social computing and incentivized sharing
DESCRIPTION
Social Computing and Incentivized Sharing. Group Members. UT Dallas Murat Kantarcioglu Alain Bensoussan (UT Dallas) Nathan Berg Bhavani Thuraisingham University of Michigan Lada Adamic UMBC Yelena Yesha Joel Sachs Anupam Joshi Tim Finin UTSA Shouhuai Xu Ravi Sandhu Purdue - PowerPoint PPT PresentationTRANSCRIPT
Social Computing and Incentivized Sharing
Group Members
• UT Dallas• Murat Kantarcioglu• Alain Bensoussan (UT Dallas)• Nathan Berg • Bhavani Thuraisingham
• University of Michigan• Lada Adamic
• UMBC• Yelena Yesha• Joel Sachs• Anupam Joshi • Tim Finin
• UTSA• Shouhuai Xu • Ravi Sandhu
• Purdue• Elisa Bertino • Chris Clifton• Gabriel Ghinita• Ningui Li
social networks & the AISL
SOCIALNETWORKS
UT Dallas
privacy and securityprivacy and security
incentivized sharing
incentivized sharing
information dissemination and filtering
information dissemination and filtering
social networks and information sharing
• distributing information• determining who should receive information
• pulling information• information filtering (e.g. digg, FriendFeed)
• securing information• propagation of trust and distrust (reputation management)• enhance trustworthiness of cryptographic key infrastructure
• incentivizing sharing• individuals more or less likely to share with close contacts
acquiring: novelty and community structure
• data quality/provenance• identify circular intelligence through
proximity in social networks
• temporal & source information can be mapped onto social network
relevancetrustincentive for sharing
novelty
information flow path
individual receiving information
sharing & acquiring: open participation
Knows
Knowledge iN
open participation: information or noise?
Knowledge In ``Knowledge search is like oozing out knowledge in human brains to the Internet. People who know something better than others can present their know-how, skills or knowledge''
NHN CEO Chae Hwi-young
“(It is) the next generation of search… (it) is a kind of collective brain -- a searchable database of everything everyone knows. It's a culture of generosity. The fundamental belief is that everyone knows something.”
-- Eckart Walther (Yahoo Research)
Network analysis can be used to determine expertise
Preferred Helper: ‘just better’
Preferred Helper: ‘best available’
and study competitive information sharing
• Java Forum: asker -> replier• Task CN: submitter -> winner
structure of complex networks• heterogeneous
connectivity and participation
• robustness• connectivity• propagation of
misinformation from compromised nodes
Secure social networks: research goal
• We ask and address the following two questions:• How should we exploit social computing/networks for security
purposes (e.g., assured information sharing)?
• How should we secure social computing/networks?
Security by social computing
• protect cryptographic security
• detect and deter malicious players
• trustworthy and survivable storage
• reputation management
• reliable and secure information dissemination
Security for social computing
• anonymous & accountable social computing
• privacy-preserving social computing
• inferring private data from social connections
• secure incentive mechanisms
• manipulation-resistant social computing
• data quality/provenance
• obscuring identity and connections
prior work
• Secure social networks & privacy:• Network robustness: (poster: Xu et al. “Generalized Epidemic Threshold, with Applications”)• Key signing: “Exploiting social networks for threshold signing” (AsiaCCS'08)• Privacy and trust in information sharing (Kantarcioglu UTDCS-21-08 )
• Information sharing & filtering:• Inferring expertise in Q&A forums (Adamic et al. WWW07&08)• Using social networks to detect conflicts of interest (Joshi et. al: WWW2006, ACM Tweb,
2008)• online information sharing structure (blogs,twitter)
• Adamic (WI 2005,ICWSM07&08)• Finin, Joshi (WebKDD,ICWSM07&08,+ many more)
• data quality and providence (detecting spam blogs) (AAAI 2006,ICWSM07,TREC2006)
• Social and semantic computing:• blending the social & semantic (Sachs AAAI 07 workshop)
current research
• social networks as a filtering & aggregation tool• Yelena Yesha, Lada Adamic, Anupam Joshi, Tim Finin
• understand the role of social networks (e.g. FriendFeed, blogs) in information diffusion
• sentiment analysis and network structure
• security for and from social networks• Shouhuai Xu, Ravi Sandhu
• Understanding properties of social networks under attack
• Using insights to make social computing more robust and secure
• incentivized sharing in social networks• Murat Kantarcioglu, Lada Adamic
• Experiments: effect of social connections on information sharing (peer recognition) and ability to recognize poor information sources
• Social engineering (phishing, etc.)
social networks & the AISL
SOCIALNETWORKS
UT Dallas
privacy and securityprivacy and security
incentivized sharing
incentivized sharing
information dissemination and filtering
information dissemination and filtering