Title: Social Computing and Incentivized Sharing
1Social Computing and Incentivized Sharing
2Group Members
- UT Dallas
- Murat Kantarcioglu
- Alain Bensoussan (UT Dallas)
- Nathan Berg
- Bhavani Thuraisingham
- University of Michigan
- Lada Adamic
- UMBC
- Yelena Yesha
- Joel Sachs
- Anupam Joshi
- Tim Finin
- UTSA
- Shouhuai Xu
- Ravi Sandhu
- Purdue
- Elisa Bertino
- Chris Clifton
3social networks the AISL
incentivized sharing
information dissemination and filtering
SOCIALNETWORKS
privacy and security
UT Dallas
4social networks and information sharing
- distributing information
- determining who should receive information
- pulling information
- information filtering (e.g. digg, FriendFeed)
- securing information
- propagation of trust and distrust (reputation
management) - enhance trustworthiness of cryptographic key
infrastructure - incentivizing sharing
- individuals more or less likely to share with
close contacts
5acquiring novelty and community structure
- data quality/provenance
- identify circular intelligence through proximity
in social networks - temporal source information can be mapped onto
social network
6sharing acquiring open participation
7open participation information or noise?
Knowledge search is like oozing out knowledge
in human brains to the Internet. People who know
something better than others can present their
know-how, skills or knowledge'' NHN CEO Chae
Hwi-young
(It is) the next generation of search (it) is a
kind of collective brain -- a searchable database
of everything everyone knows. It's a culture of
generosity. The fundamental belief is that
everyone knows something. -- Eckart
Walther (Yahoo Research)
8A-space
9Network analysis can be used to determine
expertise
Preferred Helper best available
Preferred Helper just better
10and study competitive information sharing
- Java Forum asker -gt replier
- Task CN submitter -gt winner
11structure of complex networks
- heterogeneous connectivity and participation
- robustness
- connectivity
- propagation of misinformation from compromised
nodes
12Secure social networks research goal
- We ask and address the following two questions
- How should we exploit social computing/networks
for security purposes (e.g., assured information
sharing)? - How should we secure social computing/networks?
13Security by social computing
- protect cryptographic security
- detect and deter malicious players
- trustworthy and survivable storage
- reputation management
- reliable and secure information dissemination
14Security for social computing
- anonymous accountable social computing
- privacy-preserving social computing
- inferring private data from social connections
- secure incentive mechanisms
- manipulation-resistant social computing
- data quality/provenance
- obscuring identity and connections
15prior work
- Secure social networks privacy
- Network robustness (poster Xu et al.
Generalized Epidemic Threshold, with
Applications) - Key signing Exploiting social networks for
threshold signing (AsiaCCS'08) - Privacy and trust in information sharing
(Kantarcioglu UTDCS-21-08 ) - Information sharing filtering
- Inferring expertise in QA forums (Adamic et al.
WWW0708) - Using social networks to detect conflicts of
interest (Joshi et. al WWW2006, ACM Tweb, 2008) - online information sharing structure
(blogs,twitter) - Adamic (WI 2005,ICWSM0708)
- Finin, Joshi (WebKDD,ICWSM0708, many more)
- data quality and providence (detecting spam
blogs) (AAAI 2006,ICWSM07,TREC2006) - Social and semantic computing
- blending the social semantic (Sachs AAAI 07
workshop)
16current research
- social networks as a filtering aggregation tool
- Yelena Yesha, Lada Adamic, Anupam Joshi, Tim
Finin - understand the role of social networks (e.g.
FriendFeed, blogs) in information diffusion - sentiment analysis and network structure
- security for and from social networks
- Shouhuai Xu, Ravi Sandhu
- Understanding properties of social networks under
attack - Using insights to make social computing more
robust and secure - incentivized sharing in social networks
- Murat Kantarcioglu, Lada Adamic
- Experiments effect of social connections on
information sharing (peer recognition) and
ability to recognize poor information sources - Social engineering (phishing, etc.)
17social networks the AISL
incentivized sharing
information dissemination and filtering
SOCIALNETWORKS
privacy and security
UT Dallas