Link Prediction in Social Networks Via Bounded Local Path Traversal

Total Page:16

File Type:pdf, Size:1020Kb

Link Prediction in Social Networks Via Bounded Local Path Traversal Friendlink: Link Prediction in Social Networks via Bounded Local Path Traversal Alexis Papadimitriou Panagiotis Symeonidis Yannis Manolopoulos Computer Science Department Computer Science Department Computer Science Department Aristotle University Aristotle University Aristotle University Thessaloniki, Greece Thessaloniki, Greece Thessaloniki, Greece Email: [email protected] Email: [email protected] Email: [email protected] Abstract—Online social networks (OSNs) like Facebook, may know : (i) user U7 because you have two common Myspace, and Hi5 have become popular, because they allow friends (user U5 and user U6) (ii) user U9 because you have users to easily share content or expand their social circle. one common friend (user U )...”.Thelistofrecommended OSNs recommend new friends to registered users based on 8 local graph features (i.e. based on the number of common friends is ranked based on the number of common friends friends that two users share). However, OSNs do not exploit each candidate friend has with the target user. all different length paths of the network. Instead, they consider only pathways of maximum length 2 between a user and U U his candidate friends. On the other hand, there are global 9 8 approaches, which detect the overall path structure in a network, being computationally prohibitive for huge-size social U2 U5 networks. In this paper, we provide friend recommendations, also known as the link prediction problem, by traversing all U4 U1 U7 paths of a bounded length, based on the “algorithmic small world hypothesis”. As a result, we are able to provide more U U accurate and faster friend recommendations. We perform an 3 6 extensive experimental comparison of the proposed method against existing link prediction algorithms, using two real data sets (Hi5 and Epinions). Our experimental results show that Figure 1. Social Network Example. our FriendLink algorithm outperforms other approaches in terms of effectiveness and efficiency in both real data sets. Keywords-Social Networks; Link Prediction; A. Motivation Compared to approaches which are based on local features I. INTRODUCTION of a network (i.e. Friend of a Friend (FOAF) algorithm or Common Neighbors, Adamic/Adar index, Jaccard Coeffi- Online social networks (OSNs) such as Facebook.com1, cient, etc. - for more details see Section II), we provide Myspace2,Hi5.com3, etc. contain gigabytes of data that can friend recommendations, exploiting paths of greater length. be mined to make predictions about who is a friend of In contrast, they consider only pathways of maximum length whom. OSNs recommend other people to users based on 2 between a target user and his candidate friends. In Fig- their common friends. The reason is that there is a significant ure 1, which will be used as our running example, according possibility that two users are friends, if they share a large to existing OSNs, U would get as friend recommendation number of common friends. 1 with equal probability U or U . However, if we take into In this paper, we focus on recommendations based on 4 7 account also paths of length 3, then U should have a higher links that connect the nodes of an OSN, known as the 4 probability to be recommended as a friend to U . In our Link Prediction problem, where there are two main ap- 1 approach, we assume that a person can be connected to proaches [5] that handle it. The first one is based on local another with many paths of different length (through human features of a network, focusing mainly on the nodes struc- chains). Thus, two persons that are connected with many ture; the second one is based on global features, detecting the unique pathways of different length have a high probability overall path structure in a network. For instance, as an exam- to know each other, proportionally to the length of the ple of a local approach, as shown in Figure 1, Facebook.com pathways they are connected with. or Hi5.com use the following style of recommendation for Compared to global approaches (i.e Katz status index, recommending new friends to a target user U : “People you 1 RWR algorithm, SimRank algorithm etc.), which detect the 1http://www.facebook.com overall path structure in a network, our method is more 2http://www.myspace.com efficient. This means, that our method, which is based 3http://www.hi5.com on a bounded path traversal, requires less time and space 978-1-4577-1133-6/11/$26.00 c 2011 IEEE 66 complexity than the global based algorithms. The reason is to be close to 1. On the other hand, if the two nodes are that we traverse only paths of length l in a network based dissimilar, we expect the value