scholarly journals A Comparison of Online Social Networks and Real-Life Social Networks: A Study of Sina Microblogging

2014 ◽  
Vol 2014 ◽  
pp. 1-6 ◽  
Author(s):  
Dayong Zhang ◽  
Guang Guo

Online social networks appear to enrich our social life, which raises the question whether they remove cognitive constraints on human communication and improve human social capabilities. In this paper, we analyze the users' following and followed relationships based on the data of Sina Microblogging and reveal several structural properties of Sina Microblogging. Compared with real-life social networks, our results confirm some similar features. However, Sina Microblogging also shows its own specialties, such as hierarchical structure and degree disassortativity, which all mark a deviation from real-life social networks. The low cost of the online network forms a broader perspective, and the one-way link relationships make it easy to spread information, but the online social network does not make too much difference in the creation of strong interpersonal relationships. Finally, we describe the mechanisms for the formation of these characteristics and discuss the implications of these structural properties for the real-life social networks.

Symmetry ◽  
2018 ◽  
Vol 10 (11) ◽  
pp. 654 ◽  
Author(s):  
Jebran Khan ◽  
Sungchang Lee

In this paper, we propose a new scale-free social networks (SNs) evolution model that is based on homophily combined with preferential attachments. Our model enables the SN researchers to generate SN synthetic data for the evaluation of multi-facet SN models that are dependent on users’ attributes and similarities. Homophily is one of the key factors for interactive relationship formation in SN. The synthetic graph generated by our model is scale-invariant and has symmetric relationships. The model is dynamic and sustainable to changes in input parameters, such as number of nodes and nodes’ attributes, by conserving its structural properties. Simulation and evaluation of models for large-scale SN applications need large datasets. One way to get SN data is to generate synthetic data by using SN evolution models. Various SN evolution models are proposed to approximate the real-life SN graphs in previous research. These models are based on SN structural properties such as preferential attachment. The data generated by these models is suitable to evaluate SN models that are structure dependent but not suitable to evaluate models which depend on the SN users’ attributes and similarities. In our proposed model, users’ attributes and similarities are utilized to synthesize SN graphs. We evaluated the resultant synthetic graph by analyzing its structural properties. In addition, we validated our model by comparing its measures with the publicly available real-life SN datasets and previous SN evolution models. Simulation results show our resultant graph to be a close representation of real-life SN graphs with users’ attributes.


2012 ◽  
Vol 2 (4) ◽  
pp. 1-14 ◽  
Author(s):  
Gajendra Sharma ◽  
Li Baoku

Online social network is any electronic tool or application that provides information, allowing collaboration, interaction, and sharing information among users. The social network can be utilized as an e-marketing tool with low-cost and effective source of medium for marketers to identify market needs, customer experiences, competitive movements, and trends. The purpose of this paper is to study the significance of online social networks based on web 2.0 technologies on e-marketing promotion and potential challenging issue as well as needs of ethical standards. The paper adopts a broad literature review relating to e-marketing on online social networks and ethics. This study examines that the ethical issues such as acts, regulations and policies that govern privacy, the collection of personal information and the protection of a user’s identity are crucial when using social network for e-marketing and business promotion. As a communication tool the online social networks play a key role to reach initial product adopters and maintain interaction and collaboration with customers for market promotion.


2014 ◽  
Vol 13 (04) ◽  
pp. 839-864 ◽  
Author(s):  
Dehong Qiu ◽  
Hao Li ◽  
Yuan Li

The rapidly growing online social networks have generated great expectations connected with their potential business values. The aim of this paper is to identify the active valuable nodes that can spread business information to a large fraction of the individuals in large-scale temporal online social networks as quickly as possible. Most studies focus on static social networks, the study on the identification of active valuable nodes in temporal online social networks with quantitative attributes is still young. In this paper, we propose a method to identify active valuable nodes based on their static structural properties and temporal behavioral attributes. The method first chooses the candidates of the active valuable nodes by the static analysis of their structural properties. Then, the candidate's behavioral trend is extracted from its activity records. Through analyzing the spatio-temporal characteristics of the behavioral trend, the method distinguishes active valuable nodes from inactive ones and reveals typical evolutionary processes. We perform experiments on two practical online social networks with thousands of nodes. The experimental results demonstrate that the method can identify the active valuable nodes for information diffusion in large-scale temporal online social networks accurately and efficiently. It would be useful for business applications.


2020 ◽  
Vol 35 (1) ◽  
Author(s):  
A. Can Kurtan ◽  
Pınar Yolum

AbstractImage sharing is a service offered by many online social networks. In order to preserve privacy of images, users need to think through and specify a privacy setting for each image that they upload. This is difficult for two main reasons: first, research shows that many times users do not know their own privacy preferences, but only become aware of them over time. Second, even when users know their privacy preferences, editing these privacy settings is cumbersome and requires too much effort, interfering with the quick sharing behavior expected on an online social network. Accordingly, this paper proposes a privacy recommendation model for images using tags and an agent that implements this, namely pelte. Each user agent makes use of the privacy settings that its user have set for previous images to predict automatically the privacy setting for an image that is uploaded to be shared. When in doubt, the agent analyzes the sharing behavior of other users in the user’s network to be able to recommend to its user about what should be considered as private. Contrary to existing approaches that assume all the images are available to a centralized model, pelte is compatible to distributed environments since each agent accesses only the privacy settings of the images that the agent owner has shared or those that have been shared with the user. Our simulations on a real-life dataset shows that pelte can accurately predict privacy settings even when a user has shared a few images with others, the images have only a few tags or the user’s friends have varying privacy preferences.


