Skip to main content

Detection of Lurkers in Online Social Networks

  • Conference paper
  • First Online:
Book cover Cyberspace Safety and Security (CSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10581))

Included in the following conference series:

Abstract

In this work, we propose a novel data model that integrates and combines information on users belonging to one or more heterogeneous Online Social Networks (OSNs), together with the content that is generated, shared and used within the related environments, using an hypergraph-based approach. Then, we discuss how the most diffused centrality measures – that have been defined over the introduced model – can be efficiently applied for a number of data privacy issues, such as lurkers detection, especially in “interest-based” social networks. Some preliminary experiments using the Yelp dataset are finally presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Such strategy is necessary to penalize lurkers, i.e., users of an HN that do not directly interact with content but through user to user relationships.

  2. 2.

    We have also considered the most important topics within the reviews.

  3. 3.

    https://www.yelp.com/dataset_challenge.

  4. 4.

    https://databricks.com/.

  5. 5.

    For the Neighborhood centrality, we set \(\lambda =6\) and \(\alpha =1.5\).

References

  1. Aggarwal, C.C.: An introduction to social network data analytics. In: Aggarwal, C. (ed.) Social Network Data Analytics, pp. 1–15. Springer, Boston (2011). doi:10.1007/978-1-4419-8462-3_1

  2. Amato, F., Mazzeo, A., Moscato, V., Picariello, A.: A framework for semantic interoperability over the cloud, pp. 1259–1264 (2013)

    Google Scholar 

  3. Amato, F., Castiglione, A., De Santo, A., Moscato, V., Picariello, A., Persia, F., Sperlí, G.: Recognizing human behaviours in online social networks. Comput. Secur. (2017)

    Google Scholar 

  4. Amato, F., Moscato, V., Picariello, A., Sperlì, G.: Multimedia social network modeling: a proposal. In: 2016 IEEE Tenth International Conference on Semantic Computing (ICSC), pp. 448–453 (2016)

    Google Scholar 

  5. Amichai-Hamburger, Y., Gazit, T., Bar-Ilan, J., Perez, O., Aharony, N., Bronstein, J., Dyne, T.S.: Psychological factors behind the lack of participation in online discussions. Comput. Hum. Behav. 55, 268–277 (2016)

    Article  Google Scholar 

  6. Ardichvili, A.: Learning and knowledge sharing in virtual communities of practice: motivators, barriers, and enablers. Adv. Develop. Hum. Resour. 10(4), 541–554 (2008). doi:10.1177/1523422308319536

    Article  Google Scholar 

  7. Benevenuto, F., Rodrigues, T., Cha, M., Almeida, V.: Characterizing user navigation and interactions in online social networks. Inf. Sci. 195, 1–24 (2012)

    Article  Google Scholar 

  8. Carullo, G., Castiglione, A., De Santis, A.: Friendship recommendations in online social networks. In: 2014 International Conference on Intelligent Networking and Collaborative Systems, pp. 42–48, September 2014

    Google Scholar 

  9. Carullo, G., Castiglione, A., De Santis, A., Palmieri, F.: A triadic closure and homophily-based recommendation system for online social networks. World Wide Web 18(6), 1579–1601 (2015). doi:10.1007/s11280-015-0333-5

    Article  Google Scholar 

  10. Castiglione, A., Cattaneo, G., De Santis, A.: A forensic analysis of images on online social networks. In: 2011 Third International Conference on Intelligent Networking and Collaborative Systems, pp. 679–684, November 2011

    Google Scholar 

  11. Castiglione, A., D’Alessio, B., De Santis, A.: Steganography and secure communication on online social networks and online photo sharing. In: 2011 International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 363–368, October 2011

    Google Scholar 

  12. Colace, F., De Santo, M., Greco, L., Amato, F., Moscato, V., Picariello, A.: Terminological ontology learning and population using latent dirichlet allocation. J. Vis. Lang. Comput. 25(6), 818–826 (2014)

    Article  Google Scholar 

  13. Dhungel, P., Wu, D., Schonhorst, B., Ross, K.W.: A measurement study of attacks on bittorrent leechers. IPTPS 8, 7 (2008)

    Google Scholar 

  14. Edelmann, N.: Reviewing the definitions of “lurkers” and some implications for online research. Cyberpsychology Behav. Soc. Netw. 16(9), 645–649 (2013)