sim(vi,vj ) to be close to 0. on the “algorithmic small world hypothesis”, whereas global Our method assumes that persons in an OSN can use approaches detect the overall path structure. (for more details all the pathways connecting them, proportionally to the see Section Related Work). pathway lengths. Thus, two persons who are connected The rest of this paper is organized as follows. Section II with many unique pathways have a high possibility to summarizes the related work. Section III defines a new node know each, proportionally to the length of the pathways similarity measure in OSNs. The proposed approach, its they are connected with. For example, referring back to complexity analysis, and its possible extensions to other Figure 1, if we consider only length-2 paths, then U1 would networks, are described in Section IV. Experimental results get as friend recommendation with equal probability U4 or are given in Section V. Finally, Section VI concludes this U7. However, if we consider also length-3 paths, then U4 paper. should have a higher probability to be recommended as a friend to U1. II. RELATED WORK There is a variety of local similarity measures [5] (i.e. Definition 1. The similarity sim(vx,vy) between two graph FOAF algorithm, Adamic/Adar index, Jaccard Coefficient, nodes vx and vy is defined as the counts of paths of varying etc.) for analyzing the “proximity” of nodes in a network. length from vx to vy: FOAF [2] is adopted by many popular OSNs, such as facebook.com and hi5.com for the friend recommendation pathsi 1 vx,vy task. FOAF is based on the common sense that two nodes sim(vx,vy)= · (2) v ,v i − 1 i x y are more likely to form a link in the future, if i=2 (n − j) they have many common neighbors. In addition to FOAF j=2 algorithm, there are also other local-based measures such as Jaccard Coefficient [5] and Adamic/Adar index [1]. Adamic where and Adar proposed a distance measure to decide when two • n is the number of vertices in a graph G, v personal home pages are strongly “related”. In particular, • is the length of a path between the graph nodes x and v they computed features of the pages and defined the similar- y (excluding paths with cycles). By the term “paths x, y 1 with cycles” we mean that a path can not be closed ity between two pages as follows: z log(frequency(z)) , where z is a feature shared by pages x, y. This refines (cyclic). Thus, a node can exist only one time in a path v → v → v →v → v the simple counting of common features by weighting rarer (e.g. path 1 2 3 1 5 is not acceptable v features more heavily. because 1 is traversed twice), • 1 There is a variety of global approaches [5]. In this i−1 is an “attenuation” factor that weights paths accord- paper, as comparison partners of global approaches, we ing to their length . Thus, a 2-step path measures the 1 consider Katz status index [4], and Random Walk with non-attenuation of a link with value equals to 1 ( 2−1 Restart algorithm [9], [7] (RWR) algorithm. Katz defines a =1).A3-step path measures the attenuation of a link 1 1 1 measure that directly sums over all paths between any pair of with value equals to 2 ( 3−1 = 2 )etc.Inthissense,we nodes in graph G, exponentially damped by length to count use appropriate weights to allow the lower effectiveness short paths more heavily. RWR considers a random walker of longer path chains. Notice that we have also tested experimentally other possible attenuation factors such that starts from node vx, and chooses randomly among the β 1 available edges every time, except that, before he makes a as Katz’s original exponential , the logarithmic log(i) , choice, with probability α, he goes back to node vx (restart). etc. and, as will be shown later, the attenuation factor 1 The similarity matrix (i.e. Kernel) between nodes of a graph, − attains the best accuracy results. i 1 can be computed by Equation 1: • paths v vx,vy is the set of all length- paths from x to vy, −1 KernelRW R =(I − αP ) (1) i • (n − j) is the set of all possible length- paths from where I is the identity matrix and P is the transition- j=2 probability matrix. vx to vy, if each vertex in graph G was linked with pathsv ,v III. DEFINING A NODE SIMILARITY MEASURE all other vertices. By using the fraction x y , i In this section, we define a new similarity measure to (n − j) determine a way of expressing the proximity among graph j=2 nodes. Let vi and vj be two graph nodes and sim(vi,vj ) a our similarity measure is normalized and takes values function that expresses their similarity in the range [0,1].
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Obtaining and Using Evidence from Social Networking Sites
    U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through social- networking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks.
