Skip to main content

Part of the book series: Lecture Notes in Social Networks ((LNSN))

  • 823 Accesses

Abstract

Interactions of users in Online Social Networks (OSNs) offer interesting insights to a large spectrum of researchers from different domains. With the continuously increasing volume of data exchanged between those users, it is reasonable to think of methods to improve information accuracy and also protect users’ privacy. In this research we proposed a weighted-based approach to describe relations between users in OSNs. Users in OSNs interact with each other through comments, posts, pictures, videos, etc. Our model investigates relations between users as nodes in OSNs, their activities as products of those nodes, and interactions between the different nodes through those activities. We showed how our reputation model can be used in several applications, including friends’ recommendation system, referrals, credit reporting, spam detection, and networks evolution. In social networks, a clique is a group of users in which everyone is a friend to all other group members. Interactions between cliques’ members are studied in different networks for knowledge extraction. We introduced the concept of “weighted cliques” in comparison with classical cliques to provide better understanding of users’ interactions. We showed using a demo dataset how to extract knowledge using the proposed method and how is that different from classical clique methods. We also proposed a context-driven model for privacy assessment in OSNs. The goal is to semi-automate the process of deciding the visibility levels of users’ created posts or activities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alsmadi, I., Xu, D., Cho, J.: Interaction-based reputation model in online social networks. In: Proceedings of the Second International Conference on Information Systems Security and Privacy (ICISSP2016) (2016)

    Google Scholar 

  2. Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory, Crowding. Brooks/Cole Publishing, Monterey (1975)

    Google Scholar 

  3. Backstrom, L., Sun, E., Marlow, C.: Find me if you can: improving geographical prediction with social and spatial proximity. In: Proceedings of the 19th International Conference on World Wide Web, pp. 61–70. ACM, New York (2010)

    Google Scholar 

  4. Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(1), 6 (2009)

    Article  Google Scholar 

  5. Castelfranchi, C., Falcone, R.: Trust is more than subjective probability: mental components and sources of trust. In: Proceedings of the 33rd Hawaii International conference on System Science, Maui, HI (2000)

    Google Scholar 

  6. Cho, J.-H., Alsmadi, I., Xu, D.: Privacy and social capital in online social networks. In: IEEE Global Communications Conference (GLOBECOM), pp. 1–7. IEEE, Piscataway (2016)

    Google Scholar 

  7. Dey, R., Tang, C., Ross, K., Saxena, N.: Estimating age privacy leakage in online social networks. In: INFOCOM’12 (2012)

    Google Scholar 

  8. Dhekane, R., Vibber, B.: Talash: friend finding in federated social networks. In: LDOW (2011)

    Google Scholar 

  9. Dwyer, C., Hiltz, S., Passerini, K.: Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace. In: AMCIS 2007 Proceedings, p. 339 (2007)

    Google Scholar 

  10. Fong, P.W.L., Anwar, M., Zhao, Z.: A privacy preservation model for Facebook-style social network systems. In: Computer Security–ESORICS 2009, pp. 303–320. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  11. Gilbert, E., Karahalios, K.: Predicting tie strength with social media. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI’09), NY, pp. 211–220 (2009)

    Google Scholar 

  12. Grabner-Kräuter, S., Bitter, S.: Trust in online social networks: a multifaceted perspective. In: Forum for Social Economics, 1–21 (2013)

    Google Scholar 

  13. Guo, L., Yang, S., Wang, J., Zhou, J.: Trust model based on similarity measure of vectors in P2P networks. In: Grid and Cooperative Computing-GCC 2005, pp. 836–847. Springer, Berlin (2005)

    Chapter  Google Scholar 

  14. Guo, L., Zhang, C., Fang, Y.: Trust-based privacy-preserving friend recommendation scheme for online social networks. IEEE Trans. Dependable Secure Comput. 12(4), 413–427 (2015)

    Article  Google Scholar 

  15. Hardin, R.: Trust and Trustworthiness. Russell Sage Foundation, New York (2002)

    Google Scholar 

  16. Himel, D., Ali, M., Hashem, T.: User interaction based community detection in online social networks. In: The 19th International Conference on Database Systems for Advanced Applications (DASFAA), Bali (2014)

    Google Scholar 

  17. Hogg, T., Adamic, L.: Enhancing reputation mechanisms via online social networks. In: EC 2004, New York (2004)

    Google Scholar 

  18. Hussain, F.K., Chang, E.: An overview of the interpretations of trust and reputation. In: 3rd Advanced International Conference on Telecommunications (AICT 2007) (2007)

    Google Scholar 

  19. Jøsang, A., Pope, S.: Semantic constraints for trust transitivity. In: Proceedings of Asia-Pacific Conference of Conceptual Modeling, vol. 3 (2005)

    Google Scholar 

  20. Kim, T.H.-J., Yamada, A., Gligor, V., Hong, J., Perrig, A.: Relationgram: tie-strength visualization for user-controlled online identity authentication. In: Proceedings of the International Conference on Financial Cryptography and Data Security, pp. 69–77. Springer, Berlin (2013)

