861 resultados para Attributed Social Networks, Community Detection
Resumo:
This paper presents an analysis of whether a consumer's decision to switch from one mobile phone provider to another is driven by individual consumer characteristics or by actions of other consumers in her social network. Such consumption interdependences are estimated using a unique dataset, which contains transaction data based on anonymized call records from a large European mobile phone carrier to approximate a consumer's social network. Results show that network effects have an important impact on consumers' switching decisions: switching decisions are interdependent between consumers who interact with each other and this interdependence increases in the closeness between two consumers as measured by the calling data. In other words, if a subscriber switches carriers, she is also affecting the switching probabilities of other individuals in her social circle. The paper argues that such an approach is of high relevance to both switching of providers and to the adoption of new products. © 2013 Copyright Taylor and Francis Group, LLC.
Resumo:
With the advent of GPS enabled smartphones, an increasing number of users is actively sharing their location through a variety of applications and services. Along with the continuing growth of Location-Based Social Networks (LBSNs), security experts have increasingly warned the public of the dangers of exposing sensitive information such as personal location data. Most importantly, in addition to the geographical coordinates of the user’s location, LBSNs allow easy access to an additional set of characteristics of that location, such as the venue type or popularity. In this paper, we investigate the role of location semantics in the identification of LBSN users. We simulate a scenario in which the attacker’s goal is to reveal the identity of a set of LBSN users by observing their check-in activity. We then propose to answer the following question: what are the types of venues that a malicious user has to monitor to maximize the probability of success? Conversely, when should a user decide whether to make his/her check-in to a location public or not? We perform our study on more than 1 million check-ins distributed over 17 urban regions of the United States. Our analysis shows that different types of venues display different discriminative power in terms of user identity, with most of the venues in the “Residence” category providing the highest re-identification success across the urban regions. Interestingly, we also find that users with a high entropy of their check-ins distribution are not necessarily the hardest to identify, suggesting that it is the collective behaviour of the users’ population that determines the complexity of the identification task, rather than the individual behaviour.
Resumo:
In recent years, the rapid spread of smartphones has led to the increasing popularity of Location-Based Social Networks (LBSNs). Although a number of research studies and articles in the press have shown the dangers of exposing personal location data, the inherent nature of LBSNs encourages users to publish information about their current location (i.e., their check-ins). The same is true for the majority of the most popular social networking websites, which offer the possibility of associating the current location of users to their posts and photos. Moreover, some LBSNs, such as Foursquare, let users tag their friends in their check-ins, thus potentially releasing location information of individuals that have no control over the published data. This raises additional privacy concerns for the management of location information in LBSNs. In this paper we propose and evaluate a series of techniques for the identification of users from their check-in data. More specifically, we first present two strategies according to which users are characterized by the spatio-temporal trajectory emerging from their check-ins over time and the frequency of visit to specific locations, respectively. In addition to these approaches, we also propose a hybrid strategy that is able to exploit both types of information. It is worth noting that these techniques can be applied to a more general class of problems where locations and social links of individuals are available in a given dataset. We evaluate our techniques by means of three real-world LBSNs datasets, demonstrating that a very limited amount of data points is sufficient to identify a user with a high degree of accuracy. For instance, we show that in some datasets we are able to classify more than 80% of the users correctly.
Resumo:
Доклад, поместен в сборника на Националната конференция "Образованието в информационното общество", Пловдив, май, 2012 г.
