Security and Trust in social media networks
|
|
- Austin Carter
- 8 years ago
- Views:
Transcription
1 !1 Security and Trust in social media networks Prof. Touradj Ebrahimi DMP meeting San Jose, CA, USA 11 January 2014
2 Social media landscape!2
3 Popularity of social networks!3 March 2012 May
4 Popularity of social networks (cont.) 1+ billion photos 7+ billion photos ~140 billion photos 72 hours of video every minute April 2012
5 Popularity of social networks (cont.)!5 February
6 Popularity of social networks (cont.)!6 January
7 Trust & security issues in social networks!7
8 Trust & security issues in social networks (cont.)!8 Socialcam application automatically shares with your Facebook friends videos you watch May be doing you more harm than good!
9 Trust & security issues in social networks (cont.)!9 Spotify and Yahoo News Activity automatically publish songs and news you have listened to or read on your profile page
10 Trust & security issues in social networks (cont.)!10 Responsible sharing (e.g. a friend posted an embarrassing photo of a young political candidate Emma Kiernan enjoying a party) Anybody can post any picture of you on Facebook at any time! Even if deleted, it is there forever, stored in the vast Internet memory bank to be found again and again!
11 Trust & security issues in social networks (cont.)!11 Responsible sharing (e.g. top model Rosanagh Wypych posted photos of her and friends drinking alcohol and consuming cannabis)
12 Trust & security issues in social networks (cont.)!12 Wrong tags in Flickr! Challenges: Identify the most appropriate tags Eliminate noisy or spam tags Only around 50% of tags are truly related to an image [Kennedy et al., ACM MIR 2006]
13 Trust & security issues in social networks (cont.)!13 Spam bookmarks in Delicious
14 Trust & security solutions in social networks!14
15 Trust & security solutions in social networks (cont.)!15 Limit number of people to share content and communications with create private groups (e.g. Google+ Circles, Facebook Smart Lists)
16 Trust & security solutions in social networks (cont.)!16 Limit time to watch shared content (e.g. SnapChat application though they are not able to guarantee that your messaging data will be deleted in all instances)
17 Trust & security solutions in social networks (cont.)!17 Manage your account (friends, photos, comments, posts) Make sure that what you are sharing or posting is not going to cause regret
18 Trust & security before social media!18 ! Web search! Web videos! Blogs! Online shopping systems! Peer-to-peer (P2P) networks
19 Anti-spam strategies in online systems!19 [Heymann, Koutrika, Garcia-Molina, IEEE IC 2007]
20 Trust and reputation online systems!20
21 Trust and reputation online systems (cont.)!21 spam filtering
22 Model of social tagging system!22 [Ivanov, Vajda, Lee, Ebrahimi, IEEE SPM 2012]
23 Categorization of trust models!23 [Ivanov, Vajda, Lee, Ebrahimi, IEEE SPM 2012]
24 User versus content trust modeling!24 User trust modeling is more popular than content trust modeling: User trust models has a less complexity than content trust models User trust models can quickly adapt to the constantly evolving and changing environment in social systems due to the type of features used for modeling, and thus be applicable longer than content trust models, without need for creation of new models User trust modeling has a disadvantage of broad brush, i.e. it may be excessively strict if a user happens to post one bit of questionable content on otherwise legitimate content Subjectivity in classifying spam and non-spam content/ users remains as a fundamental issue, i.e. what is spam content/user to one person may be interesting to another one
