Abstract
Human Flesh Search Engine (HFSE) is a phenomenon of massive researching using Web media such as blogs and forums with a purpose of exposing personal details of perceived misbehaviors. With the increasing efficiency and convenience of the Web, Human Flesh Search Engine is becoming more and more powerful and able to discover information which is "mission impossible" by other conventional means. Existing research work focuses on legal or privacy issues of this emerging tool, while we aim at building a mathematical model to understand the evolution of the search process and hence to evaluate the power of this massive collaboration intelligence. Viewing the initiator and target of a search campaign as source/destination nodes in the social network, a HFSE searching is modeled as a probabilistic flooding routing algorithm in the graph. Typical Human Flesh Search Engine cases and simulation-based experiments are used to evaluate the validity of the model and provide new insights for HFSE.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ahn, Y.-Y., Han, S., Kwak, H., Eom, Y.-H., Moon, S., Jeong, H.: Analysis of topological characteristics of Huge Online Social Networking Services. In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007 (2007)
Bai, X., Ji, S.: Human Flesh Search Engine: an Internet Lynching, Xinhua English 2008-07-04, http://english.sina.com/china/1/2008/0704/170016.html
Boyd, S., Ghosh, A., Prabhakar, B., Shah, D.: Gossip Algorithms: Design, Analysis and Applications. In: Proceedings of IEEE Infocomm, Miami, vol. 3, pp. 1653–1664 (March 2005)
Clerc, M., Kennedy, J.: The Particle Swarm—Explosion, Stability, andConvergence in a Multidimensional Complex Space. IEEE Transactions on Evolutionary Computation 6(1) (February 2002)
CNN, From Flash Mob to Lynch Mob, June 5 (2007)
CNNIC (China Internet Network Information Center). The 24th Statistical Report on Internet Development in China (July 2009), http://www.cnnic.net.cn/uploadfiles/pdf/2009/10/12/114121.pdf
Cohen, B.: Incentives Build Robustness in BitTorrent. In: Workshop on Economics of Peer-to-Peer Systems (2003)
Dimakopoulos, V.V., Pitoura, E.: On the Performance of Flooding-Based Resource Discovery. IEEE Transactions on Parallel and Distributed Systems 17(11), 1242–1252 (2006)
Evans, B.M., Chi, E.H.: Towards a Model of Understanding Social Search. In: Proceedings of the ACM 2008 Conference on Computer Supported Cooperative Work (2008)
Fletcher, H.: Human flesh search engines: Chinese vigilantes that hunt victims on the web. The Times (2008-06-25), http://technology.timesonline.co.uk/tol/news/tech_and_web/article4213681.ece
Gao, Y., Madey, G.: Towards understanding: a study of thesourceforge.net community using modeling and simulation. In: SpringSim 2007: Proceedings of the 2007 Spring Simulation Multiconference (2007)
Goel, S., Muhamad, R., Watts, D.: Social Search in “Small-World” Experiments. In: WWW 2009: Proceedings of the 18th International Conference on World Wide Web, pp. 701–710 (2009)
Haas, J.: A new routing protocol for the reconfigurable wireless networks. In: Proc. of IEEE 6th International Conference on Universal Personal Communications, pp. 562–566 (1997)
Howe, J.: Wired 14.06: The Rise of Crowdsourcing, http://www.wired.com/wired/archive/14.06/crowds.htm
Ko, Y.B., Vaidya, N.H.: Location-Aided Routing (LAR) in Mobile Ad-Hoc Networks. Wireless Networks 6(4), 307–321 (2000)
Liben-Nowell, D., Novak, J., Kumar, R., Raghavan, P., Tomkins, A.: Geographic Routing in Social Networks. Proceedings of the National Academy of Sciences (2005)
MOP forum, http://www.mop.com
Qiu, D., Srikant, R.: Modeling and performance analysis of BitTorrent-like peer-to-peer networks. ACM SIGCOMM Computer Communication Review 34(4), 367–378 (2004)
Oikonomou, K., Stavrakakis, I.: Performance Analysis of Probabilistic Flooding Using Random Graphs. In: WOWMOM 2007, pp. 1–6 (2007)
Sasson, Y., Cavin, D., Schiper, A.: Probabilistic Broadcast for Flooding in Wireless Mobile Ad-Hoc Networks. In: Proc. IEEE WCNC, New Orleans, Louisiana, USA (2003)
Science Magazine.: Rare-Tiger Photo Flap Makes Fur Fly in China. Science 318, 893, November 9 (2007)
Science Magazine.: End of a Tiger’s Tale. Science 321, 32, July 18 (2008)
Shah, D.: Network gossip algorithms. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3673–3676 (2009)
Stojmenovic, I., Lin, X.: Loop-Free Hybrid Single-Path/Flooding Routing Algorithms withGuaranteed Delivery for Wireless Networks. IEEE Transactions on Parallel and Distributed Systems 12(10), 1023–1032 (2001)
Terpstra, W.W., Kangasharju, J., Leng, C., Buchmann, A.P.: BubbleStorm: Resilient, Probabilistic, and Exhaustive Peer-to-Peer Search. In: SIGCOMM 2007, Kyoto, Japan, August 27–31 (2007)
Tianya forum, http://www.tianya.cn
Watts, D.J., Dodds, P.S., Newman, M.E.J.: Identity and Search in Social Networks. Science 296(5571), 1302–1305 (2002)
Zhang, L., Tu, W.: Six Degrees of Separation in Online Society. In: Proceedings of the WebSci 2009: Society OnLine, Athens, Greece, March 18-20 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, L., Liu, Y., Li, J. (2012). A Mathematical Model for Human Flesh Search Engine. In: Wang, H., et al. Web Technologies and Applications. APWeb 2012. Lecture Notes in Computer Science, vol 7234. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29426-6_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-29426-6_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29425-9
Online ISBN: 978-3-642-29426-6
eBook Packages: Computer ScienceComputer Science (R0)