Resumo:
This chapter explores how gentrifiers in Istanbul mobilise their social networks and social capital during the gentrification process, and how their networks are constructed through processes of “ place making” and belonging. In addition, this chapter aims to demonstrate how social capital and social networks work in practice during the gentrification process. It also examines place making and claiming strategies of gentrifiers by focusing on the following questions: (a) What are the spatial strategies of the new middle class, and what is the importance of these strategies?; (b) How are class and spatial boundaries designated in gentrified neighbourhoods?; (c) What kinds of networks and relationships play a role in developing certain housing dispositions or belonging patterns
Resumo:
A „földrajzi munkamegosztás” vagy „elhelyezkedés probléma” arra a kérdésre utal, miért alakulnak ki egy-egy gazdasági tevékenységre szakosodott földrajzi egységek, regionális gazdasági rendszerek. A hagyományos közgazdasági megközelítések a területek racionálisan kalkulálható komparatív előnyeit, a nyersanyagok vagy a piac közelségét, infrastrukturális adottságokat, útfüggőséget stb. szokták hangsúlyozni. A tanulmány szerzője a társadalmi kapcsolatok jelentőségét emeli ki, azt sugallja, hogy a területi specializálódás az egymással kapcsolatban álló, hasonlóan specializálódott többi szereplő nyomására alakul ki. A hipotézist két külföldön végzett eset tanulmány tapasztalatai alapján járja körül. ______________________ The question of "regional economic systems", "geographical division of labour" or "location problem" has an important literature. Economic approaches emphasize the rationally calculated advantages of the specialized industrial areas: the benefit of the exploitation of discovered resources, more cooperative relations, etc. The paper stresses the role of social networks in the location problem: economically specialized areas formed because of the suggestions and tips of connected enterprises, cooperative partners. The hypothesis is based on the experiences of two case studies, made in a Peruvian rural area and a Mexican modern industrial area.
Resumo:
The arrival of Cuba’s Information Technology (IT) and Communications Minister Ramiro Valdés to Venezuela in the Spring of 2010 to serve as a ‘consultant’ to the Venezuelan government awakened a new reality in that country. Rampant with deep economic troubles, escalating crime, a murder rate that has doubled since Chávez took over in 1999, and an opposition movement led by university students and other activists who use the Internet as their primary weapon, Venezuela has resorted to Cuba for help. In a country where in large part traditional media outlets have been censored or are government-controlled, the Internet and its online social networks have become the place to obtain, as well as disseminate, unfiltered information. As such, Internet growth and use of its social networks has skyrocketed in Venezuela, making it one of Latin America’s highest Web users. Because of its increased use to spark political debate among Venezuelans and publish information that differs with the official government line, Chávez has embarked on an initiative to bring the Internet to the poor and others who would otherwise not have access, by establishing government-sponsored Internet Info Centers throughout the country, to disseminate information to his followers. With the help of Cuban advisors, who for years have been a part of Venezuela’s defense, education, and health care initiatives, Chávez has apparently taken to adapting Cuba’s methodology for the control of information. He has begun to take special steps toward also controlling the type of information flowing through the country’s online social networks, considering the implementation of a government-controlled single Internet access point in Venezuela. Simultaneously, in adapting to Venezuela’s Internet reality, Chávez has engaged online by creating his own Twitter account in an attempt to influence public opinion, primarily of those who browse the Web. With a rapidly growing following that may soon reach one million subscribers, Chávez claims to have set up his own online trench to wage cyber space battle.
Resumo:
A two-year longitudinal study was conducted to investigate late adolescents in transition. An initial investigation with senior high school students assessed students prior to leaving home for college and after college entrance. Of the original 131 participants recontacted two years after their graduation, 78 returned surveys. The study (a) explored changes in social network structure and function, (b) determined whether late adolescent-parent-peer relations change over time, and (c) identified prospectively the impact of social support, adolescent-parent-peer relations, and attachment security on well-being and feelings about the transition after high school. Students attending college locally reported an increase in total network support at Time 2. Regardless of location, more support from friends was received after the transition from high school, whereas family support did not vary across time. Parent relations were closer after the transition and were predictive of various well-being measures and feelings about the transition from high school. ^
Resumo:
Market research is often conducted through conventional methods such as surveys, focus groups and interviews. But the drawbacks of these methods are that they can be costly and timeconsuming. This study develops a new method, based on a combination of standard techniques like sentiment analysis and normalisation, to conduct market research in a manner that is free and quick. The method can be used in many application-areas, but this study focuses mainly on the veganism market to identify vegan food preferences in the form of a profile. Several food words are identified, along with their distribution between positive and negative sentiments in the profile. Surprisingly, non-vegan foods such as cheese, cake, milk, pizza and chicken dominate the profile, indicating that there is a significant market for vegan-suitable alternatives for such foods. Meanwhile, vegan-suitable foods such as coconut, potato, blueberries, kale and tofu also make strong appearances in the profile. Validation is performed by using the method on Volkswagen vehicle data to identify positive and negative sentiment across five car models. Some results were found to be consistent with sales figures and expert reviews, while others were inconsistent. The reliability of the method is therefore questionable, so the results should be used with caution.