2021 ◽  
Vol 9 (1) ◽  
Author(s):  
Sunyoung Park ◽  
Lasse Gerrits

AbstractAlthough migration has long been an imperative topic in social sciences, there are still needs of study on migrants’ unique and dynamic transnational identity, which heavily influences the social integration in the host society. In Online Social Network (OSN), where the contemporary migrants actively communicate and share their stories the most, different challenges against migrants’ belonging and identity and how they cope or reconcile may evidently exist. This paper aims to scrutinise how migrants are manifesting their belonging and identity via different technological types of online social networks, to understand the relations between online social networks and migrants’ multi-faceted transnational identity. The research introduces a comparative case study on an online social movement led by Koreans in Germany via their online communities, triggered by a German TV advertisement considered as stereotyping East Asians given by white supremacy’s point of view. Starting with virtual ethnography on three OSNs representing each of internet generations (Web 1.0 ~ Web 3.0), two-step Qualitative Data Analysis is carried out to examine how Korean migrants manifest their belonging and identity via their views on “who we are” and “who are others”. The analysis reveals how Korean migrants’ transnational identities differ by their expectation on the audience and the members in each online social network, which indicates that the distinctive features of the online platform may encourage or discourage them in shaping transnational identity as a group identity. The paper concludes with the two main emphases: first, current OSNs comprising different generational technologies play a significant role in understanding the migrants’ dynamic social values, and particularly, transnational identities. Second, the dynamics of migrants’ transnational identity engages diverse social and situational contexts. (keywords: transnational identity, migrants’ online social networks, stereotyping migrants, technological evolution of online social network).


2021 ◽  
Vol 15 (3) ◽  
pp. 1-33
Author(s):  
Jingjing Wang ◽  
Wenjun Jiang ◽  
Kenli Li ◽  
Keqin Li

CANDECOMP/PARAFAC (CP) decomposition is widely used in various online social network (OSN) applications. However, it is inefficient when dealing with massive and incremental data. Some incremental CP decomposition (ICP) methods have been proposed to improve the efficiency and process evolving data, by updating decomposition results according to the newly added data. The ICP methods are efficient, but inaccurate because of serious error accumulation caused by approximation in the incremental updating. To promote the wide use of ICP, we strive to reduce its cumulative errors while keeping high efficiency. We first differentiate all possible errors in ICP into two types: the cumulative reconstruction error and the prediction error. Next, we formulate two optimization problems for reducing the two errors. Then, we propose several restarting strategies to address the two problems. Finally, we test the effectiveness in three typical dynamic OSN applications. To the best of our knowledge, this is the first work on reducing the cumulative errors of the ICP methods in dynamic OSNs.


Author(s):  
Abhishek Vaish ◽  
Rajiv Krishna G. ◽  
Akshay Saxena ◽  
Dharmaprakash M. ◽  
Utkarsh Goel

The aim of this research is to propose a model through which the viral nature of an information item in an online social network can be quantified. Further, the authors propose an alternate technique for information asset valuation by accommodating virality in it which not only complements the existing valuation system, but also improves the accuracy of the results. They use a popularly available YouTube dataset to collect attributes and measure critical factors such as share-count, appreciation, user rating, controversiality, and comment rate. These variables are used with a proposed formula to obtain viral index of each video on a given date. The authors then identify a conventional and a hybrid asset valuation technique to demonstrate how virality can fit in to provide accurate results.The research demonstrates the dependency of virality on critical social network factors. With the help of a second dataset acquired, the authors determine the pattern virality of an information item takes over time.


2019 ◽  
Vol 10 ◽  
pp. 35
Author(s):  
Andrey  Rodrigues ◽  
Natasha  M. C. Valentim ◽  
Eduardo  Feitosa

In the last few years, Online Social Networks (OSN) have experienced growth in the number of users, becoming an increasingly embedded part of people’s daily lives. Privacy expectations of OSNs are higher as more members start realizing potential privacy problems they face by interacting with these systems. Inspection methods can be an effective alternative for addressing privacy problems because they detect possible defects that could be causing the system to behave in an undesirable way. Therefore, we proposed a set of privacy inspection techniques called PIT-OSN (Privacy Inspection Techniques for Online Social Network). This paper presents the description and evolution of PIT-OSN through the results of a preliminary empirical study. We discuss the quantitative and qualitative results and their impact on improving the techniques. Results indicate that our techniques assist non-expert inspectors uncover privacy problems effectively, and are considered easy to use and useful by the study participants. Finally, the qualitative analysis helped us improve some technique steps that might be unclear.


