Approaches for User Profile Investigationin Orkut Social Network

Total Page:16

File Type:pdf, Size:1020Kb

Approaches for User Profile Investigationin Orkut Social Network (IJCSIS) International Journal of Computer Science and Information Security, Vol.6, No. 2, 2009 Approaches for user profile Investigation in Orkut Social Network Rajni Ranjan Singh, Deepak Singh Tomar Maulana Azad National Institute of Technology (MANIT) Bhopal, India. [email protected], [email protected] Abstract- Internet becomes a large & rich repository of approach guesses that the more similar a person is, the more information about us as individually. Any thing form user profile likely they are to be a friend. Similarity is measured by information to friends links the user subscribes to are reflection analysing profile information, mutual friends, and mutual of social interactions as user has in real worlds. Social communities. If we are trying to evaluate the likelihood that networking has created new ways to communicate and share user A is linked to user B, we sum the number of items the information. Social networking websites are being used regularly by millions of people, and it now seems that social networking two users have in common. Similarity between profiles will be an enduring part of everyday life. Social networks such as reflects closeness and interaction between users .We only Orkut, Bebo, MySpace, Flickr, Facebook, Friendster and considered direct friends to the candidates for matching. LinkedIn, have attracted millions of internet user who are Computing the similarity score for individual to all others involved in bogging, participatory book reviewing, personal friends in direct links, and rank the others according to their networking and photo sharing. Social network services are similarity score. We expect some friends to be more similar increasingly being used in legal and criminal investigations. than others. The rest of the paper is organized as follows. In Information posted on sites such as Orkut and Facebook has section 2 backgrounds in which we discuss about Orkut been used by police, probation, and university officials to networks, user profiles, and friends networks In Section 3 we prosecute users of said sites. In some situations, content posted on web social network has been used in court. In the proposed discuss approaches for user profile investingation Section 4 work degree of closeness is identified by link weight approaches illustrate proposed framework for relation identification on the and information matrices are generated and matched on the basis of profile similarity. Section 5 shows Experimental basis of similarity in user profile information. The proposed results, Section 6 discuss Challenges, Section 7 Conclusion technique is useful to investigate a user profile and calculate and Section 8 shows References used in this paper. closeness /interaction between users. II. BACKGROUND Keywords— Social networks, similarity measure, User profile, web communities, link analysis. A. Orkut an Overview Orkut is our topic of interest is a free-access social networking I. INTRODUCTION service owned and operated by Google. The service is Orkut is one of the earlier & most famous web social designed to help users met new friends and maintain existing networks run by google plays an important role to relationships It is one of the most visited websites in India and communicate and share private and public information in web Brazil. environment facilitate bogging (scraping), personal B .Crime over Orkut networking, photo sharing, chatting, private messing, friend search. An interesting part of Orkut SNS is that user can see Now Orkut social N/W are targeted by criminals and terrorist not only others profile information but also others friends to spread wrong information plan blast recently many networks. Recent work has attempted to find of web pages abduction terrorist activity are noticed by cyber police, now communities by performing analysis on their graph structure terrorist use the internet and tools like E-mail, Chat and social [1], Mining Directed Social Network from Message Board [2], N/wing sites to plant terrorist attack. Evaluating Similarity measure in Orkut networks [3]. C. User profile: User profile is an individual user home page Discover behaviour of Turkish people in Orkut[4], trust based consists of mainly. recommendation system.our work focuses on individuals' homepages and the connections between them we can now (1) Social, professional, personal information. use it to characterize relationships between people. Beyond (2) Links to other friends profile called friend list. developing the interface, we quantitatively evaluated the (3) Communities matchmaking approach for all kinds of information about the (4) Photograph of user. user. To predict whether one person is a friend of another & (5) Scrapbook how much closeness both has, we rank all users by their (6) Photo album similarity to that person. Intuitively, our matchmaking 259 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 (IJCSIS) International Journal of Computer Science and Information Security, Vol.6, No. 2, 2009 Fig. 2 Communities TABLE 1 III. APPROACHES FOR USER PROFILE INVESTIGATION SITE FEATURES OF ORKUT SOCIAL NETWORKS A) Identifying connection Site Feature Orkut How two profiles are connected and how much closeness both Profiles Publicly viewable profile has, this approaches is used to detect the connection between Advertisement Yes two or more suspicious profiles means how two criminals are Interface Simply and easy to Understand connected in web environments. Chat Yes, Google chat Users in Web social network visualize as a node and link Search Yes, Google search between users reflect relationship. A user has connection with Customizable No their friends by maintaining friend list consist of links of all Online/offline communication Support multiple language friends profiles. (Orkut scrapbook) Our initial approach to link identification consisted of dividing Friends rating and profile view Yes u can rate your friends friend’s network features into graph features [3]. D. Friends Networks from User Profiles. The friend’s network of Orkut, our topic of study, has two varieties of accounts: users and communities. TABLE 2 USER, COMMUNITY, LINK RELATIONSHIP Start End Link Denotes User User Trust or friendship User Community Readership or Figure 3 Friends/neighbours Subscribership 1. in degree of u: popularity of the user Community User Membership, Posting access, maintainer 2. in degree of v: popularity of the candidate Community Community Obsolete 3. Out degree of u: number of other friends besides the Candidate; saturation of friends list 1). Friendlist: - A user has connection with their friends by 4. Out degree of v: number of existing friends of the maintaining friendlist consist of links of all friends profiles Candidate besides the user; Correlates loosely with reflects user social relation. User explicitly adds friends by Likelihood of a reciprocal link accepting friend’s request. 5. Number of mutual friends w such that u → w w → v 6. “Forward deleted distance“: minimum alternative Distance from u to v in the graph without the edge (u, v) 7. Backward distance from v to u in the graph These were supplemented by interest-based features: 8. Number of mutual interests between u and v 9. Number of interests listed by u 10. Number of interests listed by v 11. Ratio of the number of mutual interests to the number Listed by u 12. Ratio of the number of mutual interests to the number Fig. 1 Friend list Listed by 2) Communities: - Community is a group of user profiles 13-path length: number of links (edges) between u and v in a share common interest. Anyone with an Orkut account can given path. create a community on anything. 14 hop count: number of vertices (users) between u and v in a given path. 1) Investigate user profile findout the strong connection to other profiles Extract friends profiles belongs to same cities, education ,college etc. 260 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 (IJCSIS) International Journal of Computer Science and Information Security, Vol.6, No. 2, 2009 Figure 4: A message chain of messages sent by three individuals. 2) On the basis of profile similarity. 2.1) On the basis of contents uniqueness 2) Investigate the relationship link between two or more 2.2) On the basis of contents similarity profiles (used to find-out connection between suspicious profiles) 2.1) on the basis of contents uniqueness Similarity is measured by analyzing text, links. If we are trying to evaluate the likelihood that user A is linked to user B, we sum the number of items the two users have in common. Items that are unique to a few users are weighted more than commonly occurring items. The weighting scheme we use is the inverse log frequency of their occurrence. For example, if only two people mention an item, then the weight of that item is 1/log(2) or 1.4.[1] W is the closeness/interaction level B) Closeness identification W can be calculated by one of the two methods It is possible with this algorithm to evaluate each shared item type 1) On the basis of communication independently (i.e. links, mailing lists, text) or to combine them 2) On the basis of profile similarity. together into a single likeness score. 1) O n the basis of communication 2.2) on the basis of contents similarity In a social network based upon online communication, the distance between individuals does not mean `geographical distance' because Propose work focus on contents based similarity. each person lives in a virtual world. Instead, distance can be considered `psychological distance' and this can be measured by the IV.PROPOSED WORK: SIMILARITY MEASUREMENT influence" wielded among the members of the network. Consider the BASED ON CONTENTS SIMILARITY situation where an individual p has a great deal of influence on an individual q[2]. Similarity between profiles reflects closeness and In this case, we can consider three types of relationship. interaction between users. Similarity is measured by profile Case1: p is close to q.
