Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Social networks

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 90

Full-Text Articles in Physical Sciences and Mathematics

Actionpoint: An App To Combat Cyberbullying Via The Strengthening Of Parent-Teen Relationships, Maddie Juarez, Natali Barragan, Deborah Hall, George K. Thiruvathukal, Yasin N. Silva Jan 2024

Actionpoint: An App To Combat Cyberbullying Via The Strengthening Of Parent-Teen Relationships, Maddie Juarez, Natali Barragan, Deborah Hall, George K. Thiruvathukal, Yasin N. Silva

Computer Science: Faculty Publications and Other Works

Due to the increased prevalence of cyberbullying and the detrimental impact it can have on adolescents, there is a critical need for tools to help combat cyberbullying. This paper introduces the ActionPoint app, a mobile application based on empirical work highlighting the importance of strong parent-teen relationships for reducing cyberbullying risk. The app is designed to help families improve their communication skills, set healthy boundaries for social media use, identify instances of cyberbullying and cyberbullying risk, and, ultimately, decrease the negative outcomes associated with cyberbullying. The app guides parents and teens through a series of interactive modules that engage them …


Understanding The Contribution Of Recommendation Algorithms On Misinformation Recommendation And Misinformation Dissemination On Social Networks, Royal Pathak, Francesca Spezzano, Maria Soledad Pera Nov 2023

Understanding The Contribution Of Recommendation Algorithms On Misinformation Recommendation And Misinformation Dissemination On Social Networks, Royal Pathak, Francesca Spezzano, Maria Soledad Pera

Computer Science Faculty Publications and Presentations

Social networks are a platform for individuals and organizations to connect with each other and inform, advertise, spread ideas, and ultimately influence opinions. These platforms have been known to propel misinformation. We argue that this could be compounded by the recommender algorithms that these platforms use to suggest items potentially of interest to their users, given the known biases and filter bubbles issues affecting recommender systems. While much has been studied about misinformation on social networks, the potential exacerbation that could result from recommender algorithms in this environment is in its infancy. In this manuscript, we present the result of …


The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?, Jason D. Fiege, Anastasia (Stasi) D. Baran May 2023

The Locals Casino As A Social Network – Can An Interconnected Community Of Players Detect Differences In Hold?, Jason D. Fiege, Anastasia (Stasi) D. Baran

International Conference on Gambling & Risk Taking

Abstract

It is difficult for individual players to detect differences in theoretical hold between slot machines without playing an unrealistically large number of games. This difficulty occurs because the fractional loss incurred by a player converges only slowly to the theoretical hold in the presence of volatility designed into slot pay tables. Nevertheless, many operators believe that players can detect changes in hold or differences compared to competition, especially in a locals casino market, and therefore resist increasing holds. Instead of investigating whether individual players can detect differences in hold, we ask whether a population of casino regulars who share …


Influence Level Prediction On Social Media Through Multi-Task And Sociolinguistic User Characteristics Modeling, Denys Katerenchuk Sep 2022

Influence Level Prediction On Social Media Through Multi-Task And Sociolinguistic User Characteristics Modeling, Denys Katerenchuk

Dissertations, Theses, and Capstone Projects

Prediction of a user’s influence level on social networks has attracted a lot of attention as human interactions move online. Influential users have the ability to influence others’ behavior to achieve their own agenda. As a result, predicting users’ level of influence online can help to understand social networks, forecast trends, prevent misinformation, etc. The research on user influence in social networks has attracted much attention across multiple disciplines, from social sciences to mathematics, yet it is still not well understood. One of the difficulties is that the definition of influence is specific to a particular problem or a domain, …


Jlootbox: An Agent-Based Model Of Social Influence And Gambling In Online Video Games, Lila Zayed May 2022

Jlootbox: An Agent-Based Model Of Social Influence And Gambling In Online Video Games, Lila Zayed

Honors Capstones

Loot boxes are digital treasure chests that players spend real money to purchase, wherein the contents are randomly generated. Since players spend money on the pretense they might receive something valuable, many comparisons have been drawn to gambling behavior as the reward is up to chance. To explore this phenomenon, agent-based modeling will be used to simulate this behavior. Agent-based modeling allows us to create heterogenous agents who follow simple rules so that we may observe emergent behavior in a population. An agent-based model was created using Repast Simphony for this end.