    [Show full text]
  • Systematic Scoping Review on Social Media Monitoring Methods and Interventions Relating to Vaccine Hesitancy
    TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy www.ecdc.europa.eu ECDC TECHNICAL REPORT Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy This report was commissioned by the European Centre for Disease Prevention and Control (ECDC) and coordinated by Kate Olsson with the support of Judit Takács. The scoping review was performed by researchers from the Vaccine Confidence Project, at the London School of Hygiene & Tropical Medicine (contract number ECD8894). Authors: Emilie Karafillakis, Clarissa Simas, Sam Martin, Sara Dada, Heidi Larson. Acknowledgements ECDC would like to acknowledge contributions to the project from the expert reviewers: Dan Arthus, University College London; Maged N Kamel Boulos, University of the Highlands and Islands, Sandra Alexiu, GP Association Bucharest and Franklin Apfel and Sabrina Cecconi, World Health Communication Associates. ECDC would also like to acknowledge ECDC colleagues who reviewed and contributed to the document: John Kinsman, Andrea Würz and Marybelle Stryk. Suggested citation: European Centre for Disease Prevention and Control. Systematic scoping review on social media monitoring methods and interventions relating to vaccine hesitancy. Stockholm: ECDC; 2020. Stockholm, February 2020 ISBN 978-92-9498-452-4 doi: 10.2900/260624 Catalogue number TQ-04-20-076-EN-N © European Centre for Disease Prevention and Control, 2020 Reproduction is authorised, provided the
    [Show full text]
  • My-Trac: System for Recommendation of Points of Interest on the Basis of Twitter Profiles
    electronics Article My-Trac: System for Recommendation of Points of Interest on the Basis of Twitter Profiles Alberto Rivas 1,2,* , Alfonso González-Briones 1,2,3 , Juan J. Cea-Morán 1, Arnau Prat-Pérez 4 and Juan M. Corchado 1,2 1 BISITE Research Group, University of Salamanca, Edificio I+D+i, Calle Espejo 2, 37007 Salamanca, Spain; [email protected] (A.G.-B.); [email protected] (J.J.C.-M.); [email protected] (J.M.C.) 2 Air Institute, IoT Digital Innovation Hub, Carbajosa de la Sagrada, 37188 Salamanca, Spain 3 Research Group on Agent-Based, Social and Interdisciplinary Applications (GRASIA), Complutense University of Madrid, 28040 Madrid, Spain 4 Sparsity-Technologies, 08034 Barcelona, Spain; [email protected] * Correspondence: [email protected] Abstract: New mapping and location applications focus on offering improved usability and services based on multi-modal door to door passenger experiences. This helps citizens develop greater confidence in and adherence to multi-modal transport services. These applications adapt to the needs of the user during their journey through the data, statistics and trends extracted from their previous uses of the application. The My-Trac application is dedicated to the research and development of these user-centered services to improve the multi-modal experience using various techniques. Among these techniques are preference extraction systems, which extract user information from social networks, such as Twitter. In this article, we present a system that allows to develop a profile of the preferences of each user, on the basis of the tweets published on their Twitter account. The Citation: Rivas, A.; González-Briones, system extracts the tweets from the profile and analyzes them using the proposed algorithms and A.; Cea-Morán, J.J.; Prat-Pérez, A.; returns the result in a document containing the categories and the degree of affinity that the user has Corchado, J.M.