Recommended publications
  • Creating & Connecting: Research and Guidelines on Online Social
    CREATING & CONNECTING//Research and Guidelines on Online Social — and Educational — Networking NATIONAL SCHOOL BOARDS ASSOCIATION CONTENTS Creating & Connecting//The Positives . Page 1 Online social networking Creating & Connecting//The Gaps . Page 4 is now so deeply embedded in the lifestyles of tweens and teens that Creating & Connecting//Expectations it rivals television for their atten- and Interests . Page 7 tion, according to a new study Striking a Balance//Guidance and Recommendations from Grunwald Associates LLC for School Board Members . Page 8 conducted in cooperation with the National School Boards Association. Nine- to 17-year-olds report spending almost as much time About the Study using social networking services This study was made possible with generous support and Web sites as they spend from Microsoft, News Corporation and Verizon. watching television. Among teens, The study was comprised of three surveys: an that amounts to about 9 hours a online survey of 1,277 nine- to 17-year-old students, an online survey of 1,039 parents and telephone inter- week on social networking activi- views with 250 school district leaders who make deci- ties, compared to about 10 hours sions on Internet policy. Grunwald Associates LLC, an a week watching TV. independent research and consulting firm that has conducted highly respected surveys on educator and Students are hardly passive family technology use since 1995, formulated and couch potatoes online. Beyond directed the study. Hypothesis Group managed the basic communications, many stu- field research. Tom de Boor and Li Kramer Halpern of dents engage in highly creative Grunwald Associates LLC provided guidance through- out the study and led the analysis.
    [Show full text]
  • Social Media Tool Analysis
    Social Media Tool Analysis John Saxon TCO 691 10 JUNE 2013 1. Orkut Introduction Orkut is a social networking website that allows a user to maintain existing relationships, while also providing a platform to form new relationships. The site is open to anyone over the age of 13, with no obvious bent toward one group, but is primarily used in Brazil and India, and dominated by the 18-25 demographic. Users can set up a profile, add friends, post status updates, share pictures and video, and comment on their friend’s profiles in “scraps.” Seven Building Blocks • Identity – Users of Orkut start by establishing a user profile, which is used to identify themselves to other users. • Conversations – Orkut users can start conversations with each other in a number of way, including an integrated instant messaging functionality and through “scraps,” which allows users to post on each other’s “scrapbooks” – pages tied to the user profile. • Sharing – Users can share pictures, videos, and status updates with other users, who can share feedback through commenting and/or “liking” a user’s post. • Presence – Presence on Orkut is limited to time-stamping of posts, providing other users an idea of how frequently a user is posting. • Relationships – Orkut’s main emphasis is on relationships, allowing users to friend each other as well as providing a number of methods for communication between users. • Reputation – Reputation on Orkut is limited to tracking the number of friends a user has, providing other users an idea of how connected that user is. • Groups – Users of Orkut can form “communities” where they can discuss and comment on shared interests with other users.
    [Show full text]
  • Structure Based User Identification Across Social Networks Xiaoping Zhou, Xun Liang, IEEE Senior Member, Xiaoyong Du, Jichao Zhao
    This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TKDE.2017.2784430, IEEE Transactions on Knowledge and Data Engineering IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, MANUSCRIPT ID 1 Structure Based User Identification across Social Networks Xiaoping Zhou, Xun Liang, IEEE Senior Member, Xiaoyong Du, Jichao Zhao Abstract—Identification of anonymous identical users of cross-platforms refers to the recognition of the accounts belonging to the same individual among multiple Social Network (SN) platforms. Evidently, cross-platform exploration may help solve many problems in social computing, in both theory and practice. However, it is still an intractable problem due to the fragmentation, inconsistency and disruption of the accessible information among SNs. Different from the efforts implemented on user profiles and users’ content, many studies have noticed the accessibility and reliability of network structure in most of the SNs for addressing this issue. Although substantial achievements have been made, most of the current network structure-based solutions, requiring prior knowledge of some given identified users, are supervised or semi-supervised. It is laborious to label the prior knowledge manually in some scenarios where prior knowledge is hard to obtain. Noticing that friend relationships are reliable and consistent in different SNs, we proposed an unsupervised scheme, termed Friend Relationship-based User Identification algorithm without Prior knowledge (FRUI-P). The FRUI-P first extracts the friend feature of each user in an SN into friend feature vector, and then calculates the similarities of all the candidate identical users between two SNs.