Parameters included the player’s internal decision strategy around …


Codis: Community Detection Via Distributed Seed-Set Expansion On Graph Streams, Austin Anderson Jan 2022

Codis: Community Detection Via Distributed Seed-Set Expansion On Graph Streams, Austin Anderson

Master's Projects

Community detection has been and remains a very important topic in several fields. From marketing and social networking to biological studies, community detec- tion plays a key role in advancing research in many different fields. Research on this topic originally looked at classifying nodes into discrete communities, but eventually moved forward to placing nodes in multiple communities. Unfortunately, community detection has always been a time-inefficient process, and recent data sets have been simply to large to realistically process using traditional methods. Because of this, recent methods have turned to parallelism, but all these methods, while offering sig- nificant decrease in …


Privacy Concerns With Using Public Data For Suicide Risk Prediction Algorithms: A Public Opinion Survey Of Contextual Appropriateness, Michael Zimmer, Sarah Logan Jan 2022

Privacy Concerns With Using Public Data For Suicide Risk Prediction Algorithms: A Public Opinion Survey Of Contextual Appropriateness, Michael Zimmer, Sarah Logan

Computer Science Faculty Research and Publications

Purpose

Existing algorithms for predicting suicide risk rely solely on data from electronic health records, but such models could be improved through the incorporation of publicly available socioeconomic data – such as financial, legal, life event and sociodemographic data. The purpose of this study is to understand the complex ethical and privacy implications of incorporating sociodemographic data within the health context. This paper presents results from a survey exploring what the general public’s knowledge and concerns are about such publicly available data and the appropriateness of using it in suicide risk prediction algorithms.

Design/methodology/approach

A survey was developed to measure …


Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler Jan 2022

Exploring Cyberterrorism, Topic Models And Social Networks Of Jihadists Dark Web Forums: A Computational Social Science Approach, Vivian Fiona Guetler

Graduate Theses, Dissertations, and Problem Reports

This three-article dissertation focuses on cyber-related topics on terrorist groups, specifically Jihadists’ use of technology, the application of natural language processing, and social networks in analyzing text data derived from terrorists' Dark Web forums. The first article explores cybercrime and cyberterrorism. As technology progresses, it facilitates new forms of behavior, including tech-related crimes known as cybercrime and cyberterrorism. In this article, I provide an analysis of the problems of cybercrime and cyberterrorism within the field of criminology by reviewing existing literature focusing on (a) the issues in defining terrorism, cybercrime, and cyberterrorism, (b) ways that cybercriminals commit a crime in …


Exploring The Impact Of Social Influence Mechanisms And Network Density On Societal Polarization, Justin Mittereder Dec 2021

Exploring The Impact Of Social Influence Mechanisms And Network Density On Societal Polarization, Justin Mittereder

Student Research Submissions

I present an agent-based model, inspired by the opinion dynamics
(OD) literature, to explore the underlying behaviors that may induce
societal polarization. My agents interact on a social network, in which
adjacent nodes can influence each other, and each agent holds an array
of continuous opinion values (on a 0-1 scale) on a number of separate
issues. I use three measures as a proxy for the virtual society’s “po-
larization:” the average assortativity of the graph with respect to the
agents’ opinions, the number of non-uniform issues, and the number
of distinct opinion buckets in which agents have the same …


Modeling Real And Fake News Sharing In Social Networks, Abishai Joy Aug 2021

Modeling Real And Fake News Sharing In Social Networks, Abishai Joy

Boise State University Theses and Dissertations

Online media is changing the traditional news industry and diminishing the role of journalists, newspapers, and even news channels. This in turn is enhancing the ability of fake news to influence public opinion on important topics. The threat of fake news is quite imminent, as it allows malicious users to share their agenda with a larger audience. Major social media platforms like Twitter, Facebook, etc., are making it easy to spread fake news due to the minimal moderation/ fact-checking on these platforms.

