Intelligent Data Analytics for Terror Threat Prediction. Группа авторов
Чтение книги онлайн.

Читать онлайн книгу Intelligent Data Analytics for Terror Threat Prediction - Группа авторов страница 17

Название: Intelligent Data Analytics for Terror Threat Prediction

Автор: Группа авторов

Издательство: John Wiley & Sons Limited

Жанр: Программы

Серия:

isbn: 9781119711513

isbn:

СКАЧАТЬ and WhatsApp are generating huge amount of data from their user profiles. But generation of huge data creates real world problems like rumor diffusion in network. It is difficult to find that whether information spreading in network is rumor or not and as each network has many users, it is not possible to find who spread that rumor. So classification of rumors and facts and finding rumor source in network is an emerging challenge in society. This chapter surveys various social networks, their features, cyber-crime and its classifications, and how these cyber-crimes occur in social networks. This chapter is specifically purposeful on cyber-crime in social network i.e. rumor diffusion. There are some popular classification algorithms such as Naïve Bayes and support vector machine classifiers to distinguish between rumors and facts. Next, to find source of a rumor consider three factors such as network structure, diffusion models, and centrality measures. There are two kinds of sources: 1) single source and 2) multiple source. To find single source use three approaches such as anti-rumor-based, query-based, and network observation. For multiple sources of rumor use several approaches like approximation-based, ranking-based, network partitioning, and community-based. These approaches improve probability of rumor detection and its source identification in social networks. However, there are many classification techniques and still some are not easy to use in finding based on existing features. So there is a need to consider more features and much better classification techniques. In rumor source detection, current research mostly focused on single source identification. But nowadays, multiple users are spreading rumors for fast dissemination over the social networks. Thus, there is need of developing new techniques to detect multiple sources of rumor.

      1. Bayleyegn, B. W., and Buta, D. B. The Effect of Social Media on Study Habits of Students:-A case study at Oda Bultum University, Oromia Regional State, Ethiopia. Global Journal of Management And Business Research, 2019.

      2. Guille, A., Hacid, H., Favre, C., Zighed, D.A., Information diffusion in online social networks: A survey. ACM Sigmod Rec., 42, 2, 17–28, 2013.

      3. Kapoor, K. K., Tamilmani, K., Rana, N. P., Patil, P., Dwivedi, Y. K., & Nerur, S. Advances in social media research: Past, present and future. Information Systems Frontiers, 20(3), 531–558, 2018.

      4. Bakshy, E., Rosenn, I., Marlow, C., & Adamic, L. (2012, April). The role of social networks in information diffusion. In Proceedings of the 21st international conference on World Wide Web, pp. 519–528, April 2012.

      5. Moore, R. Cybercrime: Investigating high-technology computer crime. LexisNexis, 2005.

      6. Smith, A. M. Protection of Children Online: Federal and State Laws Addressing Cyberstalking, Cyberharassment, and Cyberbulling. Congressional Research Service, 2009.

      7. Cușmaliuc, C. G., Coca, L. G., Iftene, A. Identifying Fake News on Twitter using Naive Bayes, SVM and Random Forest Distributed Algorithms. In Proceedings of The 13th Edition of the International Conference on Linguistic Resources and Tools for Processing Romanian Language (ConsILR-2018) pp. 177–188, 2018.

      8. Cortes, C. and Vapnik, V., Support-vector networks. Mach. Learn., 20, 3, 273–297, 1995.

      9. Shah, D. and Zaman, T., Rumors in a network: Who’s the culprit? IEEE Trans. Inf. Theory, 57, 8, 5163–5181, 2011.

      10. Shelke, S. and Attar, V., Source detection of rumor in social network—A review. Online Soc. Netw. Media, 9, 30–42, 2019.

      11. Jiang, J., Wen, S., Yu, S., Xiang, Y., Zhou, W., Identifying propagation sources in networks: State-of-the-art and comparative studies. IEEE Commun. Surv. Tutorials, 19, 1, 465–481, 2016.

      12. Pastor-Satorras, R. and Vespignani, A., Epidemic spreading in scale-free networks. Phys. Rev. Lett., 86, 14, 3200, 2001.

      13. Newman, M.E.J., The structure and function of complex networks. Soc. Ind. Appl. Math., 45, 167–256, 2003.

      14. Newman, M.E., Threshold effects for two pathogens spreading on a network. Phys. Rev. Lett., 95, 108701, 2005.

      15. Liu, D., Yan, E.W., Song, M., Microblog information diffusion: Simulation based on sir model. J. Beijing Univ. Posts Telecommun., 16, 28–33, 2014.

      16. Jin, Y., Wang, W., Xiao, S., An SIRS model with a nonlinear incidence rate. Chaos Solitons Fract., 34, 1482–1497, 2007.

      17. Boudin, F., A comparison of centrality measures for graph-based keyphrase extraction. Proceedings of the Sixth International Joint Conference on Natural Language Processing, pp. 834–838, 2013.

      18. Choi, J., Moon, S., Woo, J., Son, K., Shin, J., Yi, Y., Rumor source detection under querying with untruthful answers. IEEE INFOCOM 2017-IEEE Conference on Computer Communications, IEEE, pp. 1–9, 2017.

      19. Choi, J., Moon, S., Shin, J., Yi, Y., Estimating the rumor source with anti-rumor in social networks. 2016 IEEE 24th International Conference on Network Protocols (ICNP), IEEE, pp. 1–6, 2016.

      20. Luo, W., Tay, W.P., Leng, M., Identifying infection sources and regions in large networks. IEEE Trans. Signal Process., 61, 11, 2850–2865, 2013.

      21. Zang, W., Zhang, P., Zhou, C., Guo, L., Discovering multiple diffusion source nodes in social networks. Procedia Comput. Sci., 29, 443–452, 2014.

      22. Mustafa, S. E., & Hamzah, A. Online social networking: A new form of social interaction. International Journal of Social Science and Humanity, 1(2), 96, 2011.

      23. Sofiya, G., Lesser known social media platforms you can use for marketing, 2019, April 2. Retrieved from http://fromdrive.com/blog/lesser-known-social-media-platforms-you-can-use-for-marketing/.

      24. Clement, J., Social media—Statistics, 2019, Sep 4. https://www.statista.com/topics/1164/social-networks/.

      25. Azad, M. M., Mazid, K. N., & Sharmin, S. S. Cyber Crime Problem Areas, Legal Areas and the Cyber Crime Law. International Journal of New Technology and Research, 3(5), 2017.

      26. Stopbullying.gov, What is Cyberbullying?, 2020. Retrieved from https://www.stopbullying.gov.

      27. Halder, D. and Jaishankar, K., Cyber-crime and the victimization of women: laws, rights and regulations, Information Science Reference, Hershey, PA, 2012.

      28. Moore, R., Cybercrime: Investigating high-technology computer crime, Routledge, CRC press, Taylor & Francis group 2014.

      29. Kantarcıoglu, M., Vaidya, J., & Clifton, C. Privacy preserving naive bayes classifier for horizontally partitioned data. In IEEE ICDM workshop on privacy preserving data mining, pp. 3–9, 2003.

      30. Murphy, K.P., Naive Bayes classifiers, vol. 18, p. 60, University of British Columbia, 2006.

      31. Qazvinian, V., Rosengren, E., Radev, D., & Mei, Q. Rumor has it: Identifying misinformation in microblogs. In Proceedings of the 2011 Conference on Empirical Methods in Natural Language Processing pp. 1589–1599, 2011.

СКАЧАТЬ