2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing最新文献

筛选
英文 中文
Speech, Emotion, Age, Language, Task, and Typicality: Trying to Disentangle Performance and Feature Relevance 言语、情感、年龄、语言、任务和典型性:试图理清表现和特征相关性
E. Marchi, A. Batliner, Björn Schuller, Shimrit Fridenzon, Shahar Tal, O. Golan
{"title":"Speech, Emotion, Age, Language, Task, and Typicality: Trying to Disentangle Performance and Feature Relevance","authors":"E. Marchi, A. Batliner, Björn Schuller, Shimrit Fridenzon, Shahar Tal, O. Golan","doi":"10.1109/SocialCom-PASSAT.2012.97","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.97","url":null,"abstract":"The availability of speech corpora is positively correlated with typicality: The more typical the population is we draw our sample from, the easier it is to get enough data. The less typical the envisaged population is, the more difficult it is to get enough data. Children with Autism Spectrum Condition are atypical in several respect: They are children, they might have problems with an experimental setting where their speech should be recorded, and they belong to a specific subgroup of children. Thus we address two possible strategies: First, we analyse the feature relevance for samples taken from different populations, this is not directly improving performances but we found additional specific features within specific groups. Second, we perform cross-corpus experiments to evaluate if enriching the training data with data obtained from similar populations can increase classification performances. In this pilot study we therefore use four different samples of speakers, all of them producing one and the same emotion and in addition, the neutral state. We used two publicly available databases, the Berlin Emotional Speech database and the FAU Aibo Corpus, in addition to our own ASC-Inclusion database.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131874370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Legislation and Privacy across Borders 跨境立法和隐私
Leah E. Glass, Robert Gresko
{"title":"Legislation and Privacy across Borders","authors":"Leah E. Glass, Robert Gresko","doi":"10.1109/SocialCom-PASSAT.2012.135","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.135","url":null,"abstract":"This paper explores the influences of cultural values and government structure on technology-based privacy legislation. The following geographic areas are analyzed to better understand this relationship: the United States (U.S.), the European Union (EU), China, and India. Using three primary cultural dimensions from the extensive studies of Geert Hofstede, the findings reveal a significant connection between the strength of certain cultural traits and whether the government is reactive or proactive to technology-based privacy breaches.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132554892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Talking Places: Modelling and Analysing Linguistic Content in Foursquare Talking Places:建模和分析Foursquare中的语言内容
Sandro Bauer, A. Noulas, Diarmuid Ó Séaghdha, S. Clark, C. Mascolo
{"title":"Talking Places: Modelling and Analysing Linguistic Content in Foursquare","authors":"Sandro Bauer, A. Noulas, Diarmuid Ó Séaghdha, S. Clark, C. Mascolo","doi":"10.1109/SocialCom-PASSAT.2012.107","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.107","url":null,"abstract":"The advent of online social media and the growing popularity of sensor-equipped mobile devices have created a vast landscape of location-aware applications and services. This goldmine of data, including temporal and spatial information of unprecedented granularity, can help researchers gain insights into the behavioural patterns of people at a global scale. Here we analyse the textual content of millions of comments published alongside Foursquare user check-ins. For this, we extend a standard topic modelling approach so that it explicitly takes into account geographic and temporal side information. The framework is applied to Foursquare data and used to detect the dominant topics in the neighbourhoods of a city. In particular, we present the most prominent topics discussed by Foursquare users in New York, London, Chicago and San Francisco. We characterize the topics' spatial coverage and temporal evolution, and we also highlight some cultural idiosyncrasies. Finally, we evaluate the novel spatio-temporal topic model quantitatively. We believe that our model may be a useful tool for social scientists and application developers.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114258487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Predicting the Evolution of Social Networks: Optimal Time Window Size for Increased Accuracy 预测社会网络的演变:提高准确性的最佳时间窗口大小
M. Budka, Katarzyna Musial, K. Juszczyszyn
