TIENE EN SU CESTA DE LA COMPRA
en total 0,00 €
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants.
The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided.
The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.
Table of Contents
Introduction
Overview
Analyzing Social Networks
Securing Social Networks
Outline of the Book
Next Steps
SUPPORTING TECHNOLOGIES
Social Networks: A Survey
Introduction
Survey of Social Networks
Details of Four Popular Social Networks
Summary and Conclusion
Data Security and Privacy
Overview
Security Policies
Policy Enforcement and Related Issues
Data Privacy
Summary and Directions
References
Data Mining Techniques
Introduction
Overview of Data Mining Tasks and Techniques
Artificial Neural Networks
Support Vector Machines
Markov Model
Association Rule Mining (ARM)
Multiclass Problem
Image Mining
Summary
References
Cloud Computing and Semantic Web Technologies
Introduction
Cloud Computing
Semantic Web
Semantic Web and Security
Cloud Computing Frameworks Based on Semantic Web Technologies
Summary and Directions
References
ASPECTS OF ANALYZING AND SECURING SOCIAL NETWORKS
Analyzing and Securing Social Networks
Introduction
Applications in Social Media Analytics
Data Mining Techniques for SNA
Security and Privacy
Summary and Directions
References
Semantic Web-Based Social Network Representation and Analysis
Introduction
Social Network Representation
Our Approach to Social Network Analysis
Summary and Directions
Reference
Confidentiality, Privacy, and Trust for Social Media Data
Introduction
Trust, Privacy, and Confidentiality
CPT Framework
Our Approach to Confidentiality Management
Privacy for Social Networks
Trust for Social Networks
Integrated System
CPT within the Context of Social Networks
Summary and Directions
References
TECHNIQUES AND TOOLS FOR SOCIAL NETWORK ANALYTICS
Developments and Challenges in Location Mining
Introduction
Key Aspects of Location Mining
Efforts in Location Mining
Challenges in Location Mining
Geospatial Proximity and Friendship
Our Contributions to Location Mining
Summary and Directions
References
TweetHood: A Social Media Analytics Tool
Introduction
TweetHood
Experiments and Results
Summary and Directions
References
Tweecalization: Location Mining Using Semisupervised Learning
Introduction
Tweecalization
Trustworthiness and Similarity Measure
Experiments and Results
Summary and Directions
References
Tweeque: Identifying Social Cliques for Location Mining
Introduction
Effect of Migration
Temporal Data Mining
Social Clique Identification
Experiments and Results
Location Prediction
Agglomerative Hierarchical Clustering
MapIt: Location Mining from Unstructured Text
Summary and Directions
References
Understanding News Queries with Geo-Content Using Twitter
Introduction
Application of Location Mining and Social Networks for Improving Web Search
Assigning Weights to Tweets
Semantic Similarity
Experiments and Results
Summary and Directions
References
SOCIAL NETWORK ANALYTICS AND PRIVACY CONSIDERATIONS
Our Approach to Studying Privacy in Social Networks
Introduction
Related Work
Definitional Preliminaries
Analysis
Data Gathering
Summary and Directions
References
Classification of Social Networks Incorporating Link Types
Introduction
Related Work
Learning Methods
Experiments
Results
Summary and Directions
References
Extending Classification of Social Networks through Indirect Friendships
Introduction
Related Work and Our Contributions
Definitions
Our Approach
Experiments and Results
Summary and Directions
References
Social Network Classification through Data Partitioning
Introduction
Related Work and Our Contributions
Metrics
Distributed Social Network Classification
Experiments
Summary and Directions
References
Sanitization of Social Network Data for Release to Semitrusted Third Parties
Introduction
Learning Methods on Social Networks
Hiding Private Information
Experiments
Effect of Sanitization on Other Attack Techniques
Effect of Sanitization on Utility
Summary and Directions
References
ACCESS CONTROL AND INFERENCE FOR SOCIAL NETWORKS
Access Control for Social Networks
Introduction
Related Work
Modeling Social Networks Using Semantic Web Technologies
Security Policies for OSNs
Security Policy Specification
Security Rule Enforcement
Summary and Directions
References
Implementation of an Access Control System for Social Networks
Introduction
Security in Online Social Networks
Framework Architecture
Experiments
Summary and Directions
References
Inference Control for Social Media
Overview
Design of an Inference Controller
Inference Control through Query Modification
Application to Social Media Data
Summary and Directions
References
Implementing an Inference Controller for Social Media Data
Overview
Inference and Provenance
Implementation of the Inference Controller
Generators
Use Case: Medical Example
Implementing Constraints
Summary and Directions
References
SOCIAL MEDIA INTEGRATION AND ANALYTICS SYSTE