Abstract
In this work, we propose a novel data model that integrates and combines information on users belonging to one or more heterogeneous Online Social Networks (OSNs), together with the content that is generated, shared and used within the related environments, using an hypergraph-based approach. Then, we discuss how the most diffused centrality measures – that have been defined over the introduced model – can be efficiently applied for a number of data privacy issues, such as lurkers detection, especially in “interest-based” social networks. Some preliminary experiments using the Yelp dataset are finally presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Such strategy is necessary to penalize lurkers, i.e., users of an HN that do not directly interact with content but through user to user relationships.
- 2.
We have also considered the most important topics within the reviews.
- 3.
- 4.
- 5.
For the Neighborhood centrality, we set \(\lambda =6\) and \(\alpha =1.5\).
References
Aggarwal, C.C.: An introduction to social network data analytics. In: Aggarwal, C. (ed.) Social Network Data Analytics, pp. 1–15. Springer, Boston (2011). doi:10.1007/978-1-4419-8462-3_1
Amato, F., Mazzeo, A., Moscato, V., Picariello, A.: A framework for semantic interoperability over the cloud, pp. 1259–1264 (2013)
Amato, F., Castiglione, A., De Santo, A., Moscato, V., Picariello, A., Persia, F., Sperlí, G.: Recognizing human behaviours in online social networks. Comput. Secur. (2017)
Amato, F., Moscato, V., Picariello, A., Sperlì, G.: Multimedia social network modeling: a proposal. In: 2016 IEEE Tenth International Conference on Semantic Computing (ICSC), pp. 448–453 (2016)
Amichai-Hamburger, Y., Gazit, T., Bar-Ilan, J., Perez, O., Aharony, N., Bronstein, J., Dyne, T.S.: Psychological factors behind the lack of participation in online discussions. Comput. Hum. Behav. 55, 268–277 (2016)
Ardichvili, A.: Learning and knowledge sharing in virtual communities of practice: motivators, barriers, and enablers. Adv. Develop. Hum. Resour. 10(4), 541–554 (2008). doi:10.1177/1523422308319536
Benevenuto, F., Rodrigues, T., Cha, M., Almeida, V.: Characterizing user navigation and interactions in online social networks. Inf. Sci. 195, 1–24 (2012)
Carullo, G., Castiglione, A., De Santis, A.: Friendship recommendations in online social networks. In: 2014 International Conference on Intelligent Networking and Collaborative Systems, pp. 42–48, September 2014
Carullo, G., Castiglione, A., De Santis, A., Palmieri, F.: A triadic closure and homophily-based recommendation system for online social networks. World Wide Web 18(6), 1579–1601 (2015). doi:10.1007/s11280-015-0333-5
Castiglione, A., Cattaneo, G., De Santis, A.: A forensic analysis of images on online social networks. In: 2011 Third International Conference on Intelligent Networking and Collaborative Systems, pp. 679–684, November 2011
Castiglione, A., D’Alessio, B., De Santis, A.: Steganography and secure communication on online social networks and online photo sharing. In: 2011 International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 363–368, October 2011
Colace, F., De Santo, M., Greco, L., Amato, F., Moscato, V., Picariello, A.: Terminological ontology learning and population using latent dirichlet allocation. J. Vis. Lang. Comput. 25(6), 818–826 (2014)
Dhungel, P., Wu, D., Schonhorst, B., Ross, K.W.: A measurement study of attacks on bittorrent leechers. IPTPS 8, 7 (2008)
Edelmann, N.: Reviewing the definitions of “lurkers” and some implications for online research. Cyberpsychology Behav. Soc. Netw. 16(9), 645–649 (2013)
Fang, Q., Sang, J., Xu, C., Rui, Y.: Topic-sensitive influencer mining in interest-based social media networks via hypergraph learning. IEEE Trans. Multimedia 16(3), 796–812 (2014)
Fazeen, M., Dantu, R., Guturu, P.: Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. Soc. Netw. Anal. Min. 1(3), 241–254 (2011)
Halfaker, A., Keyes, O., Taraborelli, D.: Making peripheral participation legitimate: reader engagement experiments in Wikipedia. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, CSCW 2013, NY, USA, pp. 849–860 (2013). doi:10.1145/2441776.2441872
Heintz, B., Chandra, A.: Beyond graphs: toward scalable hypergraph analysis systems. ACM SIGMETRICS Perform. Eval. Rev. 41(4), 94–97 (2014)
Hoang Long, N., Jung, J.J.: Privacy-aware framework for matching online social identities in multiple social networking services. Cybern. Syst. 46(1–2), 69–83 (2015)
Interdonato, R., Pulice, C., Tagarelli, A.: Community-based Delurking in social networks. In: 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 263–270. IEEE (2016)
Interdonato, R., Pulice, C., Tagarelli, A.: Got to have faith!: the devotion algorithm for Delurking in social networks. In: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, pp. 314–319. ACM (2015)
Interdonato, R., Tagarelli, A.: To trust or not to trust lurkers?: evaluation of lurking and trustworthiness in ranking problems. In: Wierzbicki, A., Brandes, U., Schweitzer, F., Pedreschi, D. (eds.) NetSci-X 2016. LNCS, vol. 9564, pp. 43–56. Springer, Cham (2016). doi:10.1007/978-3-319-28361-6_4
Javarone, M.A., Interdonato, R., Tagarelli, A.: Modeling evolutionary dynamics of lurking in social networks. In: Cherifi, H., Gonçalves, B., Menezes, R., Sinatra, R. (eds.) Complex Networks VII. SCI, vol. 644, pp. 227–239. Springer, Cham (2016). doi:10.1007/978-3-319-30569-1_17
Kang, C., Molinaro, C., Kraus, S., Shavitt, Y., Subrahmanian, V.: Diffusion centrality in social networks. In: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), pp. 558–564. IEEE Computer Society (2012)
Kollock, P., Smith, M.: Managing the virtual commons. Comput.-Mediated Commun. Linguist. Soc. Cross-Cult. Perspect. 109–128 (1996)
Lave, J., Wenger, E.: Situated Learning: Legitimate Peripheral Participation. Cambridge University Press, Cambridge (1991)
Muller, M., Shami, N.S., Millen, D.R., Feinberg, J.: We are all lurkers: consuming behaviors among authors and readers in an enterprise file-sharing service. In: Proceedings of the 16th ACM International Conference on Supporting Group Work, pp. 201–210. ACM (2010)
Nonnecke, B., Preece, J.: Lurker demographics: counting the silent. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 73–80. ACM (2000)
Ridings, C., Gefen, D., Arinze, B.: Psychological barriers: lurker and poster motivation and behavior in online communities. Commun. Assoc. Inf. Syst. 18(1), 16 (2006)
de Rooij, S., van Erven, T., Grunwald, P.D., Koolen, W.M.: Follow the leader if you can, hedge if you must. J. Mach. Learn. Res. 15, 1281–1316 (2014)
Scott, J.: Social Network Analysis. Sage, London (2012)
Tagarelli, A., Interdonato, R.: Lurking in social networks: topology-based analysis and ranking methods. Soc. Netw. Anal. Min. 4(1), 1–27 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Amato, F., Castiglione, A., Moscato, V., Picariello, A., Sperlì, G. (2017). Detection of Lurkers in Online Social Networks. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-69471-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69470-2
Online ISBN: 978-3-319-69471-9
eBook Packages: Computer ScienceComputer Science (R0)