Table of Contents
Introduction
Overview
Analyzing Social Networks
Securing Social Networks
Outline of the Book
Next Steps
SUPPORTING TECHNOLOGIES
Social Networks: A Survey
Introduction
Survey of Social Networks
Details of Four Popular Social Networks
Summary and Conclusion
Data Security and Privacy
Overview
Security Policies
Policy Enforcement and Related Issues
Data Privacy
Summary and Directions
References
Data Mining Techniques
Introduction
Overview of Data Mining Tasks and Techniques
Artificial Neural Networks
Support Vector Machines
Markov Model
Association Rule Mining (ARM)
Multiclass Problem
Image Mining
Summary
References
Cloud Computing and Semantic Web Technologies
Introduction
Cloud Computing
Semantic Web
Semantic Web and Security
Cloud Computing Frameworks Based on Semantic Web Technologies
Summary and Directions
References
ASPECTS OF ANALYZING AND SECURING SOCIAL NETWORKS
Analyzing and Securing Social Networks
Introduction
Applications in Social Media Analytics
Data Mining Techniques for SNA
Security and Privacy
Summary and Directions
References
Semantic Web-Based Social Network Representation and Analysis
Introduction
Social Network Representation
Our Approach to Social Network Analysis
Summary and Directions
Reference
Confidentiality, Privacy, and Trust for Social Media Data
Introduction
Trust, Privacy, and Confidentiality
CPT Framework
Our Approach to Confidentiality Management
Privacy for Social Networks
Trust for Social Networks
Integrated System
CPT within the Context of Social Networks
Summary and Directions
References
TECHNIQUES AND TOOLS FOR SOCIAL NETWORK ANALYTICS
Developments and Challenges in Location Mining
Introduction
Key Aspects of Location Mining
Efforts in Location Mining
Challenges in Location Mining
Geospatial Proximity and Friendship
Our Contributions to Location Mining
Summary and Directions
References
TweetHood: A Social Media Analytics Tool
Introduction
TweetHood
Experiments and Results
Summary and Directions
References
Tweecalization: Location Mining Using Semisupervised Learning
Introduction
Tweecalization
Trustworthiness and Similarity Measure
Experiments and Results
Summary and Directions
References
Tweeque: Identifying Social Cliques for Location Mining
Introduction
Effect of Migration
Temporal Data Mining
Social Clique Identification
Experiments and Results
Location Prediction
Agglomerative Hierarchical Clustering
MapIt: Location Mining from Unstructured Text
Summary and Directions
References
Understanding News Queries with Geo-Content Using Twitter
Introduction
Application of Location Mining and Social Networks for Improving Web Search
Assigning Weights to Tweets
Semantic Similarity
Experiments and Results
Summary and Directions
References
SOCIAL NETWORK ANALYTICS AND PRIVACY CONSIDERATIONS
Our Approach to Studying Privacy in Social Networks
Introduction
Related Work
Definitional Preliminaries
Analysis
Data Gathering
Summary and Directions
References
Classification of Social Networks Incorporating Link Types
Introduction
Related Work
Learning Methods
Experiments
Results
Summary and Directions
References
Extending Classification of Social Networks through Indirect Friendships
Introduction
Related Work and Our Contributions
Definitions
Our Approach
Experiments and Results
Summary and Directions
References
Social Network Classification through Data Partitioning
Introduction
Related Work and Our Contributions
Metrics
Distributed Social Network Classification
Experiments
Summary and Directions
References
Sanitization of Social Network Data for Release to Semitrusted Third Parties
Introduction
Learning Methods on Social Networks
Hiding Private Information
Experiments
Effect of Sanitization on Other Attack Techniques
Effect of Sanitization on Utility
Summary and Directions
References
ACCESS CONTROL AND INFERENCE FOR SOCIAL NETWORKS
Access Control for Social Networks
Introduction
Related Work
Modeling Social Networks Using Semantic Web Technologies
Security Policies for OSNs
Security Policy Specification
Security Rule Enforcement
Summary and Directions
References
Implementation of an Access Control System for Social Networks
Introduction
Security in Online Social Networks
Framework Architecture
Experiments
Summary and Directions
References
Inference Control for Social Media
Overview
Design of an Inference Controller