Resumo:
In this thesis connections between messages on the public wall of the Russian social network Vkontakte are analysed and classified. A total of 1818 messages from three different Vkontakte groups were collected and analysed according to a new framework based on Halliday and Hasan’s (1976) research into cohesion and Simmons’s (1981) adaptation of their classification for Russian. The two categories of textuality, cohesion and coherence, describe the linguistic connections between messages. The main aim was to find out how far the traditional categories of cohesion are applicable to an online social network including written text as well as multimedia-files. In addition to linguistic cohesion the pragmatic and topic coherence between Vkontakte messages was also analysed. The analysis of pragmatic coherence classifies the messages with acts according to their pragmatic function in relation to surrounding messages. Topic coherence analyses the content of the messages, describes where a topic begins, changes or is abandoned. Linguistic cohesion, topic coherence and pragmatic coherence enable three different types of connections between messages and these together form a coherent communication on the message wall. The cohesion devices identified by Halliday and Hasan and Simmons were found to occur in these texts, but additional devices were also identified: these are multimodal, graphical and grammatical cohesion.
Resumo:
Social network sites (SNS), such as Facebook, Google+ and Twitter, have attracted hundreds of millions of users daily since their appearance. Within SNS, users connect to each other, express their identity, disseminate information and form cooperation by interacting with their connected peers. The increasing popularity and ubiquity of SNS usage and the invaluable user behaviors and connections give birth to many applications and business models. We look into several important problems within the social network ecosystem. The first one is the SNS advertisement allocation problem. The other two are related to trust mechanisms design in social network setting, including local trust inference and global trust evaluation. In SNS advertising, we study the problem of advertisement allocation from the ad platform's angle, and discuss its differences with the advertising model in the search engine setting. By leveraging the connection between social networks and hyperbolic geometry, we propose to solve the problem via approximation using hyperbolic embedding and convex optimization. A hyperbolic embedding method, \hcm, is designed for the SNS ad allocation problem, and several components are introduced to realize the optimization formulation. We show the advantages of our new approach in solving the problem compared to the baseline integer programming (IP) formulation. In studying the problem of trust mechanisms in social networks, we consider the existence of distrust (i.e. negative trust) relationships, and differentiate between the concept of local trust and global trust in social network setting. In the problem of local trust inference, we propose a 2-D trust model. Based on the model, we develop a semiring-based trust inference framework. In global trust evaluation, we consider a general setting with conflicting opinions, and propose a consensus-based approach to solve the complex problem in signed trust networks.
