C. Robison, Scott Ruoti, Timothy W. van der Horst, K. Seamons
{"title":"Private Facebook Chat","authors":"C. Robison, Scott Ruoti, Timothy W. van der Horst, K. Seamons","doi":"10.1109/SocialCom-PASSAT.2012.58","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.58","url":null,"abstract":"The number of instant messages sent per year now exceeds that of email. Recently users have been moving away from traditional instant messaging applications and instead using social networks as their primary communications platform. To discover attitudes related to instant messaging and its security, we have conducted a user survey. This paper also presents the design of PFC (Private Facebook Chat), a system providing convenient, secure instant messaging within Facebook Chat. PFC offers end-to-end encryption in order to thwart any eavesdropper, including Facebook itself. Finally, we have conducted a usability study of a PFC prototype.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125952104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial Inflation: The Real Story of Trends and Trend-Setters in Sina Weibo","authors":"L. Yu, S. Asur, B. Huberman","doi":"10.1109/SocialCom-PASSAT.2012.45","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.45","url":null,"abstract":"There has been a tremendous rise in the growth of online social networks all over the world in recent years. This has resulted in a large amount of content created and propagated at an incessant rate, all competing with each other to attract enough attention and become trends. In this paper, we analyze the temporal aspect of trends and trend-setters in Sina Weibo, contrasting it with earlier observations on Twitter. First, we look at the formation, persistence and decay of trends and examine the key topics that trend in Sina Weibo. We find that retweeting activity is very predominant in Sina Weibo. Furthermore we discover that many of the trends in Sina Weibo are due to continuous retweets by a small percentage of fraudulent accounts set up for the purpose of artificially inflating certain posts.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130092900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships","authors":"Yuan Cheng, Jaehong Park, R. Sandhu","doi":"10.1109/SocialCom-PASSAT.2012.57","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.57","url":null,"abstract":"User-to-user (U2U) relationship-based access control has become the most prevalent approach for modeling access control in online social networks (OSNs), where authorization is typically made by tracking the existence of a U2U relationship of particular type and/or depth between the accessing user and the resource owner. However, today's OSN applications allow various user activities that cannot be controlled by using U2U relationships alone. In this paper, we develop a relationship-based access control model for OSNs that incorporates not only U2U relationships but also user-to-resource (U2R) and resource-to-resource (R2R) relationships. Furthermore, while most access control proposals for OSNs only focus on controlling users' normal usage activities, our model also captures controls on users' administrative activities. Authorization policies are defined in terms of patterns of relationship paths on social graph and the hop count limits of these path. The proposed policy specification language features hop count skipping of resource-related relationships, allowing more flexibility and expressive power. We also provide simple specifications of conflict resolution policies to resolve possible conflicts among authorization policies.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128931935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Identifying Conflict Related Stances in Political Debates","authors":"J. Allwood, Massimo Chindamo, E. Ahlsén","doi":"10.1109/SocialCom-PASSAT.2012.90","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.90","url":null,"abstract":"The purpose of this paper is to discuss some problems in identifying stances and the features that express these stances in televised political debates where there is conflict escalation. The study is based on an analysis of video-recorded political debates in different European languages (Italian (1), German (2) and US-American English (1)) and consists of a qualitative analysis of the videos in order to understand the similarities and differences in the use of social signals for stances in conflict situations in a similar setting (televised political debate) in three western cultures.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial Action Detection Using Block-Based Pyramid Appearance Descriptors","authors":"Bihan Jiang, M. Valstar, M. Pantic","doi":"10.1109/SocialCom-PASSAT.2012.69","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.69","url":null,"abstract":"Facial expression is one of the most important non-verbal behavioural cues in social signals. Constructing an effective face representation from images is an essential step for successful facial behaviour analysis. Most existing face descriptors operate on the same scale, and do not leverage coarse v.s. fine methods such as image pyramids. In this work, we propose the sparse appearance descriptors Block-based Pyramid Local Binary Pattern (B-PLBP) and Block-based Pyramid Local Phase Quantisation (B-PLPQ). The effectiveness of our proposed descriptors is evaluated by a real-time facial action recognition system. The performance of B-PLBP and B-PLPQ is also compared with Block-based Local Binary Patterns (B-LBP) and Block-based Local Phase Quantisation (B-LPQ). The system proposed here enables detection a much larger range of facial behaviour by detecting 22 facial muscle actions (Action Units, AUs), which can be practically applied for social behaviour analysis and synthesis. Results show that our proposed descriptor B-PLPQ outperforms all other tested methods for the problem of FACS Action Unit analysis and that systems which utilise a pyramid representation outperform those that use basic appearance descriptors.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128998843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Behavior Modelling Approach for Churn Prediction in Online Games","authors":"Z. Borbora, J. Srivastava","doi":"10.1109/SocialCom-PASSAT.2012.84","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.84","url":null,"abstract":"Massively Multiplayer Online Role-Playing Games (MMORPGs) are persistent virtual environments where millions of players interact in an online manner. Game logs capture player activities in great detail and user behavior modeling approaches can help to build accurate models of player behavior from these logs. We are interested in modeling player churn behavior and we use a lifecycle-based approach for this purpose. In a player lifecycle-based approach, we analyze the activity traits of churners in the weeks leading up to their point of leaving the game and compare it with the activity traits of a regular player. We identify several intuitive yet distinct behavioral profiles associated with churners and active players which can discriminate between the two populations. We use these insights to propose three semantic dimensions of engagement, enthusiasm and persistence to construct derived features. Using three session-related variables and the features derived from them, we are able to achieve good classification performance with the churn prediction models. Finally, we propose a distance-based classification scheme, which we call wClusterDist, which benefits from these distinct behavioral profiles of the two populations. Experimental results show that the proposed classification scheme is well-suited for this problem formulation and its performance is better than or comparable to other traditional classification schemes.