Claudia Wagner, Matthew Rowe, M. Strohmaier, Harith Alani
{"title":"Ignorance Isn't Bliss: An Empirical Analysis of Attention Patterns in Online Communities","authors":"Claudia Wagner, Matthew Rowe, M. Strohmaier, Harith Alani","doi":"10.1109/SocialCom-PASSAT.2012.33","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.33","url":null,"abstract":"Online community managers work towards building and managing communities around a given brand or topic. Arisk imposed on such managers is that their community may die out and its utility diminish to users. Understanding what drives attention to content and the dynamics of discussions in a given community informs the community manager and/or host with the factors that are associated with attention, allowing them to detect a reduction in such factors. In this paper we gain insights into the idiosyncrasies that individual community forums exhibit in their attention patterns and how the factors that impact activity differ. We glean such insights through a two-stage approach that functions by (i) differentiating between seed posts - i.e. posts that solicit a reply - and non-seed posts - i.e. posts that did not get any replies, and (ii) predicting the level of attention that seed posts will generate. We explore the effectiveness of a range of features for predicting discussions and analyse their potential impact on discussion initiation and progress. Our findings show that the discussion behaviour of different communities exhibit interesting differences in terms of how attention is generated. Our results show amongst others that the purpose of a community as well as the specificity of the topic of a community impact which factors drive the reply behaviour of a community. For example, communities around very specific topics require posts to fit to the topical focus of the community in order to attract attention while communities around more general topics do not have this requirement. We also found that the factors which impact the start of discussions in communities often differ from the factors which impact the length of discussions.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130177068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Claudia Wagner, Q. Liao, P. Pirolli, Les Nelson, M. Strohmaier
{"title":"It's Not in Their Tweets: Modeling Topical Expertise of Twitter Users","authors":"Claudia Wagner, Q. Liao, P. Pirolli, Les Nelson, M. Strohmaier","doi":"10.1109/SocialCom-PASSAT.2012.30","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.30","url":null,"abstract":"One of the key challenges for users of social media is judging the topical expertise of other users in order to select trustful information sources about specific topics and to judge credibility of content produced by others. In this paper, we explore the usefulness of different types of user-related data for making sense about the topical expertise of Twitter users. Types of user-related data include messages a user authored or re-published, biographical information a user published on his/her profile page and information about user lists to which a user belongs. We conducted a user study that explores how useful different types of data are for informing human's expertise judgements. We then used topic modeling based on different types of data to build and assess computational expertise models of Twitter users. We use We follow directories as a proxy measurement for perceived expertise in this assessment. Our findings show that different types of user-related data indeed differ substantially in their ability to inform computational expertise models and humans's expertise judgements. Tweets and retweets - which are often used in literature for gauging the expertise area of users - are surprisingly useless for inferring the expertise topics of their authors and are outperformed by other types of user-related data such as information about users' list memberships. Our results have implications for algorithms, user interfaces and methods that focus on capturing expertise of social media users.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132150022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Computational Formalism for a Grounding Model of Cultural Transmission","authors":"J. Pfau, L. Sonenberg, Y. Kashima","doi":"10.1109/SocialCom-PASSAT.2012.81","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.81","url":null,"abstract":"Computational models of the transmission of cultural information usually neglect that cultural transmission between individuals occurs mainly as a consequence of complex social interactions. We analyze the requirements for a computational model of a social psychological theory of cultural transmission, a theory which postulates that actors in a joint activity build on their common ground to align their information to a degree sufficient for them to carry out their activity. This grounding process adds to their common ground and thus contributes to a diffusion of cultural information. The proposed tentative formal account exploits the Shared Plan model of joint activities and uses an argumentation-based dialogue as the representation of the grounding process. This work advances the social-psychological study of cultural dynamics and the exploration of computational methods for the modeling of social systems.