Survey of Influential Nodes Identification in Online Social Networks

Author(s):  
Dhrubasish Sarkar ◽  
Dipak K. Kole ◽  
Premananda Jana

The increasing popularity of Online Social Networks (OSNs), its complex and rapidly growing structure, its potential impact on business, politics, healthcare and society has led to a great deal of interest in the development of efficient influential nodes identification algorithms. Different kind of business organizations are trying to use the social networking sites to reach the target audience quickly and efficiently in terms of cost and time. The influential nodes can play an important role in it. In this paper the features of social network, models of social networks and different models or approaches used for identifying influential nodes in online social networks have been studied.

2013 ◽  
Vol 15 (1) ◽  
Author(s):  
Stephen M. Mutula

Background: With the growing adoption and acceptance of social networking, there are increased concerns about the violation of the users’ legitimate rights such as privacy, confidentiality, trust, security, safety, content ownership, content accuracy, integrity, access and accessibility to computer and digital networks amongst others.Objectives: The study sought to investigate the following research objectives to: (1) describe the types of social networks, (2) examine global penetration of the social networks, (3) outline the users’ legitimate rights that must be protected in the social networking sites (SNS), (4) determine the methods employed by SNS to protect the users’ legitimate rights and (5) identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS.Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively.Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate.Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.


Author(s):  
George Veletsianos ◽  
Cesar Navarrete

<p>While the potential of social networking sites to contribute to educational endeavors is highlighted by researchers and practitioners alike, empirical evidence on the use of such sites for formal online learning is scant. To fill this gap in the literature, we present a case study of learners’ perspectives and experiences in an online course taught using the Elgg online social network. Findings from this study indicate that learners enjoyed and appreciated both the social learning experience afforded by the online social network and supported one another in their learning, enhancing their own and other students’ experiences. Conversely, results also indicate that students limited their participation to course-related and graded activities, exhibiting little use of social networking and sharing. Additionally, learners needed support in managing the expanded amount of information available to them and devised strategies and “workarounds” to manage their time and participation.<br /><strong></strong></p>


2014 ◽  
pp. 1717-1730
Author(s):  
Joanne Kuzma

The growth of Online Social Networking sites has brought new services and communication methods to consumers. However, along with benefits, serious problems such as online cyber harassment have recently come to the forefront of the electronic media. This behavior can have significant negative effect on individuals, businesses and the social networks. Some sites have begun to provide some levels of protection and create specific anti-harassment policies in their terms of service along with implementing protection technologies. However, these protective measures are not consistent among social media, leaving some consumers at greater risk. This study analyzed 60 worldwide social sites and determined the level of cyber-harassment protection. It reviewed statistical differences among geographical-based social networks. The results showed significant gaps among various social networks, but suggests methods for improving consumer safeguards to provide consistent levels of protection.


Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequate for the high value of the published information. For all these reasons, online social networks suffer more and more attacks by sophisticated crackers and scammers. To make things worse, the information gathered from social web sites can trigger attacks to even more sensible targets. This work reviews some typical social attacks that are conducted on social networking systems, describing real-world examples of such violations and analyzing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


Author(s):  
Vladlena Benson

Based on the literature review of the theory of trust, this chapter aims to provide an insight into trust formation on social networking sites (SNS). An overview of the current state of cybercrime and known ways of threat mitigation helps shed some light on the reasons why social networks became easy targets for Internet criminals. Increasingly, personalisation is seen as a method for counteracting attacks perpetrated via phishing messages. This chapter aims to look specifically at trust in online social networks and how it influences vulnerability of users towards cybercrime. The chapter poses a question whether personalisation is the silver bullet to combat cyber threats on social networks. Further research directions are discussed.


Author(s):  
Jaymeen R. Shah ◽  
Hsun-Ming Lee

During the next decade, enrollment growth in Information Systems (IS) related majors is unlikely to meet the predicted demand for qualified IS graduates. Gender imbalance in the IS related program makes the situation worse as enrollment and retention of women in the IS major has been proportionately low compared to male. In recent years, majority of high school and college students have integrated social networking sites in their daily life and habitually use these sites. Providing female students access to role models via an online social network may enhance their motivation to continue as an IS major and pursue a career in IS field. For this study, the authors follow the action research process – exploration of information systems development. In particular, a Facebook application was developed to build the social network connecting role models and students. Using the application, a basic framework is tested based on the gender of participants. The results suggest that it is necessary to have adequate number of role models accessible to students as female role-models tend to select fewer students to develop relationships with a preference for female students. Female students likely prefer composite role models from a variety of sources. This pilot study yields valuable lessons to provide informal learning fostered by role modeling via online social networks. The Facebook application may be further expanded to enhance female students' interests in IS related careers.