This work aims at predicting fake and real news sharing in social media. Specifically, we employ a multi-level …


Thinking Spatial, Mohamed F. Mokbel Jul 2021

Thinking Spatial, Mohamed F. Mokbel

Journal of Spatial Information Science

The systems community in both academia and industry has tremendous success in building widely used general purpose systems for various types of data and applications. Examples include database systems, big data systems, data streaming systems, and machine learning systems. The vast majority of these systems are ill equipped in terms of supporting spatial data. The main reason is that system builders mostly think of spatial data as just one more type of data. Any spatial support can be considered as an afterthought problem that can be supported via on-top functions or spatial cartridges that can be added to the already …


Overlapping Community Detection In Social Networks, Akshar Panchal May 2021

Overlapping Community Detection In Social Networks, Akshar Panchal

Master's Projects

Social networking sites are important to connect with the world virtually. As the number of users accessing these sites increase, the data and information keeps on increasing. There are communities and groups which are formed virtually based on different factors. We can visualize these communities as networks of users or nodes and the relationships or connections between them as edges. This helps in evaluating and analyzing different factors that influence community formation in such a dense network. Community detection helps in revealing certain characteristics which makes these groups in the network unique and different from one another. We can use …


Negative Influence Minimization Algorithm For Social Networks, Yang Yi, Chunxiao Wu, He Ming, Zhou Bo Feb 2021

Negative Influence Minimization Algorithm For Social Networks, Yang Yi, Chunxiao Wu, He Ming, Zhou Bo

Journal of System Simulation

Abstract: While positive information is spreading in social networks, there is still a large amount of negative information spreading in the network. Aiming at the fact that there is few researches on suppressing the spread of negative information, a negative influence minimization algorithm for social networks is proposed. When negative information appears in social networks and some initial nodes are infected, the behavior of nodes propagating information depends on its coordination game with neighbor nodes. The objective function with minimal influence is used to find the K optimal blocking nodes, and finally the size of the final infected node is …


Matters Of Biocybersecurity With Consideration To Propaganda Outlets And Biological Agents, Xavier-Lewis Palmer, Ernestine Powell, Lucas Potter, Thaddeus Eze (Ed.), Lee Speakman (Ed.), Cyril Onwubiko (Ed.) Jan 2021

Matters Of Biocybersecurity With Consideration To Propaganda Outlets And Biological Agents, Xavier-Lewis Palmer, Ernestine Powell, Lucas Potter, Thaddeus Eze (Ed.), Lee Speakman (Ed.), Cyril Onwubiko (Ed.)

Electrical & Computer Engineering Faculty Publications

The modern era holds vast modalities in human data utilization. Within Biocybersecurity (BCS), categories of biological information, especially medical information transmitted online, can be viewed as pathways to destabilize organizations. Therefore, analysis of how the public, along with medical providers, process such data, and the methods by which false information, particularly propaganda, can be used to upset the flow of verified information to populations of medical professionals, is important for maintenance of public health. Herein, we discuss some interplay of BCS within the scope of propaganda and considerations for navigating the field.