25 Summary of representative recent techniques!25 Reference Trust model Media Method Dataset Gyongyi et al Koutrika et al Wu et al Liu et al content web pages an iterative approach, called TrustRank, to propagate trust scores to all nodes in the graph by splitting the trust score of a node among its neighbors according to a weighting scheme content bookmarks a coincidence-based model for query-by-tag search which estimates the level of agreement among different users in the system for a given tag content images a computer vision technique based on low-level image features to detect embedded text and computer-generated graphics content & user bookmarks an iterative approach to identify spam content by its information value extracted from the collaborative knowledge AltaVista, real Delicious, real & simulated SpamArchive & Ling-Spam, real Delicious, real Bogers and Van den Bosch 2008 content & user bookmarks KL-divergence to measure the similarity between language models and new posts BibSonomy & CiteULike, real Ivanov et al user images an approach based on the feedback from other users who agree or disagree with a tag associated with an image Panoramio, real [Ivanov, Vajda, Lee, Ebrahimi, IEEE SPM 2012]
26 Summary of representative recent techniques (cont.)!26 Reference Trust model Media Method Dataset Xu et al Krestel and Chen 2008 Benevenuto et al Lee et al Krause et al Markines et al user bookmarks an iterative approach to compute the goodness of each tag with respect to a content and the authority scores of the users user bookmarks a TrustRank-based approach using features which model tag co-occurance, content co-occurance and co-occurance of tag-content user videos a supervised learning approach applied on features that reflect users behavior through video responses user tweets a machine learning approach applied on social honeypots including users profile and tweets features user bookmarks a machine learning approach applied on a user s profile, bookmarking activity and context of tags features user bookmarks a machine learning approach applied on tag-, content- and user-based features MyWeb 2.0, real BibSonomy, real YouTube, real Twitter, real & simulated BibSonomy, real BibSonomy, real Caverlee et al user user profiles an approach to compute a dynamic trust score, called SocialTrust, depending on the quality of MySpace, real the relationship and personalized feedback ratings [Ivanov, Vajda, Lee, Ebrahimi, IEEE SPM 2012]
27 Open issues & challenges!27 Publicly available datasets: Publication of datasets from different social networks and even different datasets of one social network for evaluation of trust modeling approaches is rarely found, which makes it difficult to compare results and performance of different trust models Most of the datasets provide data for evaluating only one aspect of trust modeling, either user or content trust modeling, while evaluation of the other aspect requires introducing simulated objects in the real-world social tagging datasets
28 Open issues & challenges (cont.)!28 Dynamics of trust: User s trust tends to vary over time according to the user s experience and evolvement of social networks Only a few approaches deal with dynamics of trust by distinguishing between recent and old tags
29 Open issues & challenges (cont.)!29 Multilingualism: Most of the existing trust modeling approaches based on text information assume monolingual environments Some text information may be regarded as wrong due to the language difference people from various countries, so various languages simultaneously appear in tags and comments
30 Open issues & challenges (cont.)!30 Interaction across social networks: How trust models across domains can be effectively connected and shared? E.g. users can use their Facebook accounts to log in some other social network services
31 Open issues & challenges (cont.)!31 Multimodal analysis: Most of the current techniques for noise and spam reduction focus only on textual tag processing and user profile analysis, while audio and visual content features of multimedia content can also provide useful information about the relevance of the content and content-tag relationship
