Social Networking
2012年3月26日 星期一
Online Social Network Security
When it comes to security about computers and Internet, we often worried about the hackers stealing information and take advantages of the bugs and careless of people. But it is really different between this two points.
I read the information that from the website that professor recommended and found that the conventional security objectives is the service combined of different characteristics of Authentication ,Access control ,Data confidentiality, Data integrity,Non-repudiation .
What are the social network security objectives? This is quite a different view about the security and we should view that from different points. As mentioned in the lecture, we can see that privacy,integrity and availability are very important for social network security.
By comparing two different security service we find data integrity or integrity is the only wanted in both services and other are not very match to each other. Why would security service have such a difference in the two area? We first have more detail of them.
We now to see the 5 aspects of the conventioanl security. The first is authentication, we have two small parts about that peer entity and data original authentication. Which means that we should know the peer and data are both correct. The second is accsee control, which means that not all the people are allowed to access the souce. The third one is data confidentiality, which is used to describe protection of data from unauthorized disclosure. The forth one is data integrity, as see in the face, we should not allow others to change the data under any circumstances. The last one is non-repudiation, that says we cannot deny what we do in the past.
Then we moved to the social network security, we first see the privacy, this point is needed because in the social network, we have information in the network and do not want any one can see that, I think this point is similar to the point access control but not the same for accsee control is more concerned for damage from the outside. The second is integrity which also mentiond in the conventional security objective, this can also refer to that we should keep our data as a whole and not be changed by others. The last is availability, that is important for we should allow others to see what we want to show, if we cannot guarantee this one, the social network is meaningless. And for other characteres not mentioned, I think due to social network, they are not need for the not-repudiation is useless in the environment of social network security.
Here to give the case about the difference of why there is no authentication in social network security. I think we have the following reasones. Just first imaging a case: we want to accsee others blog and need a password! Does that a useful way? Absolute not, we should allow anyone can access our blog at any time.
So, we should not need the authentication in social network security.
2012年3月13日 星期二
A brief introduction about SNA
In my viewpoint, what called social network analysis can have two ways to describe: one of them is relationships and flows between different entities such as people, groups, organizations, computers, URLs.
Another refers to methods used to analyze social networks, social structures made up of individuals , which are connected by one or more specific types.
Social network analysis views social relationships in terms of network theory consisting of nodes and ties . Nodes are the individual actors within the networks, and ties are the relationships between the actors. In its simplest form, a social network is a map of specified ties, such as friendship, between the nodes being studied. The nodes to which an individual is thus connected are the social contacts of that individual.
Social network analysis provides both a visual and a mathematical analysis of human relationships. In the example, we have the following picture:
So, when it comes to the question in the example, we first briefly describe the simple social network in the following chart:
In the above charts, we have following assumptions:the links between two people means that they knew each other and they cannot knew the other guys if there is no direct link between two. In the chats that 1 means link and 0 is no link which means they do not know each other.
Within the question about who is the most influential point, we can easily see that from the picture and chart that David is, but what is the standard to do the determine?
We have several methods to measure a social network, different methods give us different point of view about that special social network. We learned from the lecture that we have degree, density, geodesic distance and centrality to measure the social network.
According to my opinion, to measure the most influential, the notion of influence range first comes to my mind, to find out whether it is suitable for the question, we have the following about the notion:
Define influence range of ni as the set of actors who are reachable from ni
Define Ji as the number of actors in the influence range of actor i (excluding i itself)
An “improved” actor-level centrality closeness index considers how proximate ni is to the actors in its influence range
A refined closeness centrality (for both directional and nondirectional) is
This index is a ratio of the fraction of the actors in the group who are reachable, to the average distance that these actors are from the actor ni
So, we can easily computing the results in the following chart:
From the result, we take David as the most influence node in this social network.
But we should also keep in mind is that: is it a good way to measure this example in that way? The answer is no!
we have one reason that in this example, we have no distance meaning, so the computing result may have not show the result correctly.
So we turn to other ways to do the research: centrality.
We have three centralities: Degree, Betweenness,Closeness. To define which to use, we first see the differences between them:
Degree Centrality:It signifies activity or popularity
Betweenness Centrality: It is a measure of the potential for control as an actor who is high in “betweenness” is able to act as a gatekeeper controlling the flow of resources (information, money, power, e.g.) between the alters that he or she connects.