    [Show full text]
  • Building a Personal Political Brand Using Facebook and Instagram Advertising
    BUILDING A PERSONAL POLITICAL BRAND USING FACEBOOK AND INSTAGRAM ADVERTISING Jyväskylä University School of Business and Economics Master’s Thesis 2020 Author: Tommi Puomisto Subject: Digital Marketing and Corporate Communication Supervisor: Heikki Karjaluoto ABSTRACT Author Tommi Puomisto Title Building a personal political brand using Facebook and Instagram advertising Subject Type of work Digital Marketing and Corporate Master’s thesis Communication Date Number of pages 16.6.2020 86 The how and where of political marketing and branding has changed significantly in the past decade. Social networking sites are increasingly used by actors like political parties to brand themselves and interact digitally with voters in real-time. While political branding has been researched extensively from the external perspective of the audience, the internal perspective, “brand identity”, and especially that of individual politicians has remained under-researched, thus presenting a potential research gap. The goal of this thesis is to increase the understanding of the role of Facebook and Instagram advertising in building a personal political brand from the internal perspective of the brand owner and internal stakeholders, therefore addressing the call for further research on the internal perspective of branding. This study is a mixed methods research and was carried out as a single case study. The case was an election campaign of a single political candidate in the Finnish parliamentary elections of 2019. Qualitative data was collected through semi-structured interviews, which were processed through the thematic analysis approach. Quantitative secondary performance data of the campaign’s social media advertising was then analyzed and compared with the findings of the qualitative thematic analysis.
    [Show full text]
  • We Have to Acknowledge That Consumers Are Controlling The
    © Hugh MacLeod. www.gapingvoid.com We have to acknowledge that consumers are controlling the conversation about brands more than ever and they are doing it in real time, online, way faster than you can churn out an ad or distribute a news release. While social media is not the absolute answer to all marketing issues, I think it definitely provides insight into customer behaviors and allows clients to participate in conversations about their brand/ product/service on a more proactive and intimate level. We!ve designated a team of specialists that are immersed in all levels of social media. They spend time scouring the Web, read books and blogs, attend training, workshops and seminars, and actively participate to understand social media inside and out. - Nicole Torstenson, Sr. Marketing Strategist, Innova Ideas & Services © Hugh MacLeod. www.gapingvoid.com Let’s focus on: Nevermind. dominant ual ling ultil h/m l is rta an MR or spa p p p h h o o t t o social networks o social networks + s o o crowd s crowd s c ii p p a ll a n a e content n tt source n source w i i o s s rr k h i h i n based g / / location m u sh llt ngllii d iillii e o ng nt m u miinan in all do a n s t ms space usic mobile communities mu sociiall n e t d w at video ing o Es tu grito r k s portal t n a iin m o d s ks e rk ng o lis w h tw e t n iinterest Innova Ideas & Services | www.innovaideasandservices.com Nannette Rodríguez | Director of Hispanic Marketing, Business Development | 515.697.7200 | [email protected] @rodriguez24 (Twitter) | Nannette Rodriguez+Des Moines (Facebook, Linked In, MySpace) Web Progression Web 1.0 Web 2.0 Web 3.0 Web 3.5 In the beginning, Then it progressed Commerce then A subset of social the Web served into a place for ushered an era of networks and as an info transactions.
    [Show full text]
  • Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media
    See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/327186182 Custodians of the internet: Platforms, content moderation, and the hidden decisions that shape social media Book · January 2018 CITATIONS READS 268 6,850 1 author: Tarleton Gillespie Microsoft 37 PUBLICATIONS 3,116 CITATIONS SEE PROFILE All content following this page was uploaded by Tarleton Gillespie on 20 December 2019. The user has requested enhancement of the downloaded file. Custodians of the Internet platforms, content moderation, and the hidden decisions that shape social media Tarleton Gillespie CUSTODIANS OF THE INTERNET CUSTODIANS OF THE INTERNET platforms, content moderation, and the hidden decisions that shape social media tarleton gillespie Copyright © 2018 by Tarleton Gillespie. All rights reserved. Subject to the exception immediately following, this book may not be repro- duced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The Author has made this work available under the Creative Commons Attribution- Noncommercial- ShareAlike 4.0 International Public License (CC BY- NC- SA 4.0) (see https://creativecommons.org/licenses/ by- nc- sa/4.0/). An online version of this work is available; it can be accessed through the author’s website at http://www.custodiansoftheinternet.org. Yale University Press books may be purchased in quantity for educational, business, or promotional use. For information, please e- mail sales.press@yale. edu (U.S. offi ce) or [email protected] (U.K.
