagement between grassroots peers, rather than as platforms for politicians to attract mass attention.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133437047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Correlating a Persona to a Person 将角色与人物关联起来
Jason W. Clark
{"title":"Correlating a Persona to a Person","authors":"Jason W. Clark","doi":"10.1109/SocialCom-PASSAT.2012.23","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.23","url":null,"abstract":"Participation in online social networks (OSNs) such as Facebook, LinkedIn, and Twitter has dramatically increased over the years. For example, it is estimated that Facebook has more than eight hundred million registered users. The popularity of OSNs has increased the sheer amount of personal information on the Internet. In this paper, we introduce a profiling and tracking attack that correlates a visitor's online persona that is captured from a seemingly innocuous website with that of the same visitor's real Facebook profile. We compare this with the analytics captured from a custom Facebook Fan Page to show how we can identify the visitor given only their online persona. Furthermore, we create a Facebook application that is linked from the custom website and Fan Page. This application when, accessed and allowed by a visitor (assuming they have a Facebook account), will capture their profile. We tie the analytics captured by the custom website and the Fan Page with that of the profiling and tracking enabled application. Our stated hypothesis is: The majority of visitors can be profiled, tracked, and led to reveal their identity by an adversary who uses website analytic tools. This is because of the actions the visitor performs on the Internet and the information they freely display on their Facebook profiles. We analyze the online behavior of 25 participants and our results show we are able to correctly determine 16 of 25 or 64% of them. We focus on the ramifications of this research and provide defense mechanisms to help protect OSN users.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114992741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信