scholarly journals Rumour prevention in social networks with layer 2 blockchains

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Subhasis Thakur ◽  
John G. Breslin

AbstractSocial bots can cause social, political, and economical disruptions by spreading rumours. The state-of-the-art methods to prevent social bots from spreading rumours are centralised and such solutions may not be accepted by users who may not trust a centralised solution being biased. In this paper, we developed a decentralised method to prevent social bots. In this solution, the users of a social network create a secure and privacy-preserving decentralised social network and may accept social media content if it is sent by its neighbour in the decentralised social network. As users only choose their trustworthy neighbours from the social network to be part of its neighbourhood in the decentralised social network, it prevents the social bots to influence a user to accept and share a rumour. We prove that the proposed solution can significantly reduce the number of users who are share rumour.

Author(s):  
Sanjay Chhataru Gupta

Popularity of the social media and the amount of importance given by an individual to social media has significantly increased in last few years. As more and more people become part of the social networks like Twitter, Facebook, information which flows through the social network, can potentially give us good understanding about what is happening around in our locality, state, nation or even in the world. The conceptual motive behind the project is to develop a system which analyses about a topic searched on Twitter. It is designed to assist Information Analysts in understanding and exploring complex events as they unfold in the world. The system tracks changes in emotions over events, signalling possible flashpoints or abatement. For each trending topic, the system also shows a sentiment graph showing how positive and negative sentiments are trending as the topic is getting trended.


2020 ◽  
Vol 144 ◽  
pp. 26-35
Author(s):  
Rem V. Ryzhov ◽  
◽  
Vladimir A. Ryzhov ◽  

Society is historically associated with the state, which plays the role of an institution of power and government. The main task of the state is life support, survival, development of society and the sovereignty of the country. The main mechanism that the state uses to implement these functions is natural social networks. They permeate every cell of society, all elements of the country and its territory. However, they can have a control center, or act on the principle of self-organization (network centrism). The web is a universal natural technology with a category status in science. The work describes five basic factors of any social network, in particular the state, as well as what distinguishes the social network from other organizational models of society. Social networks of the state rely on communication, transport and other networks of the country, being a mechanism for the implementation of a single strategy and plan. However, the emergence of other strong network centers of competition for state power inevitably leads to problems — social conflicts and even catastrophes in society due to the destruction of existing social institutions. The paper identifies the main pitfalls using alternative social networks that destroy the foundations of the state and other social institutions, which leads to the loss of sovereignty, and even to the complete collapse of the country.


2019 ◽  
Author(s):  
Arlika Anindya Putri

Purpose – The purpose of this study is to develop a structural equation model to explain the complexrelationship between social network and firm performance by introducing the mediating role of trust, sellingcapability and pricing capability.Design/methodology/approach – The research model with hypothesis development was derived basedon the literature. To provide empirical evidence, this study carried out a survey in which the data wereequated with a list of questionnaires with a random survey of 380 small and medium enterprises (SMEs) inthe Indonesian context.Findings – This study indicates that the use of social media in management process will not affect theincreasing firm performance, unless the firms build trust upon social networks. The social network with trustallows the firms to gain a pricing capability and a selling capability, which brings a positive impact on firmperformance. The results also show that the selling and the pricing capabilities become essential following theutilizing the social media, which concerns on trust building.Research limitations/implications – This study focused on the small-to-medium context, which hasconventionally provided an exemplary site for the development of social capital theory but raises issues ofgeneralizability across different contexts.Practical implications – To the managers, it is advisable to encourage their employees to consciouslyexploit the selling capability by enhancing the business networks via social media to achieve the firmperformance.Originality/value – This paper contributes to the social capital theory by explaining the mediating role oftrust in the complex relationship between social network and firm performance. This study provides evidencethat trust plays a pivotal role in social networks, which enable the observed firms to achieve the performance.


2021 ◽  
Vol 15 (1) ◽  
pp. 153-172
Author(s):  
Preetish Ranjan ◽  
Abhishek Vaish

A free and easily accessible platform for sharing information over social media has its negatives. It is being misused to intimidate others by exploiting the trust factor inherent within it. This paper is on the persistent pursuit of offering an exquisite solution to address this possible misuse of social media also called STAs and their subsequent impacts on society. These attacks are very sensitive to society and often organized groups with a high skill set are involved to disguise the security agencies. In this work, a model has been proposed to approximate socio-technical attack subject to the structural virality of information in the social network. The work is unique in the sense that previous works are mostly based on statistical values of the network but the proposed work considers the latent structure of the network which is not being reflected from their statistical values. This also paves the way for future researchers to implant other hidden features of nodes and messages circulating within the network which could be helpful for the detection and mitigation of STAs.