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126635729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Ego Network Structure in Online Social Networks","authors":"V. Arnaboldi, M. Conti, A. Passarella, F. Pezzoni","doi":"10.1109/SocialCom-PASSAT.2012.41","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.41","url":null,"abstract":"Results about offline social networks demonstrated that the social relationships that an individual (ego) maintains with other people (alters) can be organised into different groups according to the ego network model. In this model the ego can be seen as the centre of a series of layers of increasing size. Social relationships between ego and alters in layers close to ego are stronger than those belonging to more external layers. Online Social Networks are becoming a fundamental medium for humans to manage their social life, however the structure of ego networks in these virtual environments has not been investigated yet. In this work we contribute to fill this gap by analysing a large data set of Facebook relationships. We filter the data to obtain the frequency of contact of the relationships, and we check - by using different clustering techniques - whether structures similar to those found in offline social networks can be observed. The results show a strikingly similarity between the social structures in offline and Online Social Networks. In particular, the social relationships in Facebook share three of the most important features highlighted in offline ego networks: (i) they appear to be organised in four hierarchical layers, (ii) the sizes of the layers follow a scaling factor near to three, and (iii) the number of active social relationships is close to the well-known Dunbar's number. These results strongly suggest that, even if the ways to communicate and to maintain social relationships are changing due to the diffusion of Online Social Networks, the way people organise their social relationships seems to remain unaltered.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"13 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115307292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tom Reynaert, Willem De Groef, Dominique Devriese, Lieven Desmet, F. Piessens
{"title":"PESAP: A Privacy Enhanced Social Application Platform","authors":"Tom Reynaert, Willem De Groef, Dominique Devriese, Lieven Desmet, F. Piessens","doi":"10.1109/SocialCom-PASSAT.2012.39","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.39","url":null,"abstract":"Nowadays, social networking sites provide third party application developers with means to access their social graph, by providing a social application platform. Through their users, these developers acquire a significant set of personal information from the social graph. The current protection mechanisms, such as privacy policies and access control mechanisms fall short on protecting the privacy of the users. In this paper we present a framework for a privacy enhanced social application platform, called PESAP, that technically enforces the protection of the personal information of a user, when interacting with social applications. The framework is based on two pillars: anonymization of the social graph and secure information flow inside the browser. PESAP is targeted to be as compatible as possible with the current state-of-the-art design of social application platforms, while technically enforcing the protection of user privacy. We evaluate this compliance, based on a classification of applications in different categories.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122523215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Vallina-Rodriguez, S. Scellato, H. Haddadi, C. Forsell, J. Crowcroft, C. Mascolo
{"title":"Los Twindignados: The Rise of the Indignados Movement on Twitter","authors":"N. Vallina-Rodriguez, S. Scellato, H. Haddadi, C. Forsell, J. Crowcroft, C. Mascolo","doi":"10.1109/SOCIALCOM-PASSAT.2012.120","DOIUrl":"https://doi.org/10.1109/SOCIALCOM-PASSAT.2012.120","url":null,"abstract":"Twitter has already become an important facet of the social Web, allowing users and organizations to share their ideas and subscribe to others' updates. Notably, it has been actively used during political events such as the recent elections in Iran, Spain and the USA, or the uprisings in the Middle East, to the extent that it is claimed that revolutions will be tweeted. However such claims are yet to be empirically established. In this work we study an extensive set of millions of tweets themed around the 2011 regional and local elections in Spain and their accompanying civil unrest. Our analysis shows that mainstream political entities were overshadowed on Twitter by grassroots movements discussing alternative points of view, at both regional and national levels. By tracking temporal trends we discover an explosion of interest in the Spanish protests following the establishment of the first protest camps in Madrid. The subsequent spontaneous setting up of similar camps in almost every town in Spain was widely reported at the time, and our spatial analysis quantitatively attests that the protests were indeed widely discussed in all parts of the country. Our results suggest that online social networks serve more as media for interactive engagement between grassroots peers, rather than as platforms for politicians to attract mass attention.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133437047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correlating a Persona to a Person","authors":"Jason W. Clark","doi":"10.1109/SocialCom-PASSAT.2012.23","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.23","url":null,"abstract":"Participation in online social networks (OSNs) such as Facebook, LinkedIn, and Twitter has dramatically increased over the years. For example, it is estimated that Facebook has more than eight hundred million registered users. The popularity of OSNs has increased the sheer amount of personal information on the Internet. In this paper, we introduce a profiling and tracking attack that correlates a visitor's online persona that is captured from a seemingly innocuous website with that of the same visitor's real Facebook profile. We compare this with the analytics captured from a custom Facebook Fan Page to show how we can identify the visitor given only their online persona. Furthermore, we create a Facebook application that is linked from the custom website and Fan Page. This application when, accessed and allowed by a visitor (assuming they have a Facebook account), will capture their profile. We tie the analytics captured by the custom website and the Fan Page with that of the profiling and tracking enabled application. Our stated hypothesis is: The majority of visitors can be profiled, tracked, and led to reveal their identity by an adversary who uses website analytic tools. This is because of the actions the visitor performs on the Internet and the information they freely display on their Facebook profiles. We analyze the online behavior of 25 participants and our results show we are able to correctly determine 16 of 25 or 64% of them. We focus on the ramifications of this research and provide defense mechanisms to help protect OSN users.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114992741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}