    [Show full text]
  • Tagged Buys Hi5 in Facebook Challenge 14 December 2011
    Tagged buys hi5 in Facebook challenge 14 December 2011 well as with friends. Members can also play games or send virtual gifts. Hi5 was established in 2003 as a social network but about two years ago shifted focus to being a platform for people to play games online. "Tagged is the perfect home for hi5 as it continues to prove itself as a major contender in social," said Alex St. John, former president and chief technology officer of hi5. (c) 2011 AFP Tagged on Wednesday bought fellow online community hi5 in a move aimed at creating a Facebook rival. Tagged on Wednesday bought fellow online community hi5 in a move aimed at creating a Facebook rival. The two San Francisco-based startups will continue to operate as independent brands but Tagged plans to build bridges between its more that 100 million users and the 230 million people signed up at hi5. Financial terms of the deal were not disclosed. "An opportunity of this magnitude is uncommon and exciting as the addition of hi5 immediately doubles our overall active user base and grows combined registered users past 330 million members," said Tagged co-founder Greg Tseng. He described the alliance as giving rise to "the best social network to meet new people." Social networking giant Facebook boasts more than 800 million members around the world, letting people share photos, thoughts and more with friends. Tagged.com launched in late 2004 and allows people to socialize with folks they don't know as 1 / 2 APA citation: Tagged buys hi5 in Facebook challenge (2011, December 14) retrieved 26 September 2021 from https://phys.org/news/2011-12-tagged-hi5-facebook.html This document is subject to copyright.
    [Show full text]
  • Understanding Online Social Network Usage from a Network Perspective
    Understanding Online Social Network Usage from a Network Perspective Fabian Schneider Anja Feldmann Balachander Krishnamurthy Walter Willinger TU Berlin / T-Labs TU Berlin / T-Labs AT&T Labs - Research AT&T Labs - Research [email protected] [email protected] [email protected] [email protected] berlin.de berlin.de ABSTRACT content has resulted in over half a billion users being present on the Online Social Networks (OSNs) have already attracted more than OSN ecosystem. Facebook alone adds over 377,000 users every half a billion users. However, our understanding of which OSN fea- twenty-four hours and is expected to overtake MySpace in the total tures attract and keep the attention of these users is poor. Studies number of users in 2009 [2]. thus far have relied on surveys or interviews of OSN users or fo- This sheer number of users makes OSN usage interesting for dif- cused on static properties, e. g., the friendship graph, gathered via ferent entities: (i) ISPs have to transport the data back and forth sampled crawls. In this paper, we study how users actually inter- and provide the connectivity, (ii) OSN service providers need to act with OSNs by extracting clickstreams from passively monitored develop and operate scalable systems, and (iii) researchers and de- network traffic. Our characterization of user interactions within the velopers have to identify trends and suggest improvements or new OSN for four different OSNs (Facebook, LinkedIn, Hi5, and Stu- designs. The questions this paper aims at answering therefore in- diVZ) focuses on feature popularity, session characteristics, and the clude Which features of OSNs are popular and capture the users at- dynamics within OSN sessions.
    [Show full text]
  • Digital Literacy Among Young Adults in Romania
    digitales archiv ZBW – Leibniz-Informationszentrum Wirtschaft ZBW – Leibniz Information Centre for Economics Mocanu, Florinela Article Digital literacy among young adults in Romania Provided in Cooperation with: College of Management, National University of Political Studies and Public Administration, Bucharest This Version is available at: http://hdl.handle.net/11159/3696 Kontakt/Contact ZBW – Leibniz-Informationszentrum Wirtschaft/Leibniz Information Centre for Economics Düsternbrooker Weg 120 24105 Kiel (Germany) E-Mail: [email protected] https://www.zbw.eu/econis-archiv/ Standard-Nutzungsbedingungen: Terms of use: Dieses Dokument darf zu eigenen wissenschaftlichen Zwecken This document may be saved and copied for your personal und zum Privatgebrauch gespeichert und kopiert werden. Sie and scholarly purposes. You are not to copy it for public or dürfen dieses Dokument nicht für öffentliche oder kommerzielle commercial purposes, to exhibit the document in public, to Zwecke vervielfältigen, öffentlich ausstellen, aufführen, vertreiben perform, distribute or otherwise use the document in public. If oder anderweitig nutzen. Sofern für das Dokument eine Open- the document is made available under a Creative Commons Content-Lizenz verwendet wurde, so gelten abweichend von diesen Licence you may exercise further usage rights as specified in Nutzungsbedingungen die in der Lizenz gewährten Nutzungsrechte. the licence. Leibniz-Informationszentrum Wirtschaft zbw Leibniz Information Centre for Economics Management Dynamics in the Knowledge Economy Vol.6 (2018) no.3, pp.449-470; DOI 10.25019/MDKE/6.3.06 ISSN 2392-8042 (online) © Faculty of Management (SNSPA) Digital Literacy Among Young Adults in Romania Florinela MOCANU National University of Political Studies and Public Administration 30A Expozitiei Blvd., 012104 Bucharest, RO [email protected] Abstract.
