Visual Analysis of Information Dissemination Channels in Social Network for Protection Against Inappropriate Content
The paper presents an approach to a visual analysis of links in social networks for obtaining information on channels of inappropriate information dissemination. The offered approach is based on the formation of the knowledge base about communication between users and groups, interactive display of propagation paths of inappropriate information and the visual analysis of the received results to detect sources and repeaters of inappropriate information. The interconnections of users and groups in social networks allow the construction of connectivity graphs, and the facts of the transmission of inappropriate information through these channels provide an opportunity to identify the ways of malicious content dissemination. The results of experiments confirming the applicability of the proposed approach are outlined.
KeywordsSocial network Visualization Protection against information Inappropriate information Communication graph Visual analytics
The work is performed by the grant of RSF #18-11-00302 in SPIIRAS.
- 1.Social networks in Russia, summer 2017: figures & trends. https://www.cossa.ru/289/166387/. Accessed 11 Apr 2018
- 2.Kotenko, I., Chechulin, A., Shorov, A., Komashinsky, D.: Analysis and evaluation of web pages classification techniques for inappropriate content blocking. In: 14th Industrial Conference on Data Mining, LNAI, vol. 8557, pp. 39–54. Springer (2014)Google Scholar
- 3.Novozhilov, D., Kotenko, I., Chechulin, A.: Improving the categorization of web sites by analysis of html-tags statistics to block inappropriate content. In: 9th International Symposium on Intelligent Distributed Computing, pp. 257–263. Springer (2016)Google Scholar
- 6.Gomzin, A., Kuznetsov, S.: Methods of construction of socio-demographic profiles of Internet users. Program. Comput. Softw. J. 27(4), 129–144 (2015)Google Scholar
- 7.Drobyshevskiy, M., Korshunov, A., Turdakov, D.: Parallel modularity computation for directed weighted graphs with overlapping communities. Program. Comput. Softw. J. 28(6), 153–170 (2016)Google Scholar
- 8.Que, F., Rajagopalan, K., Zaman, T.: Penetrating a Social Network: The Follow-back Problem (2018). https://arxiv.org/pdf/1804.02608.pdf. Accessed 15 Apr 2018
- 10.Hickethier, G., Tommelein, I.D., Lostuvali, B.: Social network analysis of information flow in an IPD-project design organization. In: 21th Annual International Group for Lean Construction (2013)Google Scholar
- 11.Sudhahar, S., Veltri, G., Cristianini, N.: Automated analysis of the US presidential elections using Big Data and network analysis. Big Data Soc. J. 2(1), 1–28 (2015)Google Scholar
- 12.Paraphrasing and synonymy of text. www.paraphraser.ru. Accessed 15 Apr 2018
- 14.Kolomeec, M., Chechulin, A., Pronoza, A., Kotenko, I.: Technique of data visualization: Example of network topology display for Security monitoring. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 7(1), 41–57 (2016)Google Scholar