{"title":"通过阅读/发布分析对在线社交网络上的异常注意力进行建模","authors":"Zijian Zhang, J. Liu","doi":"10.1109/SPAC.2017.8304266","DOIUrl":null,"url":null,"abstract":"Online social platforms revolutionarize the way in which people communicate, shattering physical boundaries and bringing people together in the virtual environment. While users are able to access information and share knowledge with unprecedented ease and openness, danger also lurks in the dark. Social networks have the potential to draw unwanted and anomalous attention to their users. Through online social networks, the daily routines of an individual may be under constant surveillance of others. Such risks are closely associated with information leakage, and have posed serious privacy and safety concerns. This paper investigates such risks, which are typically captured by excessive, unprecedented and persistent gathering of personal information through the cyberspace. We focus on ways to mitigate such risks through formalizing the concepts of anomalous attention. This is a challenging question, as such behaviors are usually victim-defined and often occurs without visible trace. Viewing a network as interconnected nodes who exchange information through posting and reading messages, we provide an abstract model of attention, and quantify the level of attention a user pays towards another. Analyzing the sequence of attention between pairs of users in the network allow one to capture anomalous activities.","PeriodicalId":161647,"journal":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Modeling anomalous attention over an online social network through read/post analytics\",\"authors\":\"Zijian Zhang, J. Liu\",\"doi\":\"10.1109/SPAC.2017.8304266\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Online social platforms revolutionarize the way in which people communicate, shattering physical boundaries and bringing people together in the virtual environment. While users are able to access information and share knowledge with unprecedented ease and openness, danger also lurks in the dark. Social networks have the potential to draw unwanted and anomalous attention to their users. Through online social networks, the daily routines of an individual may be under constant surveillance of others. Such risks are closely associated with information leakage, and have posed serious privacy and safety concerns. This paper investigates such risks, which are typically captured by excessive, unprecedented and persistent gathering of personal information through the cyberspace. We focus on ways to mitigate such risks through formalizing the concepts of anomalous attention. This is a challenging question, as such behaviors are usually victim-defined and often occurs without visible trace. Viewing a network as interconnected nodes who exchange information through posting and reading messages, we provide an abstract model of attention, and quantify the level of attention a user pays towards another. Analyzing the sequence of attention between pairs of users in the network allow one to capture anomalous activities.\",\"PeriodicalId\":161647,\"journal\":{\"name\":\"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SPAC.2017.8304266\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPAC.2017.8304266","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Modeling anomalous attention over an online social network through read/post analytics
Online social platforms revolutionarize the way in which people communicate, shattering physical boundaries and bringing people together in the virtual environment. While users are able to access information and share knowledge with unprecedented ease and openness, danger also lurks in the dark. Social networks have the potential to draw unwanted and anomalous attention to their users. Through online social networks, the daily routines of an individual may be under constant surveillance of others. Such risks are closely associated with information leakage, and have posed serious privacy and safety concerns. This paper investigates such risks, which are typically captured by excessive, unprecedented and persistent gathering of personal information through the cyberspace. We focus on ways to mitigate such risks through formalizing the concepts of anomalous attention. This is a challenging question, as such behaviors are usually victim-defined and often occurs without visible trace. Viewing a network as interconnected nodes who exchange information through posting and reading messages, we provide an abstract model of attention, and quantify the level of attention a user pays towards another. Analyzing the sequence of attention between pairs of users in the network allow one to capture anomalous activities.