Inference Control through Query Modification
Application to Social Media Data
Summary and Directions
References
Implementing an Inference Controller for Social Media Data
Overview
Inference and Provenance
Implementation of the Inference Controller
Generators
Use Case: Medical Example
Implementing Constraints
Summary and Directions
References
SOCIAL MEDIA INTEGRATION AND ANALYTICS SYSTEMS
Social Graph Extraction, Integration, and Analysis
Introduction
Entity Extraction and Integration
Ontology-Based Heuristic Reasoning
Graph Analysis
Managing and Querying Large RDF Graphs
Summary and Directions
References
Semantic Web-Based Social Network Integration
Overview
Information Integration in Social Networks
Jena–HBase: A Distributed, Scalable, and Efficient RDF Triple Store
StormRider: Harnessing Storm for Social Networks
Ontology-Driven Query Expansion Using MapReduce Framework
Summary and Directions
References
Experimental Cloud Query Processing System for Social Networks
Introduction
Our Approach
Related Work
Architecture
MapReduce Framework
Results
Summary and Directions
References
Social Networking in the Cloud
Introduction
Foundational Technologies for SNODSOC++
Design of SNODSOC
Toward SNODSOC++
Cloud-Based Social Network Analysis
StormRider: Harnessing Storm for Social Networks
Related Work
Summary and Directions
References
SOCIAL MEDIA APPLICATION SYSTEMS
Graph Mining for Insider Threat Detection
Introduction
Challenges, Related Work, and Our Approach
Graph Mining for Insider Threat Detection
Comprehensive Framework
Summary and Directions
References
Temporal Geosocial Mobile Semantic Web
Introduction
Challenges for a Successful SARO
Supporting Technologies for SARO
Our Approach to Building a SARO System
Conclusion
References
Social Media and Bioterrorism
Introduction
Simulating Bioterrorism through Epidemiology Abstraction
On the Mitigation of Bioterrorism through the Game Theory
Summary and Directions
References
Stream Data Analytics for Multipurpose Social Media Applications
Introduction
Our Premise
Modules of InXite
Other Applications
Related Work
Summary and Directions
References
SECURE SOCIAL MEDIA SYSTEMS
Secure Cloud Query Processing with Relational Data for Social Media
Overview
Related Work
System Architecture
Implementation Details and Results
Summary and Directions
References
Secure Cloud Query Processing for Semantic Web-Based Social Media
Overview
Background
Access Control
System Architecture
Experimental Setup and Results
Summary and Directions
References
Cloud-Centric Assured Information Sharing for Social Networks
Introduction
Design Philosophy
System Design
Related Work
Commercial Developments
Extensions for Social Media Applications
Summary and Directions
References
Social Network Integration and Analysis with Privacy Preservation
Introduction
Social Network Analysis
Limitations of Current Approaches for Privacy-Preserving Social Networks
Privacy Preservation of Social Network Data
Approach by Yang and Thuraisingham
Framework of Information Sharing and Privacy Preservation for Integrating Social Networks
Summary and Directions
References
Attacks on Social Media and Data Analytics Solutions
Introduction
Malware and Attacks
Attacks on Social Media
Data Analytics Solutions
Cloud-Based Malware Detection for Evolving Data Streams
Summary and Directions
References
SECURE SOCIAL MEDIA DIRECTIONS
Unified Framework for Analyzing and Securing Social Media
Overview
Design of Our Framework
Global Social Media Security and Privacy Controller
Summary and Directions
References
Integrity Management and Data Provenance for Social Media
Overview
Integrity, Data Quality, and Provenance
Integrity Management, Cloud Services, and Social Media
Summary and Directions
References
Multilevel Secure Online Social Networks
Introduction
Multilevel Secure Database Management Systems
Multilevel Online Social Networks
Summary and Directions
References
Developing an Educational Infrastructure for Analyzing and Securing Social Media
Introduction
Cybersecurity Education at UTD
Education Program in Analyzing and Securing Social Media
Summary and Directions
References
Summary and Directions
About This Chapter
Summary of This Book
Directions for Analyzing and Securing Social Media
Our Goals for Analyzing and Securing Social Media
Where Do We Go from Here?