Bots And Humans On Social Media, Lale Madahali Sep 2020

Bots And Humans On Social Media, Lale Madahali

Interdisciplinary Informatics Faculty Proceedings & Presentations

Social networks are an important part of today’s life. They are used for entertainment, getting the news, advertisements, and branding for businesses and individuals alike. Research shows that automated accounts, also known as bots, contribute to the content spread on social media allowing the the environment pollution and public opinion manipulation. This research aims at investigating bots’ behavior on Twitter and examine how different and similar they are compared to humans. I will investigate their underlying network, whether it is an information network or social network. In the second step, I attempt to answer whether they follow the structure of …


Data Mining Of Chinese Social Networks: Factors That Indicate Post Deletion, Meisam Navaki Arefi Mar 2020

Data Mining Of Chinese Social Networks: Factors That Indicate Post Deletion, Meisam Navaki Arefi

Computer Science ETDs

Widespread Chinese social media applications such as Sina Weibo (Chinese Twitter), the most popular social network in China, are widely known for monitoring and deleting posts to conform to Chinese government requirements. Censorship of Chinese social media is a complex process that involves many factors. There are multiple stakeholders and many different interests: economic, political, legal, personal, etc., which means that there is not a single strategy dictated by a single government authority. Moreover, sometimes Chinese social media do not follow the directives of government, out of concern that they are more strictly censoring than their competitors.

One crucial question …


“Distance Learning” In The Ninth Century?: Micro-Cluster Analysis Of The Epistolary Network Of Alcuin After 796, William James Mattingly Jan 2020

“Distance Learning” In The Ninth Century?: Micro-Cluster Analysis Of The Epistolary Network Of Alcuin After 796, William James Mattingly

Theses and Dissertations--History

Scholars of eighth- and ninth-century education have assumed that intellectuals did not write works of Scriptural interpretation until that intellectual had a firm foundation in the seven liberal arts.This ensured that anyone who embarked on work of Scriptural interpretation would have the required knowledge and methods to read and interpret Scripture correctly. The potential for theological error and the transmission of those errors was too great unless the interpreter had the requisite training. This dissertation employs computistical methods, specifically the techniques of social network mapping and cluster analysis, to study closely the correspondence of Alcuin, a late-eighth- and early-ninth-century scholar …


Disaster Damage Categorization Applying Satellite Images And Machine Learning Algorithm, Farinaz Sabz Ali Pour, Adrian Gheorghe Jan 2020

Disaster Damage Categorization Applying Satellite Images And Machine Learning Algorithm, Farinaz Sabz Ali Pour, Adrian Gheorghe

Engineering Management & Systems Engineering Faculty Publications

Special information has a significant role in disaster management. Land cover mapping can detect short- and long-term changes and monitor the vulnerable habitats. It is an effective evaluation to be included in the disaster management system to protect the conservation areas. The critical visual and statistical information presented to the decision-makers can help in mitigation or adaption before crossing a threshold. This paper aims to contribute in the academic and the practice aspects by offering a potential solution to enhance the disaster data source effectiveness. The key research question that the authors try to answer in this paper is how …


Wrinkles In Time : An Exploration Of Non-Uniform Temporal Resolution In Network Data, Daniel John Ditursi Aug 2019

Wrinkles In Time : An Exploration Of Non-Uniform Temporal Resolution In Network Data, Daniel John Ditursi

Legacy Theses & Dissertations (2009 - 2024)

The continued proliferation of timestamped network data demands increasing sophistication in the analysis of that data. In particular, the literature amply demonstrates that the choice of temporal resolution has a profound impact on the solutions produced by many different methods in this domain -- answers differ when data is viewed second-by-second as opposed to week-by-week. Additionally, research also shows quite clearly that the rates at which network events happen are not constant -- some times are "faster" or "slower" than others, and these variations are not necessarily predictable. Given the above, it is clear that there must be problem settings …


Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini Jun 2019

Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini

Computer Science Faculty Publications

Influence spread in multi-layer interdependent networks (M-IDN) has been studied in the last few years; however, prior works mostly focused on the spread that is initiated in a single layer of an M-IDN. In real world scenarios, influence spread can happen concurrently among many or all components making up the topology of an M-IDN. This paper investigates the effectiveness of different influence spread strategies in M-IDNs by providing a comprehensive analysis of the time evolution of influence propagation given different initial spreader strategies. For this study we consider a two-layer interdependent network and a general probabilistic threshold influence spread model …


Simulating Epidemics And Interventions On High Resolution Social Networks, Christopher E. Siu Jun 2019

Simulating Epidemics And Interventions On High Resolution Social Networks, Christopher E. Siu

Master's Theses

Mathematical models of disease spreading are a key factor of ensuring that we are prepared to deal with the next epidemic. They allow us to predict how an infection will spread throughout a population, thereby allowing us to make intelligent choices when attempting to contain the disease. Whether due to a lack of empirical data, a lack of computational power, a lack of biological understanding, or some combination thereof, traditional models must make sweeping assumptions about the behavior of a population during an epidemic.