Resumo:
In this dissertation, we apply mathematical programming techniques (i.e., integer programming and polyhedral combinatorics) to develop exact approaches for influence maximization on social networks. We study four combinatorial optimization problems that deal with maximizing influence at minimum cost over a social network. To our knowl- edge, all previous work to date involving influence maximization problems has focused on heuristics and approximation. We start with the following viral marketing problem that has attracted a significant amount of interest from the computer science literature. Given a social network, find a target set of customers to seed with a product. Then, a cascade will be caused by these initial adopters and other people start to adopt this product due to the influence they re- ceive from earlier adopters. The idea is to find the minimum cost that results in the entire network adopting the product. We first study a problem called the Weighted Target Set Selection (WTSS) Prob- lem. In the WTSS problem, the diffusion can take place over as many time periods as needed and a free product is given out to the individuals in the target set. Restricting the number of time periods that the diffusion takes place over to be one, we obtain a problem called the Positive Influence Dominating Set (PIDS) problem. Next, incorporating partial incentives, we consider a problem called the Least Cost Influence Problem (LCIP). The fourth problem studied is the One Time Period Least Cost Influence Problem (1TPLCIP) which is identical to the LCIP except that we restrict the number of time periods that the diffusion takes place over to be one. We apply a common research paradigm to each of these four problems. First, we work on special graphs: trees and cycles. Based on the insights we obtain from special graphs, we develop efficient methods for general graphs. On trees, first, we propose a polynomial time algorithm. More importantly, we present a tight and compact extended formulation. We also project the extended formulation onto the space of the natural vari- ables that gives the polytope on trees. Next, building upon the result for trees---we derive the polytope on cycles for the WTSS problem; as well as a polynomial time algorithm on cycles. This leads to our contribution on general graphs. For the WTSS problem and the LCIP, using the observation that the influence propagation network must be a directed acyclic graph (DAG), the strong formulation for trees can be embedded into a formulation on general graphs. We use this to design and implement a branch-and-cut approach for the WTSS problem and the LCIP. In our computational study, we are able to obtain high quality solutions for random graph instances with up to 10,000 nodes and 20,000 edges (40,000 arcs) within a reasonable amount of time.
Resumo:
The use of virtual social networks (VSNs) has been prevalent among consumers worldwide. Numerous studies have investigated various aspects of VSNs. However, these studies have mainly focused on students and young adults as they were early adopters of these innovative networks. A search of the literature revealed there has been a paucity of research on adult consumers’ use of VSNs. This research study addressed this gap in the literature by examining the determinants of engagement in VSNs among adult consumers in Singapore. The objectives of this study are to empirically investigate the determinants of engagement in VSNs and to offer theoretical insights into consumers’ preference and usage of VSNs. This study tapped upon several theories developed in the discipline of technology and innovation adoption. These were Roger’s Diffusion of Innovation, Theory of Reasoned Action (TRA), Theory of Planned Behavior (TPB), Technology Acceptance Model (TAM), Conceptual Framework of Individual Innovation Adoption by Frambach and Schillewaert (2002), Enhanced Model of Innovation Adoption by Talukder (2011), Extended Unified Theory of Acceptance and Use of Technology (UTAUT2) and the Information Systems (IS) Success Model. The proposed research model, named the Media Usage Model (MUM), is a framework rooted in innovation diffusion and IS theories. The MUM distilled the essence of these established models and thus provides an updated, lucid explanation of engagement in VSNs. A cross-sectional, online social survey was conducted to collect quantitative data to examine the validity of the proposed research model. Multivariate data analysis was carried out on a data set comprising 806 usable responses by utilizing SPSS, and for structural equation modeling AMOS and SmartPLS. The results indicate that consumer attitude towards VSNs is significantly and positively influenced by: three individual factors – hedonic motivation, incentives and experience; two system characteristics – system quality and information quality; and one social factor – social bonding. Consumer demographics were found to influence people’s attitudes towards VSNs. In addition, consumer experience and attitude towards VSNs significantly and positively influence their usage of VSNs. The empirical data supported the proposed research model, explaining 80% of variance in attitude towards VSNs and 45% of variance in usage of VSNs. Therefore, the MUM achieves a definite contribution to theoretical knowledge of consumer engagement in VSNs by deepening and broadening our appreciation of the intricacies related to use of VSNs in Singapore. This study’s findings have implications for customer service management, services marketing and consumer behavior. These findings also have strategic implications for maximizing efficient utilization and effective management of VSNs by businesses and operators. The contributions of this research are: firstly, shifting the boundaries of technology or innovation adoption theories from research on employees to consumers as well as the boundaries of Internet usage or adoption research from students to adults, which is also known as empirical generalization; secondly, highlighting the issues associated with lack of significance of social factors in adoption research; and thirdly, augmenting information systems research by integrating important antecedents for success in information systems.