Closeness Centrality: Can be understood as how long does it take for a message to spread inside the network from a particular node
Backing to our question, we found that the degree centrality is the best to fit the question, so using this to compute, we have the following results:
What we get the answer is the same form the above but I think this is more reliable than the first one, and we can also use other methods to do the same question, due to the limited time, I think if you are interested, you can do it !
According to the above resulted are obtained, I found the following findings:
1. Different social networks may have different characteristics, if we want to know furture about it, the metheds we use to do the research should follow the special characteristics, though sometimes the results maybe the same.
2.One same social network, using different methods may lead to different results, this is quiet normal.
3.Due to the limition of one social network, some notion of the methods may have no meaning, such as the distance in the example.
4. We can do one research in the social netork by using different assumptions, may have differnet results, this is the same as view one thing in differnet views.
5. As we can easily see that the cutpoint is David and the bridge is the tie between David and Eva, so we can draw a conclusion: the most influence point maybe or near the cutpoint or the bridge.
Reference:
http://www.orgnet.com/sna.html
http://en.wikipedia.org/wiki/Social_network_analysis
Another refers to methods used to analyze social networks, social structures made up of individuals , which are connected by one or more specific types.
Social network analysis views social relationships in terms of network theory consisting of nodes and ties . Nodes are the individual actors within the networks, and ties are the relationships between the actors. In its simplest form, a social network is a map of specified ties, such as friendship, between the nodes being studied. The nodes to which an individual is thus connected are the social contacts of that individual.
So, when it comes to the question in the example, we first briefly describe the simple social network in the following chart:
Alice
|
Bob
|
Carol
|
David
|
Eva
| |
Alice
|
-
|
1
|
1
|
1
|
0
|
Bob
|
1
|
-
|
0
|
1
|
0
|
Carol
|
1
|
0
|
-
|
1
|
0
|
David
|
1
|
1
|
1
|
-
|
1
|
Eva
|
0
|
0
|
0
|
1
|
-
|
Within the question about who is the most influential point, we can easily see that from the picture and chart that David is, but what is the standard to do the determine?
We have several methods to measure a social network, different methods give us different point of view about that special social network. We learned from the lecture that we have degree, density, geodesic distance and centrality to measure the social network.
Define influence range of ni as the set of actors who are reachable from ni
Define Ji as the number of actors in the influence range of actor i (excluding i itself)
An “improved” actor-level centrality closeness index considers how proximate ni is to the actors in its influence range
A refined closeness centrality (for both directional and nondirectional) is
This index is a ratio of the fraction of the actors in the group who are reachable, to the average distance that these actors are from the actor ni
So, we can easily computing the results in the following chart:
Alice
|
0.75
|
Bob
|
0.5
|
Carol
|
0.5
|
David
|
1
|
Eva
|
0.25
|
From the result, we take David as the most influence node in this social network.
But we should also keep in mind is that: is it a good way to measure this example in that way? The answer is no!
we have one reason that in this example, we have no distance meaning, so the computing result may have not show the result correctly.
So we turn to other ways to do the research: centrality.
We have three centralities: Degree, Betweenness,Closeness. To define which to use, we first see the differences between them:
Degree Centrality:It signifies activity or popularity
Betweenness Centrality: It is a measure of the potential for control as an actor who is high in “betweenness” is able to act as a gatekeeper controlling the flow of resources (information, money, power, e.g.) between the alters that he or she connects.
Closeness Centrality: Can be understood as how long does it take for a message to spread inside the network from a particular node
Backing to our question, we found that the degree centrality is the best to fit the question, so using this to compute, we have the following results:
Alice
|
3
|
Bob
|
2
|
Carol
|
2
|
David
|
4
|
Eva
|
1
|
According to the above resulted are obtained, I found the following findings:
1. Different social networks may have different characteristics, if we want to know furture about it, the metheds we use to do the research should follow the special characteristics, though sometimes the results maybe the same.
2.One same social network, using different methods may lead to different results, this is quiet normal.
3.Due to the limition of one social network, some notion of the methods may have no meaning, such as the distance in the example.
4. We can do one research in the social netork by using different assumptions, may have differnet results, this is the same as view one thing in differnet views.
5. As we can easily see that the cutpoint is David and the bridge is the tie between David and Eva, so we can draw a conclusion: the most influence point maybe or near the cutpoint or the bridge.
Reference:
http://www.orgnet.com/sna.html
http://en.wikipedia.org/wiki/Social_network_analysis
2012年2月28日 星期二
Social Multimedia Computing
When I am a college student, major in software engineering, I think Social Multimedia Computing is just calculate the data. After the lecture, I found that there are several views of that, the most wiedly accepted are social computing over multimedia and social-empowered multimedia computing. I want to know furture is that concerned with social multimedia search, how we do that job efficient and the basic algorithm about that. I refer to the Internet and find some relanted books in library to revisit the topic in classes. I found that the most efficient way to find some information is refer to the comments form the Internet, though some of them are not correct.