2015 ◽  
Vol 6 (1) ◽  
pp. 61-75 ◽  
Author(s):  
Emad Abu-Shanab ◽  
Mushera Frehat

Social networks are virtual communication sites that allow its participants to connect, building relationships, and collaborate on social issues. It became part of our lives and spread rapidly among youth. Young people join these sites to keep strong relationships with friends and to make new ones. Therefore, it is important to investigate the factors that influence the intention to use social networking sites (SNSs) to gain better position in the social reform among young people. This study developed an integrated theoretical model which has five major factors that predict the intention to use SNSs. An empirical test was conducted, where a sample of 302 university students and an instrument containing 27 items was used. The results provide consistent evidence that all hypothesized positive associations exist except for the isolation variable. After taking into account different demographic and attitudinal variables, Facebook use still predicted respondents' social reform. The future work might focus on a specific context such as the effects of using social networks on education, and focus on students' environment in education and the influence of social network. Detailed results, conclusions and future work are stated in later sections.


Kybernetes ◽  
2019 ◽  
Vol 49 (11) ◽  
pp. 2615-2632
Author(s):  
Bo Yang ◽  
Lulu Wang ◽  
Bayan Omar Mohammed

Purpose Social technologies can offer a strong means for organizations to manage their information flows and thus make changes on the organizational knowledge sharing, which may then be linked to employees’ productivity and performance enhancements. The purpose of this paper is to predict the impact of using the online social network on employee motivation and employee motivation effects on organizational knowledge sharing. Design/methodology/approach From employees of tax affairs organization, data are collected. For evaluating the model’s elements, a questionnaire was designed. It was revised by experts with significant experiences. For statistical analysis, SMART-PLS 3.2 is used. Findings Findings have confirmed the validity of the proposed model. The results also have indicated that online social networks, social trust and social goals have a positive and important impact on employee motivation. Furthermore, obtained results have revealed that organizational knowledge sharing is significantly influenced by employee motivation and organizational commitment. Research limitations/implications The study contributes to the literature on organizational knowledge sharing and employee motivation in online social networking sites. Organizations could benefit from this knowledge by accepting that social networking sites must be considered as a critical component of the knowledge sharing, and precise targeting efforts could be directed for those users. Also, it could be exciting to study further factors affecting the development of organizational knowledge sharing in larger organizations. Originality/value The paper rises the understanding of what online social networking encompasses and how it can be utilized for the organization. The ideas and discussion are similarly applicable to libraries and may give them new visions into the delivery of social networking applications as part of their facilities to users.


Author(s):  
Nisha P. Shetty ◽  
Balachandra Muniyal ◽  
Arshia Anand ◽  
Sushant Kumar

Sybil accounts are swelling in popular social networking sites such as Twitter, Facebook etc. owing to cheap subscription and easy access to large masses. A malicious person creates multiple fake identities to outreach and outgrow his network. People blindly trust their online connections and fall into trap set up by these fake perpetrators. Sybil nodes exploit OSN’s ready-made connectivity to spread fake news, spamming, influencing polls, recommendations and advertisements, masquerading to get critical information, launching phishing attacks etc. Such accounts are surging in wide scale and so it has become very vital to effectively detect such nodes. In this research a new classifier (combination of Sybil Guard, Twitter engagement rate and Profile statistics analyser) is developed to combat such Sybil nodes. The proposed classifier overcomes the limitations of structure based, machine learning based and behaviour-based classifiers and is proven to be more accurate and robust than the base Sybil guard algorithm.


Author(s):  
Amira Ahmed Suleiman

The study seeks to study the chaos of information on social networks, their impact on the credibility of these networks, the identification of forms of information chaos in the social networks, the degree of public confidence in the information they deal with, their sense of information chaos, Through social networking sites. The study was conducted on (378) individual subscribers of different social networks, "Facebook and LinkedIn and Twitter."  Results: One of the most important findings of the study is that more than half of the sample of the study feel the chaos of information on social networks, due to the large number of accounts on the networks and the increase of anonymous information, as well as the lack of control over the information published on those networks. There are also many forms of information chaos on social networks: anonymous information, privacy violations, infringement of intellectual property rights and rights of publishers, the proliferation of counterfeit and contradictory information, the manufacture and dissemination of viruses, breaches and disruption of devices, and multiple personal or institutional accounts. The researcher recommends the need to pay attention to the enactment of media legislation and laws related to the new media environment for social networking sites to reduce the chaos of information and privacy protection, and to raise awareness of the importance of social networking sites and the Publishing Standards through courses and workshops to reduce the chaos.


Sign in / Sign up

Export Citation Format

Share Document