Social networks and surveillance for society. (2018)
- Record Type:
- Book
- Title:
- Social networks and surveillance for society. (2018)
- Main Title:
- Social networks and surveillance for society
- Further Information:
- Note: Tansel Özyer, Sambit Bakshi, Reda Alhajj, editors.
- Editors:
- Özyer, Tansel
Bakshi, Sambit, 1987-
Alhajj, Reda - Contents:
- Intro; Preface; Contents; Frauds in Online Social Networks: A Review; 1 Introduction; 2 Frauds and Its Typologies; 3 Rumours and Misinformation; Information Present in the Post; Spread and Propagation; 4 Brand Jacking and Hashtag Jacking; 5 Phishing; 6 Identity Theft; 7 Cyber Stalking/Bullying; 8 Fake Reviews and Fake Likes; 9 Fake Accounts/Sybils; 10 Conclusions; References; Leveraging Social Network Analysis and Cyber Forensics Approaches to Study Cyber Propaganda Campaigns; 1 Introduction; 2 Literature Review; Cyber Forensics Empirical Observations and Trends of Bots Used in Information OperationsInfluence in Social Media; 3 Methodology; Dataset 1: Twitter Accounts of Historical Deviant Groups Known for Their Anti-NATO Narratives; Dataset Description; Metadata Extraction Using Cyber Forensics Approaches; Applying Social Network Analysis to Identify Influential Information Actors; Applying Focal Structure Analysis (FSA) to Identify Powerful Groups of Individuals Effecting Cyber Propaganda Campaign; Summary of the Conducted Analysis on Dataset 1 Dataset 2: Twitter Accounts of the Anti-NATO Bots Used During the Cyber Propaganda CampaignDataset Description; Applying Social Network Analysis to Identify Influential Bots; Applying Focal Structure Analysis to Identify Powerful Bots Effecting Cyber Propaganda Campaign; Summary of the Conducted Analysis for Dataset 2; 4 Blog Data Analysis and Findings; Dataset Description; Using Blogtrackers for Analysis; 5 Conclusion and FutureIntro; Preface; Contents; Frauds in Online Social Networks: A Review; 1 Introduction; 2 Frauds and Its Typologies; 3 Rumours and Misinformation; Information Present in the Post; Spread and Propagation; 4 Brand Jacking and Hashtag Jacking; 5 Phishing; 6 Identity Theft; 7 Cyber Stalking/Bullying; 8 Fake Reviews and Fake Likes; 9 Fake Accounts/Sybils; 10 Conclusions; References; Leveraging Social Network Analysis and Cyber Forensics Approaches to Study Cyber Propaganda Campaigns; 1 Introduction; 2 Literature Review; Cyber Forensics Empirical Observations and Trends of Bots Used in Information OperationsInfluence in Social Media; 3 Methodology; Dataset 1: Twitter Accounts of Historical Deviant Groups Known for Their Anti-NATO Narratives; Dataset Description; Metadata Extraction Using Cyber Forensics Approaches; Applying Social Network Analysis to Identify Influential Information Actors; Applying Focal Structure Analysis (FSA) to Identify Powerful Groups of Individuals Effecting Cyber Propaganda Campaign; Summary of the Conducted Analysis on Dataset 1 Dataset 2: Twitter Accounts of the Anti-NATO Bots Used During the Cyber Propaganda CampaignDataset Description; Applying Social Network Analysis to Identify Influential Bots; Applying Focal Structure Analysis to Identify Powerful Bots Effecting Cyber Propaganda Campaign; Summary of the Conducted Analysis for Dataset 2; 4 Blog Data Analysis and Findings; Dataset Description; Using Blogtrackers for Analysis; 5 Conclusion and Future Directions; References; Hiding Self on Facebook Sidebar Ticker, Surveillance, and Privacy; 1 Facebook Ticker and Its Privacy Settings; What Is This Sidebar Ticker Ticker and Users' Privacy SettingsPrivacy Settings on Facebook; 2 Facebook Ticker and Surveillance; The Panopticon and Foucault's Interpretation; Facebook as the Field of Monitoring; 3 Facebook Ticker and Privacy; Privacy in Traditional Legal Approach; Privacy in Context; Does the Ticker Infringe Users' Privacy?; 4 Public and Open to the Public; 5 Conclusion; References; Identifying Influential Spreaders in Complex Networks with Probabilistic Links; 1 Introduction; Motivation and Contributions; 2 Related Work; 3 Proposed Technique; Complex Networks with Probabilistic Links R-Hop User Communication Paths (UCPs)Range Probabilistic Communication Area (rPCA); 4 Performance Evaluation; Competing Techniques; Simulation Settings; Datasets; Generation of Probabilistic Links; Propagation Model and Influence; Evaluation Criteria; Fraction of Ranked Nodes: False Index; 5 Results; Impact of Infection Probability; Spreadability; Impact of Zipfian Skewness; Evaluation with a Real Complex Network; 6 Conclusions; References; Decentralized Online Social Network Architectures; 1 Introduction; 2 Decentralized P2P Architectures; Unstructured P2P Architectures … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 302.231
Social sciences
Online social networks
Social sciences—Data processing
Social sciences—Computer programs
Data mining
Social media
Social sciences_xData processing
PSYCHOLOGY / Social Psychology
Online social networks
Computers -- Database Management -- Data Mining
Social Science -- Media Studies
Computers -- Data Processing
Data mining
Media studies
Society & social sciences
Social Science -- General
Electronic books - Languages:
- English
- ISBNs:
- 9783319782560
3319782568 - Related ISBNs:
- 9783319782553
331978255X - Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (EBSCO, viewed August 9, 2018) - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.328770
- Ingest File:
- 02_333.xml