{"title":"Predicting the Evolution of Social Networks: Optimal Time Window Size for Increased Accuracy","authors":"M. Budka, Katarzyna Musial, K. Juszczyszyn","doi":"10.1109/SocialCom-PASSAT.2012.11","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.11","url":null,"abstract":"This study investigates the data preparation process for predictive modelling of the evolution of complex networked systems, using an e -- mail based social network as an example. In particular, we focus on the selection of optimal time window size for building a time series of network snapshots, which forms the input of chosen predictive models. We formulate this issue as a constrained multi -- objective optimization problem, where the constraints are specific to a particular application and predictive algorithm used. The optimization process is guided by the proposed Windows Incoherence Measures, defined as averaged Jensen-Shannon divergences between distributions of a range of network characteristics for the individual time windows and the network covering the whole considered period of time. The experiments demonstrate that the informed choice of window size according to the proposed approach allows to boost the prediction accuracy of all examined prediction algorithms, and can also be used for optimally defining the prediction problems if some flexibility in their definition is allowed.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124968748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Characterizing the Internet's Sense of Humor 网络幽默感的特征
A. Mahapatra, Nisheeth Srivastava, J. Srivastava
{"title":"Characterizing the Internet's Sense of Humor","authors":"A. Mahapatra, Nisheeth Srivastava, J. Srivastava","doi":"10.1109/SocialCom-PASSAT.2012.105","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.105","url":null,"abstract":"In this paper, we report some results from the first internet content-based investigation of the underlying causes of humor. For this purpose, we developed a methodology for extracting semantic distance from tags associated with YouTube videos manually identified as humorous or not by their existing community of users. We found that a novel quantification of episodic incongruity, operationalized via our technique, proves to be a necessary but not sufficient condition for the existence of humor-inducing stimuli in associated videos. Our results represent the first internet-based validation of incongruity-based characterizations of humor, and open up exciting new theoretical and applied possibilities in the use of social computing to discover intrinsic factors responsible for human behaviors like humor, interest and engagement.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127907831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic Estimation of Rater Reliability in Subjective Tasks Using Multi-armed Bandits 基于多臂强盗的主观任务评价信度动态估计
Alexey Tarasov, Sarah Jane Delany, Brian Mac Namee
{"title":"Dynamic Estimation of Rater Reliability in Subjective Tasks Using Multi-armed Bandits","authors":"Alexey Tarasov, Sarah Jane Delany, Brian Mac Namee","doi":"10.1109/SocialCom-PASSAT.2012.50","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.50","url":null,"abstract":"Many application areas that use supervised machine learning make use of multiple raters to collect target ratings for training data. Usage of multiple raters, however, inevitably introduces the risk that a proportion of them will be unreliable. The presence of unreliable raters can prolong the rating process, make it more expensive and lead to inaccurate ratings. The dominant, \"static\" approach of solving this problem in state-of-the-art research is to estimate the rater reliability and to calculate the target ratings when all ratings have been gathered. However, doing it dynamically while raters rate training data can make the acquisition of ratings faster and cheaper compared to static techniques. We propose to cast the problem of the dynamic estimation of rater reliability as a multi-armed bandit problem. Experiments show that the usage of multi-armed bandits for this problem is worthwhile, providing that each rater can rate any asset when asked. The purpose of this paper is to outline the directions of future research in this area.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121247914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Implementation of a Full EMV Smartcard for a Point-of-Sale Transaction and Its Impact on the PCI DSS 在销售点交易中使用全EMV智能卡及其对PCI DSS的影响
O. Ogundele, P. Zavarsky, Ron Ruhl, Dale Lindskog
{"title":"The Implementation of a Full EMV Smartcard for a Point-of-Sale Transaction and Its Impact on the PCI DSS","authors":"O. Ogundele, P. Zavarsky, Ron Ruhl, Dale Lindskog","doi":"10.1109/SocialCom-PASSAT.2012.80","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.80","url":null,"abstract":"This paper argues that given the relevant known vulnerabilities and attacks against the EMV (named after Euro pay, MasterCard and Visa) technology, if the combined dynamic data authentication (CDA) card variant of the EMV payment card is deployed in a full EMV environment for point of sale terminal (POS) transaction, it becomes unnecessary to comply with the Payment Card Industry Data Security Standard (PCI DSS) unless the merchant with the POS terminal has been exposed to proven breach and even in that case the damage caused is likely to be minimal.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116700049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Mutual Stance Building in Dyad of Virtual Agents: Smile Alignment and Synchronisation 双虚拟体的相互姿态建立:微笑对齐与同步
