Participation in Online Social Networks

Author(s):  
Giulio Angiani ◽  
Paolo Fornacciari ◽  
Eleonora Iotti ◽  
Monica Mordonini ◽  
Michele Tomaiuolo

Why and how more and more people get involved and use social networking systems are critical topics in social network analysis (SNA). As a matter of fact, social networking systems bring online a growing number of acquaintances, for many different purposes. Both business interests and personal recreational goals are motivations for using online social networks (OSN) or other social networking systems. The participation in social networks is a phenomenon which has been studied with several theories, and SNA is useful for common business problems, e.g., launching distributed teams, retaining people with vital knowledge for the organization, improving access to knowledge and spreading ideas and innovation. Nevertheless, there are some difficulties, such as anti-social behaviors of participants, lack of incentives, organizational costs and risks. In this article, a survey of the basic features of SNA, participation theories and models are discussed, with emphasis on social capital, information spreading, motivations for participation, and anti-social behaviors of social network users.

2014 ◽  
Author(s):  
Constantin SPÂNU

Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because of its large user base, and large amount of information, they become a potential channel for attackers to exploit. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Social network users may not be aware of such threats. Therefore, this paper will present a survey on different privacy and security issues in online social networks. The issues include privacy issues, identity theft, social networks spam, social networks malware, and physical threats. Social network privacy issues, social network security issues, social network threats, identity Theft, social network spam, social network malware, Facebook worms, Twitter Worms.


Author(s):  
P. Ponvasan ◽  
M. Muthusangari

Social networking sites are very useful in sharing information, making friends and keeping in touch with old friends. It is an online service, platform, or site that focuses on facilitating the building of social networks and social elation among peoples for sharing interests, activities, backgrounds, or real-life connections. But with the increasing demand of social networking sites (SNS) privacy and security concern have also increased. Protecting personal information privacy has become a controversial issue among online social network providers and users. Most social network providers have developed several techniques to decrease threats and risks to the users’ privacy. These risks include the misuse of personal information which may lead to illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their personal information privacy, as well as the suitability of the privacy systems which they use to modify privacy settings. In this paper, categorize the picture as sensitive or normal. If it is sensitive means, perform copyrights algorithms. Then provide the permission to the receiver end for download the images in secure manner. Experimental result can be shows that in real time environments using C#.NET as front end and SQL SERVER as back end and comparative study of existing algorithms based on computational time and privacy rate.


Author(s):  
Balamurugan. R ◽  
Dhivakar. M ◽  
Muruganantham. G ◽  
Ramprakash. S

This survey places of interest the major issues concerning privacy and security in online social networks. Firstly, we discuss investigate that aims to protect user data from the an assortment of attack vantage points together with other users, advertisers, third party request developers, and the online social arrangement provider itself. Next we cover social network supposition of user attributes, locate hubs, and link prediction. Because online social networks are so saturated with sensitive information, network inference plays a major privacy role. Social Networking sites go upwards since of all these reasons. In recent years indicates that for many people they are now the mainstream communication knowledge. Social networking sites come under few of the most frequently browsed categories websites in the world. Nevertheless Social Networking sites are also vulnerable to various problems threats and attacks such as revelation of information, identity thefts etc. Privacy practice in social networking sites often appear convoluted as in sequence sharing stands in discord with the need to reduce disclosure-related abuses. Facebook is one such most popular and widely used Social Networking sites which have its own healthy set of Privacy policy.


2015 ◽  
Vol 40 (2) ◽  
pp. 89-105 ◽  
Author(s):  
Muhammad Abulaish ◽  
Sajid Y. Bhat

Abstract As the online social network technology is gaining all time high popularity and usage, the malicious behavior and attacks of spammers are getting smarter and difficult to track. The newer spamming approaches using the social engineering concepts are making traditional spam and spammer detection techniques obsolete. Especially, content-based filtering of spam messages and spammer profiles in online social networks is becoming difficult. Newer approaches for spammer detection using topological features are gaining attention. Further, the evaluation of ensemble classifiers for detection of spammers over social networking behavior-based features is still in its infancy. In this paper, we present an ensemble learning method for online social network security by evaluating the performance of some basic ensemble classifiers over novel community-based social networking features of legitimate users and spammers in online social networks. The proposed method aims to identify topological and community-based features from users’ interaction network and uses popular classifier ensembles – bagging and boosting to identify spammers in online social networks. Experimental evaluation of the proposed method is done over a real-world data set with artificial spammers that follow a behavior as reported in earlier literature. The experimental results reveal that the identified features are highly discriminative to identify spammers in online social networks.


2021 ◽  
Vol 9 (1) ◽  
Author(s):  
Sunyoung Park ◽  
Lasse Gerrits

AbstractAlthough migration has long been an imperative topic in social sciences, there are still needs of study on migrants’ unique and dynamic transnational identity, which heavily influences the social integration in the host society. In Online Social Network (OSN), where the contemporary migrants actively communicate and share their stories the most, different challenges against migrants’ belonging and identity and how they cope or reconcile may evidently exist. This paper aims to scrutinise how migrants are manifesting their belonging and identity via different technological types of online social networks, to understand the relations between online social networks and migrants’ multi-faceted transnational identity. The research introduces a comparative case study on an online social movement led by Koreans in Germany via their online communities, triggered by a German TV advertisement considered as stereotyping East Asians given by white supremacy’s point of view. Starting with virtual ethnography on three OSNs representing each of internet generations (Web 1.0 ~ Web 3.0), two-step Qualitative Data Analysis is carried out to examine how Korean migrants manifest their belonging and identity via their views on “who we are” and “who are others”. The analysis reveals how Korean migrants’ transnational identities differ by their expectation on the audience and the members in each online social network, which indicates that the distinctive features of the online platform may encourage or discourage them in shaping transnational identity as a group identity. The paper concludes with the two main emphases: first, current OSNs comprising different generational technologies play a significant role in understanding the migrants’ dynamic social values, and particularly, transnational identities. Second, the dynamics of migrants’ transnational identity engages diverse social and situational contexts. (keywords: transnational identity, migrants’ online social networks, stereotyping migrants, technological evolution of online social network).