In this thesis, we implement granular epidemic simulations using a rich social network constructed from real-world …


Tsar : A System For Defending Hate Speech Detection Models Against Adversaries, Brian Tuan Khieu May 2019

Tsar : A System For Defending Hate Speech Detection Models Against Adversaries, Brian Tuan Khieu

Master's Projects

Although current state-of-the-art hate speech detection models achieve praiseworthy results, these models have shown themselves to be vulnerable to attack. Easy to execute lexical manipulations such as the removal of whitespace from a given text create significant issues for word-based hate speech detection models. In this paper, we reproduce the results of five cutting edge models as well as four significant evasion schemes from prior work. Only a limited amount of evasion schemes that also maintain readability exists, and this works to our advantage in the recreation of the original data. Furthermore, we demonstrate that each lexical attack or evasion …


Community Detection Via Neighborhood Overlap And Spanning Tree Computations, Ketki Kulkarni, Aris Pagourtzis, Katerina Potika, Petros Potikas, Dora Souliou Apr 2019

Community Detection Via Neighborhood Overlap And Spanning Tree Computations, Ketki Kulkarni, Aris Pagourtzis, Katerina Potika, Petros Potikas, Dora Souliou

Faculty Publications, Computer Science

Most social networks of today are populated with several millions of active users, while the most popular of them accommodate way more than one billion. Analyzing such huge complex networks has become particularly demanding in computational terms. A task of paramount importance for understanding the structure of social networks as well as of many other real-world systems is to identify communities, that is, sets of nodes that are more densely connected to each other than to other nodes of the network. In this paper we propose two algorithms for community detection in networks, by employing the neighborhood overlap metric …


De-Anonymyzing Scale-Free Social Networks By Using Spectrum Partitioning Method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, Xiuzhen Cheng Feb 2019

De-Anonymyzing Scale-Free Social Networks By Using Spectrum Partitioning Method, Qi Sun, Jiguo Yu, Honglu Jiang, Yixian Chen, Xiuzhen Cheng

Department of Computer Science Publications

Social network data is widely shared, forwarded and published to third parties, which led to the risks of privacy disclosure. Even thought the network provider always perturbs the data before publishing it, attackers can still recover anonymous data according to the collected auxiliary information. In this paper, we transform the problem of de-anonymization into node matching problem in graph, and the de-anonymization method can reduce the number of nodes to be matched at each time. In addition, we use spectrum partitioning method to divide the social graph into disjoint subgraphs, and it can effectively be applied to large-scale social networks …


Trust Model And Simulation Of E-Commerce Based On Social Networks, Yu Zhen, Zhu Jie, Guicheng Shen Jan 2019

Trust Model And Simulation Of E-Commerce Based On Social Networks, Yu Zhen, Zhu Jie, Guicheng Shen

Journal of System Simulation

Abstract: In the current e-commerce industry, users need to check for the historical evaluation of the commodity before buying goods mostly, but false recommendations and massive redundancy recommendation problem which widely exists at present seriously affect the effectiveness and accuracy of users’ obtaining recommendations. For getting trust in e-commerce transactions, an e-commerce trust model SNTrust based on social networks is proposed. In SNTrust model, each user maintains a trusted social network set; a topological structure of the user information diffusion in the social network is described in the model, and the recommendation node trust is introduced to measure its credibility, …


Cidf: A Clustering-Based Interaction-Driven Friending Algorithm For The Next-Generation Social Networks, Aadil Alshammari, Abdelmounaam Rezgui Jan 2019