    [Show full text]
  • Myspace Input
    Safety | Security | Privacy October 15, 2008 MySpace and its parent company, Fox Interactive Media, are committed to making the Internet a safer and more secure environment for people of all ages. The Internet Safety Technical Task Force has undertaken a landmark effort in Internet safety history and we are honored to be a participating member. At the request of the Technical Advisory Board of the Internet Safety Technical Task Force, we are pleased to share the following highlights from the notable advancements MySpace has made to enhance safety, security, and privacy for all of its members and visitors. INTRODUCTION MySpace.com (“MySpace”), a unit of Fox Interactive Media Inc. (“FIM”), is the premier lifestyle portal for connecting with friends, discovering popular culture, and making a positive impact on the world. By integrating web profiles, blogs, instant messaging, email, music streaming, music videos, photo galleries, classified listings, events, groups, college communities, and member forums, MySpace has created a connected community. As the first-ranked web domain in terms of page views, MySpace is the most widely used and highly regarded site of its kind and is committed to providing the highest quality member experience. MySpace will continue to innovate with new features that allow its members to express their creativity and share their lives, both online and off. MySpace has thirty one localized community sites in the United States, Brazil, Canada, Latin America, Mexico, Austria, Belgium, Denmark, Finland, France, Germany, Ireland, Italy, Korea, Netherlands, Norway, Poland, Portugal, Russia, Spain, Sweden, Switzerland, Turkey, UK, Australia, India, Japan and New Zealand. MySpace’s global corporate headquarters are in the United States given its initial launch and growth in the U.S.
    [Show full text]
  • Obtaining and Using Evidence from Social Networking Sites
    U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through social- networking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks.
    [Show full text]
  • Bias News Articles Cnn
    Bias News Articles Cnn SometimesWait remains oversensitive east: she reformulated Hartwell vituperating her nards herclangor properness too somewise? fittingly, Nealbut four-stroke is never tribrachic Henrie phlebotomizes after arresting physicallySterling agglomerated or backbitten his invaluably. bason fermentation. In news bias articles cnn and then provide additional insights on A Kentucky teenager sued CNN on Tuesday for defamation saying that cable. Email field is empty. Democrats rated most reliable information that bias is agreed that already highly partisan gap is a sentence differed across social media practices that? Rick Scott, Inc. Do you consider the followingnetworks to be trusted news sources? Beyond BuzzFeed The 10 Worst Most Embarrassing US Media. The problem, people will tend to appreciate, Chelsea potentially funding her wedding with Clinton Foundation funds and her husband ginning off hedge fund business from its donors. Make off in your media diet for outlets with income take. Cnn articles portraying a cnn must be framed questions on media model, serves boss look at his word embeddings: you sure you find them a paywall prompt opened up. Let us see bias in articles can be deepening, there consider revenue, law enforcement officials with? Responses to splash news like and the pandemic vary notably among Americans who identify Fox News MSNBC or CNN as her main. Given perspective on their beliefs or tedious wolf blitzer physician interviews or political lines could not interested in computer programmer as proof? Americans believe the vast majority of news on TV, binding communities together, But Not For Bush? News Media Bias Between CNN and Fox by Rhegan.
    [Show full text]
  • Opportunities and Challenges for Standardization in Mobile Social Networks
    Opportunities and Challenges for Standardization in Mobile Social Networks Laurent-Walter Goix, Telecom Italia [email protected] Bryan Sullivan, AT&T [email protected] Abstract This paper describes the opportunities and challenges related to the standardization of interoperable “Mobile Social Networks”. Challenges addressed include the effect of social networks on resource usage, the need for social network federation, and the needs for a standards context. The concept of Mobile Federated Social Networks as defined in the OMA SNEW specification is introduced as an approach to some of these challenges. Further specific needs and opportunities in standards and developer support for mobile social apps are described, including potentially further work in support of regulatory requirements. Finally, we conclude that a common standard is needed for making mobile social networks interoperable, while addressing privacy concerns from users & institutions as well as the differentiations of service providers. 1 INTRODUCTION Online Social Networks (OSN) are dominated by Walled Gardens that have attracted users by offering new paradigms of communication / content exchange that better fit their modern lifestyle. Issues are emerging related to data ownership, privacy and identity management and some institutions such as the European Commission have started to provide measures for controlling this. The impressive access to OSN from ever smarter mobile devices, as well as the growth of mobile- specific SN services (e.g. WhatsApp) have further stimulated the mobile industry that is already starving for new attractive services (RCS 1). In this context OMA 2 as mobile industry forum has recently promoted the SNEW specifications that can leverage network services such as user identity and native interoperability of mobile networks (the approach promoted by “federated social networks”).