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130543691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correlating Risk Findings to Quantify Risk","authors":"Aaron D. Sanders, Tong Sun, Yin Pan, Bo Yuan","doi":"10.1109/SocialCom-PASSAT.2012.95","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.95","url":null,"abstract":"Research in quantitative Information Technology (IT) risk analysis has increased in the past decade, but much of that research has focused on creating new approaches that replace existing ones. Since organizations have extensive sunk costs invested in their risk management programs, there exists a need to extend and improve existing approaches. Additionally, many quantitative approaches are difficult to implement without mathematical expertise or specialized tools, focus on quantifying individual vulnerabilities, provide little insight into underlying process gaps affecting IT risk and do not facilitate including environmental factors in risk ratings. Our research focuses on identifying attributes or characteristics of risk that are missing from existing approaches, and quantifying their relevance using statistical analysis techniques. We seek to identify and quantify attributes that further close the gap between enumerating IT risks and understanding the actual risk they present. In this paper we identify the relationship between risk findings as a key attribute, and demonstrate using correlation to quantify the relationship. Correlation analysis enables organizations to uncover process gaps, and situations where default risk ratings may not be sufficient. In this paper, we discuss the benefits of correlating risk findings and demonstrate value and feasibility through an empirical case study.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116161099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Motahareh Eslami Mehdiabadi, H. Rabiee, Mostafa Salehi
{"title":"Diffusion-Aware Sampling and Estimation in Information Diffusion Networks","authors":"Motahareh Eslami Mehdiabadi, H. Rabiee, Mostafa Salehi","doi":"10.1109/SocialCom-PASSAT.2012.98","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.98","url":null,"abstract":"Partially-observed data collected by sampling methods is often being studied to obtain the characteristics of information diffusion networks. However, these methods usually do not consider the behavior of diffusion process. In this paper, we propose a novel two-step (sampling/estimation) measurement framework by utilizing the diffusion process characteristics. To this end, we propose a link-tracing based sampling design which uses the infection times as local information without any knowledge about the latent structure of diffusion network. To correct the bias of sampled data, we introduce three estimators for different categories, link-based, node-based, and cascade-based. To the best of our knowledge, this is the first attempt to introduce a complete measurement framework for diffusion networks. We also show that the estimator plays an important role in correcting the bias of sampling from diffusion networks. Our comprehensive empirical analysis over large synthetic and real datasets demonstrates that in average, the proposed framework outperforms the common BFS and RW sampling methods in terms of link-based characteristics by about 37% and 35%, respectively.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128989035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TrustFraMM: Meta Description for Trust Frameworks","authors":"Mark Vinkovits, Andreas Zimmermann","doi":"10.1109/SocialCom-PASSAT.2012.63","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.63","url":null,"abstract":"Due to the boom in trust research new Trust Frameworks are created within short time intervals providing specific solutions for different domains. But these frameworks miss a common understanding and shared description. Based on available categorizations and surveys we collected key components already identified within Trust Management and created a generally applicable meta-model, which aims at creating the common ground for future trust research in computer science. This model consists of well-defined elements, procedures and relations. By applying our model to existing frameworks we show that it is sound. This process also led to the identification of common implementations of our meta-model elements and to the definition of their interfaces. These elements will be able to support future research and system design.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117042611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Henry Nnoli, Dale Lindskog, P. Zavarsky, S. Aghili, Ron Ruhl
{"title":"The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches","authors":"Henry Nnoli, Dale Lindskog, P. Zavarsky, S. Aghili, Ron Ruhl","doi":"10.1109/SocialCom-PASSAT.2012.109","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.109","url":null,"abstract":"Today, the ability to investigate internal matters such as policy violations, regulatory compliance, and employee separation has become important in order for corporations to manage risk. The degree of information security threats evolving on a daily basis has increasingly raised concerns for enterprise organizations. These threats include but are not limited to fraud, insider threat and intellectual property (IP) theft. These have increased the demand for organizations to implement corporate forensics as a deterrent to illegitimate acts or for linking perpetrators to their illegitimate acts. This explains why forensic practices are expanding from the traditional role in law enforcement and becoming an essential part of business processes. However, most organizations may not be maximizing the benefits of corporate forensic capabilities because of lack of corporate forensic governance best practices, needed to ensure organizations prepare their operating environment for digital forensic investigation. Corporate forensic governance will help ensure that digital evidence is obtained in an efficient and effective way with minimal interruption to the business. This paper presents a corporate forensic governance framework intended to enhance forensic readiness, governance, and management, and increase the use of automated forensic techniques and in-house forensically sound practices in large organizations that have a need for these practices.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"518 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123113691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"What Makes Communities Tick? Community Health Analysis Using Role Compositions","authors":"Matthew Rowe, Harith Alani","doi":"10.1109/SocialCom-PASSAT.2012.18","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.18","url":null,"abstract":"Today's Web is social and largely driven by a wide variety of online communities. Many such communities are owned and managed by businesses that draw much value from these communities, in the form of efficient and cheaper customer support, generation of new ideas, fast spreading of information, etc. Understanding how to measure the health of online communities and how to predict its change over time, whether to better or to worse health, is key to developing methods and policies for supporting these communities and managing them more efficiently. In this paper we investigate the prediction of community health based on the social behaviour exhibited by their members. We apply our analysis over 25 SAP online communities, and demonstrate the feasibility of using behaviour analysis to predict change in their health metrics. We show that accuracy of health prediction increases when using community-specific prediction models, rather than using a one-model-fits-all approach.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130880485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Masunaga, Kazunari Ito, Taro Yabuki, Takeshi Morita
{"title":"Edit Conflict Resolution in WikiBOK: A Wiki-Based BOK Formulation-Aid System for New Disciplines","authors":"Y. Masunaga, Kazunari Ito, Taro Yabuki, Takeshi Morita","doi":"10.1109/SOCIALCOM-PASSAT.2012.24","DOIUrl":"https://doi.org/10.1109/SOCIALCOM-PASSAT.2012.24","url":null,"abstract":"A body of knowledge (BOK) of an academic field is an indispensable aid not only to people's understanding of the entirety of a targeted academic field, but also to designing a perfect curriculum of that field for educational purposes. However, in contrast to a BOK for a mature discipline such as computer science, the formulation of a BOK for a new discipline, such as social informatics, life science, and sustainability science, is difficult because academics in such a new discipline cannot present it in its entirety par advance. Therefore, a bottom-up and open collaborative approach based on collective intelligence seems promising, and contrasts strongly with the traditional style in which a BOK is formulated: by the authorities in the field in a top-down manner. WikiBOK is a wiki-based body of knowledge (BOK) formulation-aid system for new disciplines. It is developed based on BOK+, which is a novel BOK formulation principle for new disciplines that enables us to construct a BOK in a bottom-up manner. As its name indicates, WikiBOK uses Semantic Media Wiki (SMW) to facilitate its fundamental functions. A rich graphical user interface is provided using open source graph visualization software. The main objective of this paper is to illustrate how edit conflicts are resolved in WikiBOK. Needless to say, edit conflicts are unavoidable when WikiBOKers collaborate to formulate a BOK-tree. A WikiBOK edit conflict resolution principle is shown, and the WikiBOK Edit Conflict Resolver is implemented based on this principle. Social Informatics BOK (SIBOK) is under construction using WikiBOK.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131243426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefan Magureanu, Nima Dokoohaki, Shahab Mokarizadeh, M. Matskin
{"title":"Epidemic Trust-Based Recommender Systems","authors":"Stefan Magureanu, Nima Dokoohaki, Shahab Mokarizadeh, M. Matskin","doi":"10.1109/SocialCom-PASSAT.2012.94","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.94","url":null,"abstract":"Collaborative filtering(CF) recommender systems are among the most popular approaches to solving the information overload problem in social networks by generating accurate predictions based on the ratings of similar users. Traditional CF recommenders suffer from lack of scalability while decentralized CF recommenders (DHT-based, Gossip-based etc.) have promised to alleviate this problem. Thus, in this paper we propose a decentralized approach to CF recommender systems that uses the T-Man algorithm to create and maintain an overlay network that in turn would facilitate the generation of recommendations based on local information of a node. We analyse the influence of the number of rounds and neighbors on the accuracy of prediction and item coverage and we propose a new approach to inferring trust values between a user and its neighbors. Our experiment son two datasets show an improvement of prediction accuracy relative to previous approaches while using a highly scalable, decentralized paradigm. We also analyse item coverage and show that our system is able to generate predictions for significant fraction of the users, which is comparable with the centralized approaches.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"62 25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125371827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}