32 References!32 B. Sigurbjornsson, and R. van Zwol, "Flickr tag recommendation based on collective knowledge," in Proc. WWW, Apr. 2008, pp L. S. Kennedy, S.-F. Chang, and I. V. Kozintsev, To search or to label?: Predicting the performance of searchbased automatic image classifiers, in Proc. ACM MIR, Oct. 2006, pp K. Liu, B. Fang, and Y. Zhang, Detecting tag spam in social tagging systems with collaborative knowledge, in Proc. IEEE FSKD, Aug. 2009, pp P. Heymann, G. Koutrika, and H. Garcia-Molina, Fighting spam on social web sites: A survey of approaches and future challenges, IEEE Internet Comput., vol. 11, no. 6, pp , Nov X. Li, C. Snoek, and M. Worring, "Learning tag relevance by neighbor voting for social image retrieval," in Proc. ACM MIR, Oct. 2008, pp B. Markines, C. Cattuto, and F. Menczer, Social spam detection, in Proc. ACM AIRWeb, Apr. 2009, pp B. Krause, C. Schmitz, A. Hotho, and Stum G., The anti-social tagger: Detecting spam in social bookmarking systems, in Proc. ACM AIRWeb, Apr. 2008, pp G. Koutrika, F. A. Effendi, Z. Gyongyi, P. Heymann, and H. Garcia-Molina, Combating spam in tagging systems: An evaluation, ACM TWEB, vol. 2, no. 4, pp. 22:1 22:34, Oct Z. Gyongyi, H. Garcia-Molina, and J. Pedersen, Combating web spam with TrustRank, in Proc. VLDB, Aug. 2004, pp C.-T. Wu, K.-T. Cheng, Q. Zhu, and Y.-L. Wu, Using visual features for anti-spam filtering, in Proc. IEEE ICIP, Sep. 2005, vol. 3, pp. III
33 References (cont.)!33 I. Ivanov, P. Vajda, J.-S. Lee, and T. Ebrahimi, "In tags we trust: Trust modeling in social tagging of multimedia content," in IEEE SPM, vol. 29, no. 2, pp , Mar I. Ivanov, P. Vajda, J.-S. Lee, L. Goldmann, and T. Ebrahimi, Geotag propagation in social networks based on user trust model, MTAP, vol. 56, no. 1, pp , Jan I. Ivanov, P. Vajda, L. Goldmann, J.-S. Lee, and T. Ebrahimi, "Object-based tag propagation for semiautomatic annotation of images," in Proc. ACM MIR, Mar. 2010, pp T. Bogers and A. Van den Bosch, Using language models for spam detection in social bookmarking, in Proc. ECML PKDD, Sep. 2008, pp Z. Xu, Y. Fu, J. Mao, and D. Su, Towards the semantic web: Collaborative tag suggestions, in Proc. ACM WWW, May R. Krestel and L. Chen, Using co-occurence of tags and resources to identify spammers, in Proc. ECML PKDD, Sep. 2008, pp F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Gonc alves, Detecting spammers and content promoters in online video social networks, in Proc. ACM SIGIR, Jul. 2009, pp K. Lee, J. Caverlee, and S. Webb, Uncovering social spammers: social honeypots + machine learning, in Proc. ACM SIGIR, Jul. 2010, pp M. G. Noll, C. A. Yeung, N. Gibbins, C. Meinel, and N. Shadbolt, Telling experts from spammers: Expertise ranking in folksonomies, in Proc. ACM SIGIR, Jul. 2009, pp J. Caverlee, L. Liu, and S. Webb, SocialTrust: Tamper-resilient trust establishment in online communities, in Proc. ACM JCDL, Jun. 2008, pp A. Hotho, D. Benz, R. J aschke, and B. Krause, Eds., ECML PKDD Discovery Challenge, Sep. 2008, Available at:
34 Any question? Prof. Touradj Ebrahimi MMSPG EPFL
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach Alex Hai Wang College of Information Sciences and Technology, The Pennsylvania State University, Dunmore, PA 18512, USA
More informationPersonalizing Image Search from the Photo Sharing Websites
Personalizing Image Search from the Photo Sharing Websites Swetha.P.C, Department of CSE, Atria IT, Bangalore swethapc.reddy@gmail.com Aishwarya.P Professor, Dept.of CSE, Atria IT, Bangalore aishwarya_p27@yahoo.co.in
More informationPersonalized Image Search for Photo Sharing Website
Personalized Image Search for Photo Sharing Website Asst. Professor Rajni Pamnani rajaniaswani@somaiya.edu Manan Desai manan.desai@somaiya.edu Varshish Bhanushali varshish.b@somaiya.edu Ashish Charla ashish.charla@somaiya.edu
More informationMALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph
MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of