K. Prepin, M. Ochs, C. Pelachaud
{"title":"Mutual Stance Building in Dyad of Virtual Agents: Smile Alignment and Synchronisation","authors":"K. Prepin, M. Ochs, C. Pelachaud","doi":"10.1109/SocialCom-PASSAT.2012.134","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.134","url":null,"abstract":"When we consider communication, the \"interactivenature of dialog supports interactive alignment of linguistic representations\" [1]. However, verbal communication cannot be reduced to speech. Non-verbal behaviours (NVBs) of interactantsare also taking part in interactive alignment. Based on NVBs alignment, this paper proposes a model of mutual building of stance between virtual agents. In this model, we focus on the the social signal of smile. Indeed, smiles are particular non-verbal markers of agents' stances: their characteristics in terms of facial and dynamical patterns leads to discriminate stances as for instance politeness or amusement. We propose a model combining alignment of types of smile and alignement of timing of smiles (synchronisation). This model enables a dyad of agents to mutually build a common stance, to align on a shared social stance.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116490115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Content Based Microblogger Recommendation 基于内容的微博推荐
H. Celebi, Suzan Üsküdarli
{"title":"Content Based Microblogger Recommendation","authors":"H. Celebi, Suzan Üsküdarli","doi":"10.1109/SocialCom-PASSAT.2012.124","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.124","url":null,"abstract":"Micro logs are social networking systems, where users frequently contribute very short (micro) posts. Micro loggers follow others' posts via subscription. However, it is a challenge to determine micro loggers worthy of following, since their contributions are fragmented amidst numerous and various tiny posts. Furthermore, micro posts typically include abbreviations, mispeled words, special tokens, and are not grammatically correct. Consequently, typical NLP techniques are often not very useful in determining what a user posts about. This work proposes a content-based, as opposed to friendship-based, micro blogger recommendation model, where given an user query a ranked list of microbloggers is produced. This paper presents the recommendation model, a prototype implementation, an user evaluation.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116637639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Mining Privacy Settings to Find Optimal Privacy-Utility Tradeoffs for Social Network Services 挖掘隐私设置以找到社交网络服务的最佳隐私效用权衡
Shumin Guo, Keke Chen
{"title":"Mining Privacy Settings to Find Optimal Privacy-Utility Tradeoffs for Social Network Services","authors":"Shumin Guo, Keke Chen","doi":"10.1109/SocialCom-PASSAT.2012.22","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.22","url":null,"abstract":"Privacy has been a big concern for users of social network services (SNS). On recent criticism about privacy protection, most SNS now provide fine privacy controls, allowing users to set visibility levels for almost every profile item. However, this also creates a number of difficulties for users. First, SNS providers often set most items by default to the highest visibility to improve the utility of social network, which may conflict with users' intention. It is often formidable for a user to fine-tune tens of privacy settings towards the user desired settings. Second, tuning privacy settings involves an intricate tradeoff between privacy and utility. When you turn off the visibility of one item to protect your privacy, the social utility of that item is turned off as well. It is challenging for users to make a tradeoff between privacy and utility for each privacy setting. We propose a framework for users to conveniently tune the privacy settings towards the user desired privacy level and social utilities. It mines the privacy settings of a large number of users in a SNS, e.g., Facebook, to generate latent trait models for the level of privacy concern and the level of utility preference. A tradeoff algorithm is developed for helping users find the optimal privacy settings for a specified level of privacy concern and a personalized utility preference. We crawl a large number of Facebook accounts and derive the privacy settings with a novel method. These privacy setting data are used to validate and showcase the proposed approach.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130811221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信