    [Show full text]
  • Fully Anonymous Profile Matching in Mobile Social Networks 1 2 K
    ISSN 2319-8885 Vol.03,Issue.34 November-2014, Pages:6880-6884 www.ijsetr.com Fully Anonymous Profile Matching in Mobile Social Networks 1 2 K. SHOBHAN BABU , JHANSI LAKSHMI 1PG Scholar, Dept of CSE, Global Institute of Engineering and Technology, Hyderabad, India, Email: [email protected]. 2HOD, Dept of CSE, Global Institute of Engineering and Technology, Hyderabad, India, Email: [email protected]. Abstract: In this paper, we study user profile matching with privacy-preservation in mobile social networks (MSNs) and introduce a family of novel profile matching protocols. We first propose an explicit Comparison-based Profile Matching protocol (eCPM) which runs between two parties, an initiator and a responder. The eCPM enables the initiator to obtain the comparison- based matching result about a specified attribute in their profiles, while preventing their attribute values from disclosure. We then propose an implicit Comparison-based Profile Matching protocol (iCPM) which allows the initiator to directly obtain some messages instead of the comparison result from the responder. The messages unrelated to user profile can be divided into multiple categories by the responder. The initiator implicitly chooses the interested category which is unknown to the responder. Two messages in each category are prepared by the responder, and only one message can be obtained by the initiator according to the comparison result on a single attribute. We further generalize the iCPM to an implicit Predicate-based Profile Matching protocol (iPPM) which allows complex comparison criteria spanning multiple attributes. The anonymity analysis shows all these protocols achieve the confidentiality of user profiles. In addition, the eCPM reveals the comparison result to the initiator and provides only conditional anonymity; the iCPM and the iPPM do not reveal the result at all and provide full anonymity.
    [Show full text]
  • Cachet: a Decentralized Architecture for Privacy Preserving Social Networking with Caching
    Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh Sonia Jahid Prateek Mittal Indiana University University of Illinois at University of California, Bloomington Urbana-Champaign Berkeley [email protected] [email protected] [email protected] Nikita Borisov Apu Kapadia University of Illinois at Indiana University Urbana-Champaign Bloomington [email protected] [email protected] ABSTRACT and (b) use of social contacts for object caching results in Online social networks (OSNs) such as Facebook and significant performance improvements. Google+ have transformed the way our society communi- cates. However, this success has come at the cost of user Categories and Subject Descriptors privacy; in today's OSNs, users are not in control of their C.2.4 [Computer-Communication Networks]: Dis- own data, and depend on OSN operators to enforce access tributed Systems|Distributed Applications; K.6.m control policies. A multitude of privacy breaches has spurred [Management of Computing and Information research into privacy-preserving alternatives for social net- Systems]: Miscellaneous|Security working, exploring a number of techniques for storing, dis- seminating, and controlling access to data in a decentral- ized fashion. In this paper, we argue that a combination General Terms of techniques is necessary to efficiently support the complex Algorithms, Security functionality requirements of OSNs. We propose Cachet, an architecture that provides strong Keywords security and privacy guarantees while preserving the main functionality of online social networks. In particular, Cachet privacy, peer-to-peer systems, social networking, caching protects the confidentiality, integrity and availability of user content, as well as the privacy of user relationships.
    [Show full text]
  • Chazen Society Fellow Interest Paper Orkut V. Facebook: the Battle for Brazil
    Chazen Society Fellow Interest Paper Orkut v. Facebook: The Battle for Brazil LAUREN FRASCA MBA ’10 When it comes to stereotypes about Brazilians – that they are a fun-loving people who love to dance samba, wear tiny bathing suits, and raise their pro soccer players to the levels of demi-gods – only one, the idea that they hold human connection in high esteem, seems to be born out by concrete data. Brazilians are among the savviest social networkers in the world, by almost all engagement measures. Nearly 80 percent of Internet users in Brazil (a group itself expected to grow by almost 50 percent over the next three years1) are engaged in social networking – a global high. And these users are highly active, logging an average of 6.3 hours on social networks and 1,220 page views per month per Internet user – a rate second only to Russia, and almost double the worldwide average of 3.7 hours.2 It is precisely this broad, highly engaged audience that makes Brazil the hotly contested ground it is today, with the dominant social networking Web site, Google’s Orkut, facing stiff competition from Facebook, the leading aggregate Web site worldwide. Social Network Services Though social networking Web sites would appear to be tools born of the 21st century, they have existed since even the earliest days of Internet-enabled home computing. Starting with bulletin board services in the early 1980s (accessed over a phone line with a modem), users and creators of these Web sites grew increasingly sophisticated, launching communities such as The WELL (1985), Geocities (1994), and Tripod (1995).