More informationAT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationOptimization of Image Search from Photo Sharing Websites Using Personal Data
Optimization of Image Search from Photo Sharing Websites Using Personal Data Mr. Naeem Naik Walchand Institute of Technology, Solapur, India Abstract The present research aims at optimizing the image search
More informationEnd of Life Content Report November 2014. Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net
End of Life Content Report November 2014 Produced By The NHS Choices Reporting Team CH.NHSChoices-Reporting@nhs.net End of Life Dashboard Page 1 Overall Choices Site Visits Tag cloud showing end of life
More informationSocial Spam Detection
Social Spam Detection Benjamin Markines,2 Ciro Cattuto 2 Filippo Menczer,2 School of Informatics, Indiana University, Bloomington, Indiana, USA 2 Complex Networks Lagrange Laboratory, Institute for Scientific
More informationCase 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationDON T FOLLOW ME: SPAM DETECTION IN TWITTER
DON T FOLLOW ME: SPAM DETECTION IN TWITTER Alex Hai Wang College of Information Sciences and Technology, The Pennsylvania State University, Dunmore, PA 18512, USA hwang@psu.edu Keywords: Abstract: social
More informationAutomatic Web Tagging and Person Tagging Using Language Models
Automatic Web Tagging and Person Tagging Using Language Models Qiaozhu Mei 1 and Yi Zhang 2 1 University of Illinois at Urbana-Champaign, USA qmei2@uiuc.edu 2 University of California at Santa Cruz, USA
More informationSocial-Sensed Multimedia Computing
Social-Sensed Multimedia Computing Wenwu Zhu Tsinghua University Multimedia Computing Search Recommend Multimedia Summarize Social Distribution... Sense from Social Preference Influence User behaviors
More informationNetwork-based spam filter on Twitter
Network-based spam filter on Twitter Ziyan Zhou Stanford University ziyanjoe@stanford.edu Lei Sun Stanford University sunlei@stanford.edu ABSTRACT Rapidly growing micro-blogging social networks, such as
More informationCommunity-Aware Prediction of Virality Timing Using Big Data of Social Cascades
1 Community-Aware Prediction of Virality Timing Using Big Data of Social Cascades Alvin Junus, Ming Cheung, James She and Zhanming Jie HKUST-NIE Social Media Lab, Hong Kong University of Science and Technology
More informationDetection of Malicious URLs by Correlating the Chains of Redirection in an Online Social Network (Twitter)
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 3, July 2014, PP 33-38 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Detection
More informationBayesian Spam Filtering
Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary amaobied@ucalgary.ca http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating
More informationToward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods
Toward Spam 2.0: An Evaluation of Web 2.0 Anti-Spam Methods Pedram Hayati, Vidyasagar Potdar Digital Ecosystem and Business Intelligence (DEBI) Institute, Curtin University of Technology, Perth, WA, Australia
More informationMLg. Big Data and Its Implication to Research Methodologies and Funding. Cornelia Caragea TARDIS 2014. November 7, 2014. Machine Learning Group
Big Data and Its Implication to Research Methodologies and Funding Cornelia Caragea TARDIS 2014 November 7, 2014 UNT Computer Science and Engineering Data Everywhere Lots of data is being collected and
More informationLinksTo A Web2.0 System that Utilises Linked Data Principles to Link Related Resources Together
LinksTo A Web2.0 System that Utilises Linked Data Principles to Link Related Resources Together Owen Sacco 1 and Matthew Montebello 1, 1 University of Malta, Msida MSD 2080, Malta. {osac001, matthew.montebello}@um.edu.mt
More informationSocial Media Statistics. What is going on out there
Social Media Statistics What is going on out there What is Social Media? It s a great big machine allowing people to talk to each other, about everything and nothing, all the time, where ever the are or..
