Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Physical Sciences and Mathematics

A Field Trial Of Privacy Nudges For Facebook, Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, Norman Sadeh Dec 2015

A Field Trial Of Privacy Nudges For Facebook, Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, Norman Sadeh

Lorrie F Cranor

Anecdotal evidence and scholarly research have shown that Internet users may regret some of their online disclosures. To help individuals avoid such regrets, we designed two modifications to the Facebook web interface that nudge users to consider the content and audience of their online disclosures more carefully. We implemented and evaluated these two nudges in a 6-week field trial with 28 Facebook users. We analyzed participants' interactions with the nudges, the content of their posts, and opinions collected through surveys. We found that reminders about the audience of posts can prevent unintended disclosures without major burden; however, introducing a time …


Exploiting Social Media Sources For Search, Fusion And Evaluation, Chia-Jung Lee Nov 2015

Exploiting Social Media Sources For Search, Fusion And Evaluation, Chia-Jung Lee

Doctoral Dissertations

The web contains heterogeneous information that is generated with different characteristics and is presented via different media. Social media, as one of the largest content carriers, has generated information from millions of users worldwide, creating material rapidly in all types of forms such as comments, images, tags, videos and ratings, etc. In social applications, the formation of online communities contributes to conversations of substantially broader aspects, as well as unfiltered opinions about subjects that are rarely covered in public media. Information accrued on social platforms, therefore, presents a unique opportunity to augment web sources such as Wikipedia or news pages, …


Whom Should We Sense In 'Social Sensing' - Analyzing Which Users Work Best For Social Media Now-Casting, Jisun An, Ingmar Weber Nov 2015

Whom Should We Sense In 'Social Sensing' - Analyzing Which Users Work Best For Social Media Now-Casting, Jisun An, Ingmar Weber

Research Collection School Of Computing and Information Systems

Given the ever increasing amount of publicly available social media data, there is growing interest in using online data to study and quantify phenomena in the offline 'real' world. As social media data can be obtained in near real-time and at low cost, it is often used for 'now-casting' indices such as levels of flu activity or unemployment. The term 'social sensing' is often used in this context to describe the idea that users act as 'sensors', publicly reporting their health status or job losses. Sensor activity during a time period is then typically aggregated in a 'one tweet, one …


Gsu Connects Us., Lokeshwar Reddy Nalavolu, Ravali Nirumalla, Priyanka Ranga, Sarmishta Ramamoorthy Venkatanarasimhan Oct 2015

Gsu Connects Us., Lokeshwar Reddy Nalavolu, Ravali Nirumalla, Priyanka Ranga, Sarmishta Ramamoorthy Venkatanarasimhan

All Capstone Projects

“GSU Connects US” is a posting based student communication website. Today on the internet there are lots of social sites available but most of them are for the technical purpose only. On the current market analysis the most popular site for posting is “Facebook” and the “Google+” but both contains mix categories of technical and non – technical, so a normal person surfing on the internet to find the event for his or her interested find it difficult to choose proper category for the event. It covers Events, Connect to the students, Q & A forum Resale of used books, …


Missing Photos, Suffering Withdrawal, Or Finding Freedom? How Experiences Of Social Media Non-Use Influence The Likelihood Of Reversion, Eric P.S. Baumer, Shion Guha, Emily Quan, David Mimno, Geri K. Gay Jul 2015

Missing Photos, Suffering Withdrawal, Or Finding Freedom? How Experiences Of Social Media Non-Use Influence The Likelihood Of Reversion, Eric P.S. Baumer, Shion Guha, Emily Quan, David Mimno, Geri K. Gay

Mathematics, Statistics and Computer Science Faculty Research and Publications

This article examines social media reversion, when a user intentionally ceases using a social media site but then later resumes use of the site. We analyze a convenience sample of survey data from people who volunteered to stay off Facebook for 99 days but, in some cases, returned before that time. We conduct three separate analyses to triangulate on the phenomenon of reversion: simple quantitative predictors of reversion, factor analysis of adjectives used by respondents to describe their experiences of not using Facebook, and statistical topic analysis of free-text responses. Significant factors predicting either increased or decreased likelihood of reversion …


Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen Jul 2015

Detecting, Modeling, And Predicting User Temporal Intention, Hany M. Salaheldeen

Computer Science Theses & Dissertations

The content of social media has grown exponentially in the recent years and its role has evolved from narrating life events to actually shaping them. Unfortunately, content posted and shared in social networks is vulnerable and prone to loss or change, rendering the context associated with it (a tweet, post, status, or others) meaningless. There is an inherent value in maintaining the consistency of such social records as in some cases they take over the task of being the first draft of history as collections of these social posts narrate the pulse of the street during historic events, protest, riots, …


Analysis Of Real-World Passwords For Social Media Sites, Mark J. Quinn May 2015

Analysis Of Real-World Passwords For Social Media Sites, Mark J. Quinn

Masters Theses, 2010-2019

Textual passwords have dominated all other entity authentication mechanisms since they were introduced in the early 1960’s. Despite an inherent weakness against social engineering, keylogging, shoulder surfing, dictionary, and brute-force attacks, password authentication continues to grow as the Internet expands. Existing research on password authentication proves that dictionary attacks are successful because users make poor choices when creating passwords. To make passwords easier to remember, users select character strings that are shorter in length and contain memorable content, like personal identity information, common words found in a dictionary, backward spellings of common words, recognizable sequences, and easily guessed mnemonic phrases. …


Fake And Spam Messages: Detecting Misinformation During Natural Disasters On Social Media, Meet Rajdev May 2015

Fake And Spam Messages: Detecting Misinformation During Natural Disasters On Social Media, Meet Rajdev

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

During natural disasters or crises, users on social media tend to easily believe contents of postings related to the events, and retweet the postings, hoping that the postings will be reached by many other users. Unfortunately, there are malicious users who understand the tendency and post misinformation such as spam and fake messages with expecting wider propagation. To resolve the problem, in this paper we conduct a case study of the 2013 Moore Tornado and Hurricane Sandy. Concretely, we (i) understand behaviors of these malicious users; (ii) analyze properties of spam, fake and legitimate messages; (iii) propose flat and hierarchical …


Chalk And Cheese In Twitter: Discriminating Personal And Organization Accounts, Richard Jayadi Oentaryo, Jia-Wei Low, Ee Peng Lim Apr 2015

Chalk And Cheese In Twitter: Discriminating Personal And Organization Accounts, Richard Jayadi Oentaryo, Jia-Wei Low, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Social media have been popular not only for individuals to share contents, but also for organizations to engage users and spread information. Given the trait differences between personal and organization accounts, the ability to distinguish between the two account types is important for developing better search/recommendation engines, marketing strategies, and information dissemination platforms. However, such task is non-trivial and has not been well studied thus far. In this paper, we present a new generic framework for classifying personal and organization accounts, based upon which comprehensive and systematic investigation on a rich variety of content, social, and temporal features can be …


Review Selection Using Micro-Reviews, Thanh-Son Nguyen, Hady W. Lauw, Panayiotis Tsaparas Apr 2015

Review Selection Using Micro-Reviews, Thanh-Son Nguyen, Hady W. Lauw, Panayiotis Tsaparas

Research Collection School Of Computing and Information Systems

Given the proliferation of review content, and the fact that reviews are highly diverse and often unnecessarily verbose, users frequently face the problem of selecting the appropriate reviews to consume. Micro-reviews are emerging as a new type of online review content in the social media. Micro-reviews are posted by users of check-in services such as Foursquare. They are concise (up to 200 characters long) and highly focused, in contrast to the comprehensive and verbose reviews. In this paper, we propose a novel mining problem, which brings together these two disparate sources of review content. Specifically, we use coverage of micro-reviews …


Review Synthesis For Micro-Review Summarization, Thanh-Son Nguyen, Hady W. Lauw, Panayiotis Tsaparas Feb 2015

Review Synthesis For Micro-Review Summarization, Thanh-Son Nguyen, Hady W. Lauw, Panayiotis Tsaparas

Research Collection School Of Computing and Information Systems

Micro-reviews is a new type of user-generated content arising from the prevalence of mobile devices and social media in the past few years. Micro-reviews are bite-size reviews (usually under 200 characters), commonly posted on social media or check-in services, using a mobile device. They capture the immediate reaction of users, and they are rich in information, concise, and to the point. However, the abundance of micro-reviews, and their telegraphic nature make it increasingly difficult to go through them and extract the useful information, especially on a mobile device. In this paper, we address the problem of summarizing the micro-reviews of …