Author(s):  
Carson K.-S. Leung ◽  
Irish J. M. Medina ◽  
Syed K. Tanbeer

The emergence of Web-based communities and social networking sites has led to a vast volume of social media data, embedded in which are rich sets of meaningful knowledge about the social networks. Social media mining and social network analysis help to find a systematic method or process for examining social networks and for identifying, extracting, representing, and exploiting meaningful knowledge—such as interdependency relationships among social entities in the networks—from the social media. This chapter presents a system for analyzing the social networks to mine important groups of friends in the networks. Such a system uses a tree-based mining approach to discover important friend groups of each social entity and to discover friend groups that are important to social entities in the entire social network.


Author(s):  
Yi Song ◽  
Xuesong Lu ◽  
Sadegh Nobari ◽  
Stéphane Bressan ◽  
Panagiotis Karras

One is either on Facebook or not. Of course, this assessment is controversial and its rationale arguable. It is nevertheless not far, for many, from the reason behind joining social media and publishing and sharing details of their professional and private lives. Not only the personal details that may be revealed, but also the structure of the networks are sources of invaluable information for any organization wanting to understand and learn about social groups, their dynamics and members. These organizations may or may not be benevolent. It is important to devise, design and evaluate solutions that guarantee some privacy. One approach that reconciles the different stakeholders’ requirement is the publication of a modified graph. The perturbation is hoped to be sufficient to protect members’ privacy while it maintains sufficient utility for analysts wanting to study the social media as a whole. In this paper, the authors try to empirically quantify the inevitable trade-off between utility and privacy. They do so for two state-of-the-art graph anonymization algorithms that protect against most structural attacks, the k-automorphism algorithm and the k-degree anonymity algorithm. The authors measure several metrics for a series of real graphs from various social media before and after their anonymization under various settings.


2016 ◽  
Vol 18 (5) ◽  
pp. 459-477
Author(s):  
Sarah Whitcomb Laiola

This article addresses issues of user precarity and vulnerability in online social networks. As social media criticism by Jose van Dijck, Felix Stalder, and Geert Lovink describes, the social web is a predatory system that exploits users’ desires for connection. Although accurate, this critical description casts the social web as a zone where users are always already disempowered, so fails to imagine possibilities for users beyond this paradigm. This article examines Natalie Bookchin’s composite video series, Testament, as it mobilizes an alt-(ernative) social network of vernacular video on YouTube. In the first place, the alt-social network works as an iteration of “tactical media” to critically reimagine empowered user-to-user interactions on the social web. In the second place, it obfuscates YouTube’s data-mining functionality, so allows users to socialize online in a way that evades their direct translation into data and the exploitation of their social labor.


2014 ◽  
Vol 687-691 ◽  
pp. 1762-1765
Author(s):  
Bao Ding Sun

Due to the emergence of social media in the field of Internet , the structure of tourism as well as its developing pattern has changed a lot, the application of social media enabled the tourists who can take part in more traveling information to exchange ideas. It also can influence the character of the traditional traveling consumers' behavior by the subtle changes in tourism. In this paper, with the analysis of the consumer's behaving habits of using social network platform, it explored the influential factors that contributed to the tourism enterprises, which can be beneficial for making the traveling decisions through the social networks platform.


Author(s):  
William Takahiro Maruyama ◽  
Luciano Antonio Digiampietri

The prediction of relationships in a social network is a complex and extremely useful task to enhance or maximize collaborations by indicating the most promising partnerships. In academic social networks, prediction of relationships is typically used to try to identify potential partners in the development of a project and/or co-authors for publishing papers. This paper presents an approach to predict coauthorships combining artificial intelligence techniques with the state-of-the-art metrics for link predicting in social networks.


2020 ◽  
Vol 11 (10) ◽  
pp. 22-31

Social media allows people to organize themselves and take action against social injustices and policies. Used to spread information, social media has been linked to the dissemination of political protests around the world. Relying on the Theory of Planned Behavior and Herd Behavior, this studied aimed at identifying gender differences in social network protests’ participation. Making use of multivariate data analysis through Partial Least Squares Path Modeling (PLS-SEM), 318 Brazilians responded the study and the results indicate that there are differences between the relationships of the antecedents of the use of the social network between users of different genders. The differences are in the relationship between the attitude and the use of social networks to participate in protests, with a positive effect on men and negative on women. This means that men understand that participating in online protests through social networks can improve awareness of events, giving strength to the movement and helping to ease the tension of protests, while women do not. The results go beyond the studies on which they were based, including the gender multigroup analysis and presenting a new model of technology adoption with new elements, such as the herd behaviour, embracing the imitation, and the uncertainty constructs. There is also a contribution to a greater understanding of the influence of social media on collective activism or movements.


Sign in / Sign up

Export Citation Format

Share Document