More informationConventional. Personalized
Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Personalized
More informationYour Business s Online Check-Up
1 Did you know?... From the smallest start-up to a multi-generational family business to Fortune 500 companies, all businesses have a web identity or citation made up of the business name, address, phone
More information6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET)
More informationLearn to Personalized Image Search from the Photo Sharing Websites
Learn to Personalized Image Search from the Photo Sharing Websites ABSTRACT: Increasingly developed social sharing websites, like Flickr and Youtube, allow users to create, share, annotate and comment
More informationEmail Spam Detection A Machine Learning Approach
Email Spam Detection A Machine Learning Approach Ge Song, Lauren Steimle ABSTRACT Machine learning is a branch of artificial intelligence concerned with the creation and study of systems that can learn
More informationFraudulent Support Telephone Number Identification Based on Co-occurrence Information on the Web
Fraudulent Support Telephone Number Identification Based on Co-occurrence Information on the Web Xin Li, Yiqun Liu, Min Zhang, Shaoping Ma State Key Laboratory of Intelligent Technology and Systems Tsinghua
More informationThe role of multimedia in archiving community memories
The role of multimedia in archiving community memories Jonathon S. Hare, David P. Dupplaw, Wendy Hall, Paul H. Lewis, and Kirk Martinez Electronics and Computer Science, University of Southampton, Southampton,
More informationBT Retail Social Media making it easy for our customers
BT Retail Social Media making it easy for our customers Dawn Walton, GM Central Planning Nigel Elliott, Social Media Channel Manager Kerry Gulloch, Social Media Communities Manager Agenda o How we ended
More informationDetecting Linkedin Spammers and its Spam Nets
Detecting Linkedin Spammers and its Spam Nets Víctor M. Prieto, Manuel Álvarez and Fidel Cacheda Department of Information and Communication Technologies, University of A Coruña, Coruña, Spain 15071 Email:
More informationFolksonomies versus Automatic Keyword Extraction: An Empirical Study
Folksonomies versus Automatic Keyword Extraction: An Empirical Study Hend S. Al-Khalifa and Hugh C. Davis Learning Technology Research Group, ECS, University of Southampton, Southampton, SO17 1BJ, UK {hsak04r/hcd}@ecs.soton.ac.uk
More informationCollaborative Filteration for user behavior Prediction using Big Data Hadoop
Collaborative Filteration for user behavior Prediction using Big Data Hadoop Jayshri Manohar Somwanshi, Prof. Y. B. Gurav Department of Computer Engineering, P.V.P.I.T Bavdhan, Pune, Maharashtra, India
More informationBusiness Challenges and Research Directions of Management Analytics in the Big Data Era
Business Challenges and Research Directions of Management Analytics in the Big Data Era Abstract Big data analytics have been embraced as a disruptive technology that will reshape business intelligence,
More informationWeb Mining Seminar CSE 450. Spring 2008 MWF 11:10 12:00pm Maginnes 113
CSE 450 Web Mining Seminar Spring 2008 MWF 11:10 12:00pm Maginnes 113 Instructor: Dr. Brian D. Davison Dept. of Computer Science & Engineering Lehigh University davison@cse.lehigh.edu http://www.cse.lehigh.edu/~brian/course/webmining/
More informationExploring Big Data in Social Networks
Exploring Big Data in Social Networks virgilio@dcc.ufmg.br (meira@dcc.ufmg.br) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about
More informationPULLING OUT OPINION TARGETS AND OPINION WORDS FROM REVIEWS BASED ON THE WORD ALIGNMENT MODEL AND USING TOPICAL WORD TRIGGER MODEL
Journal homepage: www.mjret.in ISSN:2348-6953 PULLING OUT OPINION TARGETS AND OPINION WORDS FROM REVIEWS BASED ON THE WORD ALIGNMENT MODEL AND USING TOPICAL WORD TRIGGER MODEL Utkarsha Vibhute, Prof. Soumitra
More informationHow To Measure Spam On Multiple Platforms
Observing Common Spam in Tweets and Email Cristian Lumezanu NEC Laboratories America Princeton, NJ lume@nec-labs.com Nick Feamster University of Maryland College Park, MD feamster@cs.umd.edu ABSTRACT Spam
More informationEnhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
More informationKeywords Big Data; OODBMS; RDBMS; hadoop; EDM; learning analytics, data abundance.
