1 / 12

Approach to Contain Malinformation in Online Social Networks

Approach to Contain Malinformation in Online Social Networks. Paper by Sriniketh Vijayaraghavan & P. Santhi Thilagam Dept. of Computer Science and Engineering NITK, Surathkal. Presentation by Sriniketh Vijayaraghavan. What are Social Networks?.

nora
Download Presentation

Approach to Contain Malinformation in Online Social Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Approach to Contain Malinformation in Online Social Networks Paper by SrinikethVijayaraghavan & P. SanthiThilagam Dept. of Computer Science and Engineering NITK, Surathkal Presentation by SrinikethVijayaraghavan

  2. What are Social Networks? • Social Networks are a special kind of network in which people represent nodes and their relationship represent links. • Come in various types and sizes. Medieval analysis of powerful Italian families

  3. Snapshot of 1000 friends on Facebook

  4. Information Available Online • Huge amount of data is generated every second online. • Analysis of this data is not possible without use of powerful algorithms. • Data mining and extraction is crucial to reduce the state space and obtain useful information.

  5. Social Networks in Internal Security • Easy to spread false information online. • Rumors spread like wildfire. • Difficult to control content online due to various factors.

  6. Information Diffusion & Modeling • Diffusion process can be modelled mathematically. • Accuracy of this modeling is fairly high. • Allows us to judge the scale of the information flow.

  7. Influence Maximization & Link Prediction • Determining the most influential nodes in the network is NP-Hard. • Determining future links in a social networks is useful to find out favorable propagation environments. • Process of information spread can produce different influencial nodes and future links. i.e. it is a dynamic process.

  8. Problem of Malinformation • Easy to spread malinformation in social networks. • Can affect large portions of the network if suitable propagators are used. • Can influence the thinking of the people in the network and cause mass uproar which is difficult to control.

  9. Proactive and Reactive Measures • Proactive measures involve actively searching for malicious rumors and denying favorable environments for them to propagate. • Reactive measures involve starting a counter campaign to reverse the thinking of the crowd. • A mix of the 2 methods can be the most effective in controlling the spread of malinformation.

  10. Conclusion & Summary • The problem of malinformation in social networks is crucial to internal security as can be seen from various events in the past. • With the advent of social media as the primary information disseminator, a control must be established so as to not spread vile thinking. • Since freedom of speech must not be breached, this problem can only be stopped prematurely at best.

  11. Feel Free to Ask any Questions

  12. Thank You!

More Related