    [Show full text]
  • Social Media Software and How It Can Assist In
    SOCIALSOCIAL MEDIAMEDIA SOFTWARESOFTWARE adding social dimensions to your business Social Media involves all the internet enabled means that people may use to communicate, share and collaborate. This whitepaper features the social media phenomenon and the important social media trends that are being adopted successfully by various businesses. Through various real life examples, it shares that how social media has made a tremendous impact in the growth and development of these businesses. The whitepaper also introduces the social media software and how it can assist in leveraging effective social technologies and the available solutions . Abstract 1 Introduction 2 Defining Social Media 2 Software The Power of Social Media 2 A Deeper Insight 3 Leveraging the Social Magic 3 Social Enablers 4 Crafting the Open Web 5 Add the Social “D” to 5 yor Domain Our Footprints on Social Web 6 Call for a Comprehensive 6 Platform Our Solution - 7 Impetus Technologies Inc. Unvailing Espirit 1 www.impetus.com About Impetus 9 October 2009 WHITE PAPER SOCIAL MEDIA SOFTWARE Introduction Defining Social Media Software The Social Media Software spectrum The recent era has experienced a shift from the comprises a variety of software systems that “static” Web 1.0 internet to an interactive or allow users to communicate and share data. “conversational” world of Web 2.0. Social media can take many different forms, Participation in this social media revolution is including Internet forums, blogs, wikis, the key to harness the unparalleled marketing podcasts, pictures, video, etc. These and branding power of the internet for your interactions have become seismically business. successful on social networking sites Social Networking enables your customers to (Facebook, Orkut, hi5 and MySpace), become the strongest advocates of your multimedia sites (Flickr, Imeem and YouTube), products/services.
    [Show full text]
  • A Survey of Current Social Network and Online Communication Provision Policies for Offender Identification
    A survey of current social network and online communication provision policies for offender identification Graeme Horsman Department of Computing, Engineering and Technology Faculty of Computer Science The David Goldman Informatics Centre St Peter's Way Sunderland SR6 0DD Email: [email protected] Phone: 0191 515 2381 Abstract Online forms of harassment, stalking and bullying on social network and communication platforms are now arguably wide-spread and subject to regular media coverage. As these provision continue to attract millions of users, generating significant volumes of traffic, regulating abuse and effectively reprimanding those who are involved in it, is a difficult and sometimes impossible task. This article collates information acquired from 22 popular social network and communication platforms in order to identify current regulatory gaps. Terms of service and privacy policies are reviewed to assess existing practices of data retention to evaluate the feasibility of law enforcement officials tracking those whose actions breach the law. For each provision, account sign-up processes are evaluated and policies for retaining Internet Protocol logs and user account information are assessed along with the availability of account preservation orders. Finally, recommendations are offered for improving current approaches to regulating social network crime and online offender tracking. Keywords: Social Media Networks; Crime; Regulation; Internet; Cyber Crime; Harassment 1 Introduction Online platforms have now revolutionised modern day communication. However, in light of recent global events, social media has now become a platform for those to voice both positive and negative sentiment, requiring greater regulation by both the social networking sites themselves and the police (Awan, 2016).
    [Show full text]