    Article  Google Scholar 

  15. Fang, Q., Sang, J., Xu, C., Rui, Y.: Topic-sensitive influencer mining in interest-based social media networks via hypergraph learning. IEEE Trans. Multimedia 16(3), 796–812 (2014)

    Article  Google Scholar 

  16. Fazeen, M., Dantu, R., Guturu, P.: Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. Soc. Netw. Anal. Min. 1(3), 241–254 (2011)

    Article  Google Scholar 

  17. Halfaker, A., Keyes, O., Taraborelli, D.: Making peripheral participation legitimate: reader engagement experiments in Wikipedia. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, CSCW 2013, NY, USA, pp. 849–860 (2013). doi:10.1145/2441776.2441872

  18. Heintz, B., Chandra, A.: Beyond graphs: toward scalable hypergraph analysis systems. ACM SIGMETRICS Perform. Eval. Rev. 41(4), 94–97 (2014)

    Article  Google Scholar 

  19. Hoang Long, N., Jung, J.J.: Privacy-aware framework for matching online social identities in multiple social networking services. Cybern. Syst. 46(1–2), 69–83 (2015)

    Article  Google Scholar 

  20. Interdonato, R., Pulice, C., Tagarelli, A.: Community-based Delurking in social networks. In: 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 263–270. IEEE (2016)

    Google Scholar 

  21. Interdonato, R., Pulice, C., Tagarelli, A.: Got to have faith!: the devotion algorithm for Delurking in social networks. In: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, pp. 314–319. ACM (2015)

    Google Scholar 

  22. Interdonato, R., Tagarelli, A.: To trust or not to trust lurkers?: evaluation of lurking and trustworthiness in ranking problems. In: Wierzbicki, A., Brandes, U., Schweitzer, F., Pedreschi, D. (eds.) NetSci-X 2016. LNCS, vol. 9564, pp. 43–56. Springer, Cham (2016). doi:10.1007/978-3-319-28361-6_4

    Chapter  Google Scholar 

  23. Javarone, M.A., Interdonato, R., Tagarelli, A.: Modeling evolutionary dynamics of lurking in social networks. In: Cherifi, H., Gonçalves, B., Menezes, R., Sinatra, R. (eds.) Complex Networks VII. SCI, vol. 644, pp. 227–239. Springer, Cham (2016). doi:10.1007/978-3-319-30569-1_17

    Chapter  Google Scholar 

  24. Kang, C., Molinaro, C., Kraus, S., Shavitt, Y., Subrahmanian, V.: Diffusion centrality in social networks. In: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), pp. 558–564. IEEE Computer Society (2012)

    Google Scholar 

  25. Kollock, P., Smith, M.: Managing the virtual commons. Comput.-Mediated Commun. Linguist. Soc. Cross-Cult. Perspect. 109–128 (1996)

    Google Scholar 

  26. Lave, J., Wenger, E.: Situated Learning: Legitimate Peripheral Participation. Cambridge University Press, Cambridge (1991)

    Book  Google Scholar 

  27. Muller, M., Shami, N.S., Millen, D.R., Feinberg, J.: We are all lurkers: consuming behaviors among authors and readers in an enterprise file-sharing service. In: Proceedings of the 16th ACM International Conference on Supporting Group Work, pp. 201–210. ACM (2010)

    Google Scholar 

  28. Nonnecke, B., Preece, J.: Lurker demographics: counting the silent. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 73–80. ACM (2000)

    Google Scholar 

  29. Ridings, C., Gefen, D., Arinze, B.: Psychological barriers: lurker and poster motivation and behavior in online communities. Commun. Assoc. Inf. Syst. 18(1), 16 (2006)

    Google Scholar 

  30. de Rooij, S., van Erven, T., Grunwald, P.D., Koolen, W.M.: Follow the leader if you can, hedge if you must. J. Mach. Learn. Res. 15, 1281–1316 (2014)

    MATH  MathSciNet  Google Scholar 

  31. Scott, J.: Social Network Analysis. Sage, London (2012)

    Google Scholar 

  32. Tagarelli, A., Interdonato, R.: Lurking in social networks: topology-based analysis and ranking methods. Soc. Netw. Anal. Min. 4(1), 1–27 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giancarlo Sperlì .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Amato, F., Castiglione, A., Moscato, V., Picariello, A., Sperlì, G. (2017). Detection of Lurkers in Online Social Networks. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69471-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69470-2

  • Online ISBN: 978-3-319-69471-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics