Modeling anomalous attention over an online social network through read/post analytics

Zijian Zhang*, Jiamou Liu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Online social platforms revolutionarize the way in which people communicate, shattering physical boundaries and bringing people together in the virtual environment. While users are able to access information and share knowledge with unprecedented ease and openness, danger also lurks in the dark. Social networks have the potential to draw unwanted and anomalous attention to their users. Through online social networks, the daily routines of an individual may be under constant surveillance of others. Such risks are closely associated with information leakage, and have posed serious privacy and safety concerns. This paper investigates such risks, which are typically captured by excessive, unprecedented and persistent gathering of personal information through the cyberspace. We focus on ways to mitigate such risks through formalizing the concepts of anomalous attention. This is a challenging question, as such behaviors are usually victim-defined and often occurs without visible trace. Viewing a network as interconnected nodes who exchange information through posting and reading messages, we provide an abstract model of attention, and quantify the level of attention a user pays towards another. Analyzing the sequence of attention between pairs of users in the network allow one to capture anomalous activities.

Original languageEnglish
Title of host publication2017 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages146-151
Number of pages6
ISBN (Electronic)9781538630167
DOIs
Publication statusPublished - 2 Jul 2017
Event2017 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2017 - Shenzhen, China
Duration: 15 Dec 201717 Dec 2017

Publication series

Name2017 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2017
Volume2018-January

Conference

Conference2017 International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2017
Country/TerritoryChina
CityShenzhen
Period15/12/1717/12/17

Fingerprint

Dive into the research topics of 'Modeling anomalous attention over an online social network through read/post analytics'. Together they form a unique fingerprint.

Cite this