About the topic of social multimedia computing, refre to one article form website says that "The explosive growth of social multimedia content on the Internet is revolutionizing content distribution and social interaction. It has even led to a new research area, called social multimedia computing. " Form that we can find that the topic is revelent to hugh content about the social multimdia. To fullfill the better preformance about that, we have social multimedia computing.
From my point of view, we should also see that topic form the two ways which we just say above.
The first is "scoial computing over multimedia" which is the one centers on social sciences which focus on using technology and tools to do several enhancements: 1. more powerful social interaction. 2. harveset large-scale digital traces. 3. develop methodolgoies for lage-scale validations of social science theories. 4. study user behavior and social dynamics in multimedia social networks. From the above 4 topics, we can find that the aim is the same as the defintion I found from the website. So, I think that the one part of social multimedia computing is aimed at better calcualtion ability. Let's put this apart for a while, and pay attention to the second view about it, "Social-empowered multimedia computing" which applys knowledge form social studies to design and improve multimedia application and incorporates and exploits social constraints and contextual information to infer the semantics of multimedia content. The second view implys that to have better social multimedia search, we should first do a better job about social multimedia computing.
What I want to konw furture is that according to the social multimedia computing, what we can do to social multimedia search better? The algorithm, data structure and some revelent topics. The picture shows that we have a more and more close over publish, broadcast and compute and I think that computing might be the fisrt thing for us to anlaysis in the future. We have moore law that we can see a bright future about that and we should pay more attention to that for us to do better job about other things. We should combine different parts together to meet the furture challenges.
Reference:
http://www.cs.cmu.edu/~sms/Bass.pdf
http://multimediacommunication.blogspot.com/2011/01/social-media-computing.html
http://www.computer.org/portal/web/csdl/doi/10.1109/MC.2010.188
F.-Y. Wang et al., "Social Computing: From Social Informatics to Social Intelligence," IEEE Intelligent Systems, vol. 22, no. 2, 2007, pp. 79-83.
2012年2月11日 星期六
MSDN
When it comes to social networking, first comes to our mind, out of question, facebook. So before attending this class, I treat facebook equally to social networking. After the first three lectures, I found that I should change my mind that social networking is a huge word and it contains so many things that they are full of our daily life.I learned a lot from the lecture and I just mention some important points below: Firstly, I know the difference between social media, social computing and social networking. Secondly, there are several social experience models. Last but not least, the different levels of cognition.
What I want to know is how social networking will be in future? Will facebook dominating in this area, or several models live together, or some models may disappear?With the above questions, I search the Internet and read some papers also some media from YouTube. Also with this way, I revision about the notions in the lecture better.
What I want to know is how social networking will be in future? Will facebook dominating in this area, or several models live together, or some models may disappear?With the above questions, I search the Internet and read some papers also some media from YouTube. Also with this way, I revision about the notions in the lecture better.
For me, graduated form software engineering, as a programmer, exploring MSDN become my daily job. So I want to talk more about MSDN, the community model of several social experience models.Before attending the class, I just treat MSDN as Online help files and technical literature collection , but I finally found that MSDN have more than that two. It also provides online electronics tutorial, Microsoft Product Downloads, Blog, BBS, MSDN WebCasts,with CMP, MSDN Magazine and so a range of services.Then I went to wikipedia and other websites for further information. The result is that, I just used small part of the MSDN. It is an information service of the Microsoft-oriented software development. We should pay attention that the MSDN is focus on developer. So this is the most outstanding difference between MSND and other models. MSDN focus on developer. So we may have a much smaller user than facebook. It is meaningless to discuss the user number between two. We should pay more attention to that the MSDN has its special area. There is no need to seek large user number, the only thing we need to do is do more professional in this area.
With the supporting of Microsoft, I think MSDN will never worry about money, the only thing to do is do better in its own way. One problem we found that there is no competitor with MSDN, or says in another way, without any outside pressure may lead to a bad circumstance. So I think MSDN can do following changes to fit the future challenge.Firstly, develop some new areas for people who do not have the relevant background. Secondly, collecting videos from universities to share. Last but not least, inviting some developer in microsoft to give speech on-line to share their experience.
Reference:
訂閱:
意見 (Atom)