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analytics
More informationAutomatic Annotation Wrapper Generation and Mining Web Database Search Result
Automatic Annotation Wrapper Generation and Mining Web Database Search Result V.Yogam 1, K.Umamaheswari 2 1 PG student, ME Software Engineering, Anna University (BIT campus), Trichy, Tamil nadu, India
More informationEmail Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
More informationMeasuring Propagation in Online Social Networks: The Case of YouTube
Measuring Propagation in Online Social Networks: The Case of YouTube Amir Afrasiabi Rad a.afrasiabi@uottawa.ca EECS Morad Benyoucef Benyoucef@Telfer.uOttawa.ca Telfer School of Management University of
More informationSocial networking guidelines and information
Social networking guidelines and information Introduction Social media is an emerging and changing landscape. The digital marketing communications team and corporate communications have a social media
More informationTowards SoMEST Combining Social Media Monitoring with Event Extraction and Timeline Analysis
Towards SoMEST Combining Social Media Monitoring with Event Extraction and Timeline Analysis Yue Dai, Ernest Arendarenko, Tuomo Kakkonen, Ding Liao School of Computing University of Eastern Finland {yvedai,
More informationHow Social Media will Change the Future of Banking Services
DOI: 10.7763/IPEDR. 2013. V65. 1 How Social Media will Change the Future of Banking Services Iwa Kuchciak 1 1 University of Lodz Abstract. Parallel with the growth of importance of social media there is
More informationAbove the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down.
Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down. Access: It is the ability to see what you are trying to view (e.g. you can see a friend
More informationMethods of Social Media Research: Data Collection & Use in Social Media
Methods of Social Media Research: Data Collection & Use in Social Media Florida State University College of Communication and Information Sanghee Oh shoh@cci.fsu.edu Overview Introduction to myself Introduction
More informationSpam Filtering in Online Social Networks Using Machine Learning Technique
Spam Filtering in Online Social Networks Using Machine Learning Technique T.Suganya 1, T.Hemalatha 2 ME (final year), Department of Computer Science and Engineering, Karpagam University, Coimbatore, India
More informationCAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance
CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance Shen Wang, Bin Wang and Hao Lang, Xueqi Cheng Institute of Computing Technology, Chinese Academy of
More informationComputer Forensics Application. ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification
Computer Forensics Application ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification Project Overview A new framework that provides additional clues extracted from images
More informationCitationBase: A social tagging management portal for references
CitationBase: A social tagging management portal for references Martin Hofmann Department of Computer Science, University of Innsbruck, Austria m_ho@aon.at Ying Ding School of Library and Information Science,
More informationCombating Spam in Tagging Systems: An Evaluation
Combating Spam in Tagging Systems: An Evaluation GEORGIA KOUTRIKA Computer Science Department, Stanford University FRANS ADJIE EFFENDI Computer Science Department, Stanford University ZOLTÁN GYÖNGYI Computer
More informationIEEE TRANSACTIONS ON MULTIMEDIA, VOL. 14, NO. 4, AUGUST 2012 963. Learn to Personalized Image Search From the Photo Sharing Websites
IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 14, NO. 4, AUGUST 2012 963 Learn to Personalized Image Search From the Photo Sharing Websites Jitao Sang, Changsheng Xu, Senior Member, IEEE, and Dongyuan Lu Abstract
More informationCHAPTER 2 Social Media as an Emerging E-Marketing Tool
Targeted Product Promotion Using Firefly Algorithm On Social Networks CHAPTER 2 Social Media as an Emerging E-Marketing Tool Social media has emerged as a common means of connecting and communication with
More informationIntroduction to Social Media
Introduction to Social Media Today s Discussion Overview of Web 2.0 and social media tools How EPA and other agencies are using these tools Agency and governmentwide policies governing use of tools Case
More informationInfographics in the Classroom: Using Data Visualization to Engage in Scientific Practices
Infographics in the Classroom: Using Data Visualization to Engage in Scientific Practices Activity 4: Graphing and Interpreting Data In Activity 4, the class will compare different ways to graph the exact
More informationBest Practices for Social Media
for Social Media Content Provided by Define Your Goals Your goals should say what you hope to accomplish. Example of goals include: Increase awareness with current customers Connect with new customers
More informationLecture Overview. Web 2.0, Tagging, Multimedia, Folksonomies, Lecture, Important, Must Attend, Web 2.0 Definition. Web 2.