2019 ◽  
Vol 1 ◽  
pp. 1-2
Author(s):  
Clio Andris ◽  
Dipto Sarkar

<p><strong>Abstract.</strong> Interpersonal relationships are an important part of social and personal health. Studies of social capital show that individuals and communities with stronger ties are have an economic and health advantage. Yet, loneliness and isolation are becoming major public health issues. There is a pressing need to measure where relationships are strong and how accessible one’s social ties are, in order to learn how to better support face-to-face meetings and promote social health in society. However, the datasets we use to study people and human behaviour are most often mobility data and census data &amp;ndash; which tell us little about personal relationships. These data can be augmented with information about where people have ties, and how their relationships unfold over geographic space. The data we use to study the built environment include building footprints and infrastructure, and we can annotate these data by how (well) infrastructure supports different kinds of relationships, in order to ask new questions about how the landscape encourages relationships.</p><p> We suggest a list of methods for representing interpersonal relationships and social life at various socio-spatial levels of aggregation. We give an example of each, with an effort to span various use cases and spatial scales of data modelling.</p><p> <strong>Dyads (line) and Ego-based (star):</strong> This geometric model represents a relationship between two individuals (Figure 1A). The individuals can be geolocated to households, administrative units, real-time locations, etc. The tie can be given a nominal category such as family or co-worker, and edge weights that signify reported relationship strength, frequency of contact, frequency of face-to-face meeting, et cetera. Star models represent a central individual and his/her geolocated ties (that radiate from the centre). The star illustrates the theoretical concept of personal extensibility.</p><p> <strong>Points of Interest (points):</strong> Points of interest provide a place-based perspective (note that these entities can also be represented as polygons such as building footprints, or lines such as gradients of interaction on a subway). Certain places are better suited for fostering relationships than others (Figure 1B), and each can be annotated with their ability to foster: new ties (a nightclub), gender-bonding ties (bowling leagues), romantic ties (romantic restaurants), inter-generational ties (a religious facility), professional ties (conferences), et cetera.</p><p> <strong>Polygons/Administrative Units (polygons):</strong> These data are attached to administrative areal units (Census boundaries, provinces, zones, etc.). The data represent surveyed data on relationship-related variables in censuses, social surveys and social capital surveys. These surveys ask about trust, friendliness with neighbours, social life, belongingness to institutions, and more (Figure 1C), illustrating the social health of an area.</p><p> <strong>Aggregate Flows and Social Networks (lies and networks):</strong> This model illustrates the geolocated, social ties within a spatial extent, i.e. the social networks of a group of many people over a large extent (Figure 1D). Data can be sourced from social media, telecommunications patterns, and other declarations of relationships.</p><p> <strong>Regions (polygons):</strong> Regions, that may describe neighbourhoods within one city, or an agglomeration of cities, can be defined by social ties. Instead of commuting or economic ties, regions are defined by a preponderance of social ties within a given polygon, and a lack of ties between polygons (or between the polygon and any external area). Social regions represent a likeness and strong ties between the people that live within the region (Figure 1E).</p><p> Given these methods for representing social life and interpersonal relationships as GIS data, new questions may arise. At the <strong>dyadic level</strong>: how can we map the presence of a relationship between two people? At the <strong>ego-based level</strong>: how far and with what kind of diversity do people have ties? At the <strong>point of interest level</strong>: what kinds of mapable data can describe places’ ability to create new relationships and foster existing relationships? At the <strong>polygonal level</strong>: what kinds of mapable data can show where relationships are strong or weak? At the <strong>levels of flows and networks</strong>: what kinds of mapable data can describe systems of diffusion? At the <strong>regional level</strong>: what physical and administrative boundaries guide social ties?</p><p> For cartographers and geographic modellers looking to study social life, data acquisition, analysis, and mapping are challenges. The point of this extended abstract is to inventory the possibilities of mapping these data, open a dialog for experimenting with what kinds of symbologies, associated variables, classification schemes, visualization techniques and data collection opportunities are available for this purpose. We also hope to create spaces for comparative studies that describe the implications of these choices. In our search, we find that the major research challenges are the following: 1) privacy 2) geolocatable data 3) qualitative vs. quantitative data and 4) assurance statistically-significant samples sizes 5) analysis and modelling 6) visualization. Nevertheless, our goal is to make these indicators and data more GIS-friendly and available to geospatial analysts, modellers and cartographers.</p>


Author(s):  
Putra Wanda ◽  
Marselina Endah Hiswati ◽  
Huang J. Jie

Manual analysis for malicious prediction in Online Social Networks (OSN) is time-consuming and costly. With growing users within the environment, it becomes one of the main obstacles. Deep learning is growing algorithm that gains a big success in computer vision problem. Currently, many research communities have proposed deep learning techniques to automate security tasks, including anomalous detection, malicious link prediction, and intrusion detection in OSN. Notably, this article describes how deep learning makes the OSN security technique more intelligent for detecting malicious activity by establishing a classifier model.


Sign in / Sign up

Export Citation Format

Share Document