Effects Of Investor Sentiment Using Social Media On Corporate Financial Distress, Tarek Hoteit Jan 2015

Effects Of Investor Sentiment Using Social Media On Corporate Financial Distress, Tarek Hoteit

Walden Dissertations and Doctoral Studies

The mainstream quantitative models in the finance literature have been ineffective in detecting possible bankruptcies during the 2007 to 2009 financial crisis. Coinciding with the same period, various researchers suggested that sentiments in social media can predict future events. The purpose of the study was to examine the relationship between investor sentiment within the social media and the financial distress of firms Grounded on the social amplification of risk framework that shows the media as an amplified channel for risk events, the central hypothesis of the study was that investor sentiments in the social media could predict t he level …


Small Business Use Of Internet Marketing: Findings From Case Studies, Maya Demishkevich Jan 2015

Small Business Use Of Internet Marketing: Findings From Case Studies, Maya Demishkevich

Walden Dissertations and Doctoral Studies

Internet marketing is critical for meeting changing consumer needs and staying competitive in the business environment. Small business owners need strategies on how to use Internet marketing to promote their products or services. The purpose of this multiple case study was to explore how 5 small business owners in Maryland developed and implemented an online marketing strategy. Participants were recruited for their roles as the chief decision maker of their business; additional prerequisites for their participation were that they used Internet marketing, represented different industries, and had fewer than 20 employees. Data came from semi-structured interviews with the small business …


Community Discovery From Social Media By Low-Rank Matrix Recovery, Jinfeng Zhuang, Mei Tao, Steven C. H. Hoi, Xian-Sheng Hua, Yongdong Zhang Jan 2015

Community Discovery From Social Media By Low-Rank Matrix Recovery, Jinfeng Zhuang, Mei Tao, Steven C. H. Hoi, Xian-Sheng Hua, Yongdong Zhang

Research Collection School Of Computing and Information Systems

The pervasive usage and reach of social media have attracted a surge of attention in the multimedia research community. Community discovery from social media has therefore become an important yet challenging issue. However, due to the subjective generating process, the explicitly observed communities (e.g., group-user and user-user relationship) are often noisy and incomplete in nature. This paper presents a novel approach to discovering communities from social media, including the group membership and user friend structure, by exploring a low-rank matrix recovery technique. In particular, we take Flickr as one exemplary social media platform. We first model the observed indicator matrix …


Characteristics Of Social Media Stories, Yasmin Ainoamany, Michele C. Weigle, Michael L. Nelson Jan 2015

Characteristics Of Social Media Stories, Yasmin Ainoamany, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

An emerging trend in social media is for users to create and publish "stories", or curated lists of web resources with the purpose of creating a particular narrative of interest to the user. While some stories on the web are automatically generated, such as Facebook’s "Year in Review", one of the most popular storytelling services is "Storify", which provides users with curation tools to select, arrange, and annotate stories with content from social media and the web at large. We would like to use tools like Storify to present automatically created summaries of archival collections. To support automatic story creation, …


Cyberspace: A Venue For Terrorism, David Bieda, Leila Halawi Jan 2015

Cyberspace: A Venue For Terrorism, David Bieda, Leila Halawi

Publications

This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and proliferating propaganda and terrorism. Moreover, this study explores how the low cost Internet infrastructure and social media sites (such as Facebook, Twitter, and YouTube) have contributed to their networking and operations due to the convenience, in terms of availability, accessibility, message redundancy, ease of use, and the inability to censor content. Concepts such as cyber-weapons, cyber-attacks, cyber-war, and cyber-terrorism are presented and explored to assess how terrorist groups are exploiting cyberspace.


Mining User Viewpoints In Online Discussions, Minghui Qiu Jan 2015

Mining User Viewpoints In Online Discussions, Minghui Qiu

Dissertations and Theses Collection (Open Access)

Online discussion forums are a type of social media which contains rich usercontributed facts, opinions, and user interactions on diverse topics. The large volume of opinionated data generated in online discussions provides an ideal testbed for user opinion mining. In particular, mining user opinions on social and political issues from online discussions is useful not only to government organizations and companies but also to social and political scientists. In this dissertation, we propose to study the task of mining user viewpoints or stances from online discussions on social and political issues. Specifically, we will talk about our proposed approaches for …