Lecture Overview Web 2.0, Tagging, Multimedia, Folksonomies, Lecture, Important, Must Attend, Martin Halvey Introduction to Web 2.0 Overview of Tagging Systems Overview of tagging Design and attributes
More informationInternet Basics. Basic Terms and Concepts. Connecting to the Internet
Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a
More informationThe mobile opportunity: How to capture upwards of 200% in lost traffic
June 2014 BrightEdge Mobile Share Report The mobile opportunity: How to capture upwards of 200% in lost traffic You ve likely heard that mobile website optimization is the next frontier, and you ve probably
More informationSocial Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS
Social Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS This resource provides a sampling of tools available to produce social media metrics. The list
More informationBlog Post Extraction Using Title Finding
Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School
More informationIntinno: A Web Integrated Digital Library and Learning Content Management System
Intinno: A Web Integrated Digital Library and Learning Content Management System Synopsis of the Thesis to be submitted in Partial Fulfillment of the Requirements for the Award of the Degree of Master
More informationSpam Filtering in Twitter using Sender-Receiver Relationship
Spam Filtering in Twitter using Sender-Receiver Relationship Jonghyuk Song 1, Sangho Lee 1 and Jong Kim 2 1 Dept. of CSE, POSTECH, Republic of Korea {freestar,sangho2}@postech.ac.kr 2 Div. of ITCE, POSTECH,
More informationSocial Media Guidelines for Best Practice
Social Media Guidelines for Best Practice September 2009 Contents: Listen and research the social media environment Page 3 & 4 Set the parameters before you start Page 4 Getting Started Page 5-6 In Summary
More informationImage Spam Filtering by Content Obscuring Detection
Image Spam Filtering by Content Obscuring Detection Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli Dept. of Electrical and Electronic Eng., University of Cagliari Piazza d Armi, 09123 Cagliari,
More informationCAP4773/CIS6930 Projects in Data Science, Fall 2014 [Review] Overview of Data Science
CAP4773/CIS6930 Projects in Data Science, Fall 2014 [Review] Overview of Data Science Dr. Daisy Zhe Wang CISE Department University of Florida August 25th 2014 20 Review Overview of Data Science Why Data
More informationLOW COST PAGE QUALITY FACTORS TO DETECT WEB SPAM
LOW COST PAGE QUALITY FACTORS TO DETECT WEB SPAM Ashish Chandra, Mohammad Suaib, and Dr. Rizwan Beg Department of Computer Science & Engineering, Integral University, Lucknow, India ABSTRACT Web spam is
More informationAutomatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines
, 22-24 October, 2014, San Francisco, USA Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines Baosheng Yin, Wei Wang, Ruixue Lu, Yang Yang Abstract With the increasing
More informationSOCIAL MEDIA MARKETING 101. By Debbie Laskey, MBA
SOCIAL MEDIA MARKETING 101 By Debbie Laskey, MBA Marketing, Strategic Branding, Communications & Website Consultant December 2009 What is social media? According to Wikipedia, the term social media has
More informationMeasuring and Monitoring Customer Experience
Measuring and Monitoring Experience Tom Exeter Sales, Marketing & Experience Executive Sport & Physical Activity, Commercial Services, University of Leeds Background to our organisation. The department
More informationAshley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
More informationAnalysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
More informationFraud Detection in Electronic Auction
Fraud Detection in Electronic Auction Duen Horng Chau 1, Christos Faloutsos 2 1 Human-Computer Interaction Institute, School of Computer Science, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh
More informationData Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
More informationIJREAS Volume 2, Issue 2 (February 2012) ISSN: 2249-3905 STUDY OF SEARCH ENGINE OPTIMIZATION ABSTRACT
STUDY OF SEARCH ENGINE OPTIMIZATION Sachin Gupta * Ankit Aggarwal * ABSTRACT Search Engine Optimization (SEO) is a technique that comes under internet marketing and plays a vital role in making sure that
More informationFlorida International University - University of Miami TRECVID 2014
Florida International University - University of Miami TRECVID 2014 Miguel Gavidia 3, Tarek Sayed 1, Yilin Yan 1, Quisha Zhu 1, Mei-Ling Shyu 1, Shu-Ching Chen 2, Hsin-Yu Ha 2, Ming Ma 1, Winnie Chen 4,
More informationFinancial Trading System using Combination of Textual and Numerical Data
Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,
More informationA Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationAUSTRALIAN ONLINE LANDSCAPE REVIEW MAY 2013
AUSTRALIAN ONLINE LANDSCAPE REVIEW MAY 2013 SIGNIFICANT ENHANCEMENTS TO NIELSEN ONLINE RATINGS HYBRID DATA Summary: May data represents a trend break versus prior months across all metrics for Online Ratings
More informationSocialTrust++: Building Community-Based Trust in Social Information Systems
SocialTrust++: Building Community-Based Trust in Social Information Systems James Caverlee, Zhiyuan Cheng, Brian Eoff, Chiao-Fang Hsu, Krishna Kamath, Said Kashoob, Jeremy Kelley, Elham Khabiri, and Kyumin
More informationA UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
More informationSEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.
