scholarly journals Security Visualization Analytics Model in Online Social Networks Using Data Mining and Graph-based Structure Algorithms

Author(s):  
Prajit Limsaiprom ◽  
Prasong Praneetpolgrang ◽  
Pilastpongs Subsermsri
Author(s):  
Kathy J. Liszka ◽  
Chien-Chung Chan ◽  
Chandra Shekar

Microblogs are one of a growing group of social network tools. Twitter is, at present, one of the most popular forums for microblogging in online social networks, and the fastest growing. Fifty million messages flow through servers, computers, and cell phones on a wide variety of topics exchanged daily. With this considerable volume, Twitter is a natural and obvious target for spreading spam via the messages, called tweets. The challenge is how to determine if a tweet is a spam or not, and more specifically a special category advertising pharmaceutical products. The authors look at the essential characteristics of spam tweets and what makes microblogging spam unique from email or other types of spam. They review methods and tools currently available to identify general spam tweets. Finally, this work introduces a new methodology of applying text mining and data mining techniques to generate classifiers that can be used for pharmaceutical spam detection in the context of microblogging.


2015 ◽  
pp. 1539-1556
Author(s):  
Dhiraj Murthy ◽  
Alexander Gross ◽  
Alex Takata

This chapter identifies a number of the most common data mining toolkits and evaluates their utility in the extraction of data from heterogeneous online social networks. It introduces not only the complexities of scraping data from the diverse forms of data manifested in these sources, but also critically evaluates currently available tools. This analysis is followed by a presentation and discussion on the development of a hybrid system, which builds upon the work of the open-source Web-Harvest framework, for the collection of information from online social networks. This tool, VoyeurServer, attempts to address the weaknesses of tools identified in earlier sections, as well as prototype the implementation of key functionalities thought to be missing from commonly available data extraction toolkits. The authors conclude the chapter with a case study and subsequent evaluation of the VoyeurServer system itself. This evaluation presents future directions, remaining challenges, and additional extensions thought to be important to the effective development of data mining tools for the study of online social networks.


2016 ◽  
Vol 18 (5) ◽  
pp. 459-477
Author(s):  
Sarah Whitcomb Laiola

This article addresses issues of user precarity and vulnerability in online social networks. As social media criticism by Jose van Dijck, Felix Stalder, and Geert Lovink describes, the social web is a predatory system that exploits users’ desires for connection. Although accurate, this critical description casts the social web as a zone where users are always already disempowered, so fails to imagine possibilities for users beyond this paradigm. This article examines Natalie Bookchin’s composite video series, Testament, as it mobilizes an alt-(ernative) social network of vernacular video on YouTube. In the first place, the alt-social network works as an iteration of “tactical media” to critically reimagine empowered user-to-user interactions on the social web. In the second place, it obfuscates YouTube’s data-mining functionality, so allows users to socialize online in a way that evades their direct translation into data and the exploitation of their social labor.


2017 ◽  
Vol 15 (12) ◽  
pp. 2276-2281 ◽  
Author(s):  
Pedro Pinto ◽  
Ingrhid Theodoro ◽  
Marcos Arrais ◽  
Jonice Oliveira

Sign in / Sign up

Export Citation Format

Share Document