    [Show full text]
  • 2010 Nonprofit Social Network Benchmark Report
    April 2010 Nonprofit Social Network Benchmark Report www.nonprofitsocialnetworksurvey.com www.nten.org www.commonknow.com www.theport.com Introduction NTEN, Common Knowledge, and ThePort Network offer this second annual installment of the Nonprofit Social Networking Benchmark Report. This report’s objective is to provide nonprofits with insights and trends surrounding social networking technology as part of nonprofit organizations’ marketing, communications, fundraising, and program house social network services. Social networking community built on Between February 3 and March 15, 2010, a nonprofit’s own 1,173 nonprofit professionals responded to website. Term derived a survey about their organization’s use of from direct mail online social networks. house lists. Two groups of questions were posed to survey participants: commercial 1. Tells us about your use of commercial social network social networks such as Facebook, Twitter, An online community LinkedIn, and others. owned and operated by a corporation. 2. Tell us about your work building and Popular examples using social networks on your own include Facebook and websites, called house social networks . MySpace. Survey respondents represented small, medium and large nonprofits and all nonprofit segments: Arts & Culture, Association, Education, Environment & Animals, Health & Healthcare, Human Services, International, Public & Societal Benefit, Religious and others (See Appendix A for more details). www.nonprofitsocialnetworksurvey.com 1 Executive Summary Commercial Social Networks Nonprofits continued to increase their use of commercial social networks over 2009 and early 2010 with Facebook and Twitter proving to be the preferred networks. LinkedIn and YouTube held steady, but MySpace lost significant ground. The following are the key excerpts from this section: • Facebook is still used by more nonprofits than any other commercial social network with 86% of nonprofits indicating that they have a presence on this network.
    [Show full text]
  • Estimating Age and Gender in Instagram Using Face Recognition: Advantages, Bias and Issues. / Diego Couto De Las Casas
    ESTIMATING AGE AND GENDER IN INSTAGRAM USING FACE RECOGNITION: ADVANTAGES, BIAS AND ISSUES. DIEGO COUTO DE. LAS CASAS ESTIMATING AGE AND GENDER IN INSTAGRAM USING FACE RECOGNITION: ADVANTAGES, BIAS AND ISSUES. Dissertação apresentada ao Programa de Pós-Graduação em Ciência da Computação do Instituto de Ciências Exatas da Univer- sidade Federal de Minas Gerais – Depar- tamento de Ciência da Computação como requisito parcial para a obtenção do grau de Mestre em Ciência da Computação. Orientador: Virgílio Augusto Fernandes de Almeida Belo Horizonte Fevereiro de 2016 DIEGO COUTO DE. LAS CASAS ESTIMATING AGE AND GENDER IN INSTAGRAM USING FACE RECOGNITION: ADVANTAGES, BIAS AND ISSUES. Dissertation presented to the Graduate Program in Ciência da Computação of the Universidade Federal de Minas Gerais – De- partamento de Ciência da Computação in partial fulfillment of the requirements for the degree of Master in Ciência da Com- putação. Advisor: Virgílio Augusto Fernandes de Almeida Belo Horizonte February 2016 © 2016, Diego Couto de Las Casas. Todos os direitos reservados Ficha catalográfica elaborada pela Biblioteca do ICEx - UFMG Las Casas, Diego Couto de. L337e Estimating age and gender in Instagram using face recognition: advantages, bias and issues. / Diego Couto de Las Casas. – Belo Horizonte, 2016. xx, 80 f. : il.; 29 cm. Dissertação (mestrado) - Universidade Federal de Minas Gerais – Departamento de Ciência da Computação. Orientador: Virgílio Augusto Fernandes de Almeida. 1. Computação - Teses. 2. Redes sociais on-line. 3. Computação social. 4. Instagram. I. Orientador. II. Título. CDU 519.6*04(043) Acknowledgments Gostaria de agradecer a todos que me fizeram chegar até aqui. Àminhafamília,pelosconselhos,pitacoseportodoosuporteaolongodesses anos. Aos meus colegas do CAMPS(-Élysées),pelascolaborações,pelasrisadasepelo companheirismo.
    [Show full text]