2014 ◽  
Vol 25 (10) ◽  
pp. 1450056 ◽  
Author(s):  
Ke-Ke Shang ◽  
Wei-Sheng Yan ◽  
Xiao-Ke Xu

Previously many studies on online social networks simply analyze the static topology in which the friend relationship once established, then the links and nodes will not disappear, but this kind of static topology may not accurately reflect temporal interactions on online social services. In this study, we define four types of users and interactions in the interaction (dynamic) network. We found that active, disappeared, new and super nodes (users) have obviously different strength distribution properties and this result also can be revealed by the degree characteristics of the unweighted interaction and friendship (static) networks. However, the active, disappeared, new and super links (interactions) only can be reflected by the strength distribution in the weighted interaction network. This result indicates the limitation of the static topology data on analyzing social network evolutions. In addition, our study uncovers the approximately stable statistics for the dynamic social network in which there are a large variation for users and interaction intensity. Our findings not only verify the correctness of our definitions, but also helped to study the customer churn and evaluate the commercial value of valuable customers in online social networks.


2016 ◽  
Vol 42 (6) ◽  
pp. 536-552 ◽  
Author(s):  
Shaista Wasiuzzaman ◽  
Siavash Edalat

Purpose – The vast amount of information available via online social networks (OSN) makes it a very good avenue for understanding human behavior. One of the human characteristics of interest to financial practitioners is an individual’s financial risk tolerance. The purpose of this paper is to look at the relationship between an individual’s OSN behavior and his/her financial risk tolerance. Design/methodology/approach – The study uses data collected from a sample of 220 university students and the backward variables selection ordinary least squares regression analysis technique to achieve its objective. Findings – The results of the study find that the frequency of logging on to social network sites indicates an individual who has higher financial risk tolerance. Additionally, the increasing use of social networks for social connection is found to be associated with lower financial risk tolerance. The results are mostly consistent when the sample is split based on prior financial knowledge. Originality/value – To the authors’ knowledge this is the first study which documents the possibility of understanding an individual’s financial risk tolerance via his/her social network activity. This provides investment/financial consultants with more avenues for gathering information in order to understand their current or potential clients hence providing better services.


2019 ◽  
Vol 3 (Supplement_1) ◽  
pp. S529-S529
Author(s):  
Daniele Zaccaria ◽  
Georgia Casanova ◽  
Antonio Guaita

Abstract In the last decades the study of older people and social networks has been at the core of gerontology research. The literature underlines the positive health effects of traditional and online social connections and also the social networks’s positive impact on cognitive performance, mental health and quality of life. Aging in a Networked Society is a randomized controlled study aimed at investigating causal impact of traditional face-to-face social networks and online social networks (e.g. Social Network Sites) on older people’ health, cognitive functions and well-being. A social experiment, based on a pre-existing longitudinal study (InveCe - Brain Aging in Abbiategrasso) has involved 180 older people born from 1935 to 1939 living in Abbiategrasso, a municipality near Milan. We analyse effects on health and well-being of smartphones and Facebook use (compared to engagement in a more traditional face-to-face activity), exploiting the research potential of past waves of InveCe study, which collected information concerning physical, cognitive and mental health using international validate scale, blood samples, genetic markers and information on social networks and socio-demographic characteristics of all participants. Results of statistical analysis show that poor social relations and high level of perceived loneliness (measured by Lubben Scale and UCLA Loneliness scale) affect negatively physical and mental outcomes. We also found that gender and marital status mediate the relationship between loneliness and mental wellbeing, while education has not significant effect. Moreover, trial results underline the causal impact of ICT use (smartphones, internet, social network sites) on self-perceived loneliness and cognitive and physical health.


Author(s):  
Abhishek Vaish ◽  
Rajiv Krishna G. ◽  
Akshay Saxena ◽  
Dharmaprakash M. ◽  
Utkarsh Goel

The aim of this research is to propose a model through which the viral nature of an information item in an online social network can be quantified. Further, the authors propose an alternate technique for information asset valuation by accommodating virality in it which not only complements the existing valuation system, but also improves the accuracy of the results. They use a popularly available YouTube dataset to collect attributes and measure critical factors such as share-count, appreciation, user rating, controversiality, and comment rate. These variables are used with a proposed formula to obtain viral index of each video on a given date. The authors then identify a conventional and a hybrid asset valuation technique to demonstrate how virality can fit in to provide accurate results.The research demonstrates the dependency of virality on critical social network factors. With the help of a second dataset acquired, the authors determine the pattern virality of an information item takes over time.


Sign in / Sign up

Export Citation Format

Share Document