Cidf: A Clustering-Based Interaction-Driven Friending Algorithm For The Next-Generation Social Networks, Aadil Alshammari, Abdelmounaam Rezgui

Faculty Publications - Information Technology

Online social networks, such as Facebook, have been massively growing over the past decade. Recommender algorithms are a key factor that contributes to the success of social networks. These algorithms, such as friendship recommendation algorithms, are used to suggest connections within social networks. Current friending algorithms are built to generate new friendship recommendations that are most likely to be accepted. Yet, most of them are weak connections as they do not lead to any interactions. Facebook is well known for its Friends-of-Friends approach which recommends familiar people. This approach has a higher acceptance rate but the strength of the connections, …


Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li Jan 2019

Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li

Browse all Theses and Dissertations

Security has become one of the most significant concerns for our cyberspace. Securing the cyberspace, however, becomes increasingly challenging. This can be attributed to the rapidly growing diversities and complexity of the modern cyberspace. Specifically, it is not any more dominated by connected personal computers (PCs); instead, it is greatly characterized by cyber-physical systems (CPS), embedded systems, dynamic services, and human-computer interactions. Securing modern cyberspace therefore calls for a multi-faceted approach capable of systematically integrating these emerging characteristics. This dissertation presents our novel and significant solutions towards this direction. Specifically, we have devised automated, systematic security solutions to three critical …


Privacy Issues In Post Dissemination On Facebook, Burcu Sayi̇n Günel, Serap Şahi̇n, Dimitris G. Kogias, Charalampos Z. Patrikakis Jan 2019

Privacy Issues In Post Dissemination On Facebook, Burcu Sayi̇n Günel, Serap Şahi̇n, Dimitris G. Kogias, Charalampos Z. Patrikakis

Turkish Journal of Electrical Engineering and Computer Sciences

With social networks (SNs) being populated by a still increasing numbers of people who take advantage of the communication and collaboration capabilities that they offer, the probability of the exposure of people's personal moments to a wider than expected audience is also increasing. By studying the functionalities and characteristics that modern SNs offer, along with the people's habits and common behaviors in them, it is easy to understand that several privacy risks may exist, many of which people may be unaware of. In this paper, we focus on users' interactions with posts in a social network (SN), using Facebook as …


Community Detection In Complex Networks Using A New Agglomerative Approach, Majid Arasteh, Somayeh Alizadeh Jan 2019

Community Detection In Complex Networks Using A New Agglomerative Approach, Majid Arasteh, Somayeh Alizadeh

Turkish Journal of Electrical Engineering and Computer Sciences

Complex networks are used for the representation of complex systems such as social networks. Graph analysis comprises various tools such as community detection algorithms to uncover hidden data. Community detection aims to detect similar subgroups of networks that have tight interconnections with each other while, there is a sparse connection among different subgroups. In this paper, a greedy and agglomerative approach is proposed to detect communities. The proposed method is fast and often detects high-quality communities. The suggested method has several steps. In the first step, each node is assigned to a separated community. In the second step, a vertex …


Understanding Attribute And Social Circle Correlation In Social Networks, Pranav Nerurkar, Madhav Chandane, Sunil Bhirud Jan 2019

Understanding Attribute And Social Circle Correlation In Social Networks, Pranav Nerurkar, Madhav Chandane, Sunil Bhirud

Turkish Journal of Electrical Engineering and Computer Sciences

Social circles, groups, lists, etc. are functionalities that allow users of online social network (OSN) platforms to manually organize their social media contacts. However, this facility provided by OSNs has not received appreciation from users due to the tedious nature of the task of organizing the ones that are only contacted periodically. In view of the numerous benefits of this functionality, it may be advantageous to investigate measures that lead to enhancements in its efficacy by allowing for automatic creation of customized groups of users (social circles, groups, lists, etc). The field of study for this purpose, i.e. creating coarse-grained …