More informationContemporary Techniques for Data Mining Social Media
Contemporary Techniques for Data Mining Social Media Stephen Cutting (100063482) 1 Introduction Social media websites such as Facebook, Twitter and Google+ allow millions of users to communicate with one
More informationComputing & Telecommunications Services Monthly Report March 2015
March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex helpdesk@wright.edu www.wright.edu/cats/ Last Modified
More informationPartially Supervised Word Alignment Model for Ranking Opinion Reviews
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 Partially Supervised Word Alignment Model for Ranking Opinion Reviews Rajeshwari
More informationGuide to Social Marketing for Tourist Destinations & Travel Agents Introduction
Guide to Social Marketing for Tourist Destinations & Travel Agents Introduction There has been a dramatic increase in the number of people who are becoming self-reliant travelers; using online communities,
More informationA Survey on Product Aspect Ranking
A Survey on Product Aspect Ranking Charushila Patil 1, Prof. P. M. Chawan 2, Priyamvada Chauhan 3, Sonali Wankhede 4 M. Tech Student, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra,
More informationEntrepreneurship Center
Entrepreneurship Center Basic Concepts Using The Internet to Market Your Business Search Engines Basics Copyright 2009 tenby technologies 2 Using The Internet To Market Your Business Internet marketing
More informationIMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
More information12 months 4 quarters 1 goal
12 months 4 quarters 1 goal You know you need to whip your digital marketing game into shape. But you also know budgets are tight. If you're ready to take your online marketing to the next level without
More informationInternet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video
More informationCanonical Image Selection for Large-scale Flickr Photos using Hadoop
Canonical Image Selection for Large-scale Flickr Photos using Hadoop Guan-Long Wu National Taiwan University, Taipei Nov. 10, 2009, @NCHC Communication and Multimedia Lab ( 通 訊 與 多 媒 體 實 驗 室 ), Department
More informationSubordinating to the Majority: Factoid Question Answering over CQA Sites
Journal of Computational Information Systems 9: 16 (2013) 6409 6416 Available at http://www.jofcis.com Subordinating to the Majority: Factoid Question Answering over CQA Sites Xin LIAN, Xiaojie YUAN, Haiwei
More informationSemantic Concept Based Retrieval of Software Bug Report with Feedback
Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop
More informationint.ere.st: Building a Tag Sharing Service with the SCOT Ontology
int.ere.st: Building a Tag Sharing Service with the SCOT Ontology HakLae Kim, John G. Breslin Digital Enterprise Research Institute National University of Ireland, Galway IDA Business Park, Lower Dangan
More informationThe British Academy of Management. Website and Social Media Policy
The British Academy of Management s Website and Social Media Policy The creation of management knowledge through research and its dissemination through teaching and application The British Academy of Management
More informationImage Spam Filtering Using Visual Information
Image Spam Filtering Using Visual Information Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli, Dept. of Electrical and Electronic Eng., Univ. of Cagliari Piazza d Armi, 09123 Cagliari, Italy
More informationHow To Cluster On A Search Engine
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A REVIEW ON QUERY CLUSTERING
More information