    Google Scholar 

  21. Korzaan, M.L., Boswell, K.T.: The influence of personality traits and information privacy concerns on behavioral intentions. J. Comput. Inf. Syst. 48(4), 15–24 (2008)

    Google Scholar 

  22. Kresnova, H., Spiekermann, S., Koroleva, K., Hildebrand, T.: Online social networks: why we disclose. J. Inf. Technol. 25(2), 109–125 (2010)

    Article  Google Scholar 

  23. Kumar, R., Novak, J., Tomkins, A.: Structure and evolution of online social networks. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 611–617 (2006)

    Google Scholar 

  24. Leskovec, J., Backstrom, L., Kumar, R., Tomkins, A.: Microscopic evolution of social networks. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2008)

    Google Scholar 

  25. Lewis, K., Kaufman, J., Christakis, N.: The taste for privacy: an analysis of college student privacy settings in an online social network. J. Comput. Mediat. Commun. 14, 79–100 (2008)

    Article  Google Scholar 

  26. Mayer, R.C., Davis, J.H., Schoorman, D.F.: An integrative model of organizational trust. Acad. Manag. Rev. 20(3), 709–734 (1995)

    Article  Google Scholar 

  27. McKnight, H., Chudhury, V., Kacmar, C.: Developing and validating trust measures for e-commerce: an integrative typology. J. Inf. Syst. Res. 13(3), 334–359 (2002)

    Article  Google Scholar 

  28. Mesch, G.S.: Is online trust and trust in social institutions associated with online disclosure of identifiable information online? Comput. Hum. Behav. 28, 1471–1477 (2012)

    Article  Google Scholar 

  29. Piccoli, G., Ives, B.: Trust and the unintended effects of behavior control in virtual teams. MIS Q. 27(3), 365–395 (2003)

    Article  Google Scholar 

  30. Robins, G., Pattison, P., Kalish, Y., Lusher, D.: An introduction to exponential random graph (p*) models for social networks. Soc. Netw. 29(2), 173–191 (2007)

    Article  Google Scholar 

  31. Smith, H.J., Millberg, S.J., Burke, S.J.: Information privacy: measuring individuals’ concerns about organizational practices. MIS Q. 20(2), 167–196 (1996)

    Article  Google Scholar 

  32. Squicciarini, A.C., Xu, H., Zhang, X.L.: CoPE: enabling collaborative privacy management in online social networks. J. Am. Soc. Inf. Sci. Technol. 62(3), 521–534 (2011). Wiley Online Library

    Google Scholar 

  33. Toivonen, S., Lenzini, G., Uusitalo, I.: Context-aware trust evaluation functions for dynamic re-configurable systems. In: Proceedings of the Workshop on Models of Trust for the Web (MTW’06), Edinburgh (2006)

    Google Scholar 

  34. Van De Garde-Perik, E., Markopoulos, P., De Ruyter, B., Eggen, B., Ijsselsteijn, W.: Investigating privacy attitudes and behavior in relation to personalization. Soc. Sci. Comput. Rev. 26(1), 20–43 (2008)

    Article  Google Scholar 

  35. Von Arb, M., Bader, M., Kuhn, M., Wattenhofer, R.: Veneta: serverless friend-of-friend detection in mobile social networking. In: Networking and Communications, 2008. WIMOB’08. IEEE International Conference on Wireless and Mobile Computing, pp. 184–189. IEEE, Piscataway (2008)

    Google Scholar 

  36. Weber, R.: Internet of things-new security and privacy challenges. J. Comput. Law Secur. Rev. 25(6), 522–527 (2009)

    Article  Google Scholar 

  37. Wishart, R., Robinson, R., Indulska, J., Josang, A.: SuperstringRep: reputation-enhanced service discovery. In: Proceedings of the 28th Australasian Conference on Computer Science (ACSC’05), pp. 49–57. Australian Computer Society, Darlinghurst (2005)

    Google Scholar 

  38. Xiang, R., Neville, J., Rogati, M.: Modeling relationship strength in social networks. In: Proceedings of the 19th International Conference of World Wide Web (WWW’10), pp. 981–990. ACM Press, New York (2010)

    Google Scholar 

  39. Young, A.L., Quan-Haase, A.: Information revelation and internet privacy concerns on social network sites: a case study of Facebook. In: Proceedings of the International Conference on Communities and Technology, pp. 265–274 (2006)

    Google Scholar 

  40. Yu, B., Singh, M.P.: A social mechanism for reputation management in electronic communities. In: Proceedings of the 4th International Workshop on Cooperative Information Agents (CIA ’00), pp. 154–165. Springer, Berlin (2000)

    Chapter  Google Scholar 

  41. Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008, pp. 506–515. IEEE, Piscataway (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Izzat Alsmadi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Alsmadi, I., Al-Abdullah, M. (2019). Testing Assessment of Group Collaborations in OSNs. In: Agarwal, N., Dokoohaki, N., Tokdemir, S. (eds) Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-94105-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94105-9_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94104-2

  • Online ISBN: 978-3-319-94105-9

  • eBook Packages: Social SciencesSocial Sciences (R0)

Publish with us

Policies and ethics