Social Platform

Home » 2014 » June

Monthly Archives: June 2014

Discussion Graph Tool

Discussion Graph Tool (DGT) simplifies social media analysis by making it easy to extract high-level features and co-occurrence relationships from raw data. With just 3-4 simple lines of script, you can load your social media data, extract complex features such as mood, gender and location, and generate a graph among arbitrary features. Throughout, DGT automates best-practices, such as tracking the context of relationships.

http://research.microsoft.com/en-us/downloads/a4068438-fe29-417a-b4a9-ab1527ef4d66/default.aspx

 

Collective knowledge systems: Where the Social Web meets the Semantic Web

What can happen if we combine the best ideas from the Social Web and Semantic Web? The Social Web is an ecosystem of participation, where value is created by the aggregation of many individual user contributions. The Semantic Web is an ecosystem of data, where value is created by the integration of structured data from many sources. What applications can best synthesize the strengths of these two approaches, to create a new level of value that is both rich with human participation and powered by well-structured information?

http://www.sciencedirect.com/science/article/pii/S1570826807000583

Harnessing the Power of Social Media and Web Analytics

Presenting research to empower businesses to derive intelligence from social media sites, this book explains how these technological tools have allowed businesses to quantify, understand, and respond to customers conversations about their corporate reputation and brands within online communities.

http://www.igi-global.com/book/harnessing-power-social-media-web

On the Security of Trustee-based Social Authentications

Recently, authenticating users with the help of their friends (i.e., trustee-based social authentication) has been shown to be a promising backup authentication mechanism. A user in this system is associated with a few trustees that were selected from the user’s friends. When the user wants to regain access to the account, the service provider sends different verification codes to the user’s trustees. The user must obtain at least k (i.e., recovery threshold) verification codes from the trustees before being directed to reset his or her password.
In this paper, we provide the first systematic study about the security of trustee-based social authentications. Specifically, we first introduce a novel framework of attacks, which we call forest fire attacks. In these attacks, an attacker initially obtains a small number of compromised users, and then the attacker iteratively attacks the rest of users by exploiting trustee-based social authentications. Then, we construct a probabilistic model to formalize the threats of forest fire attacks and their costs for attackers. Moreover, we introduce various defense strategies. Finally, we apply our framework to extensively evaluate various concrete attack and defense strategies using three real-world social network datasets. Our results have strong implications for the design of more secure trustee-based social authentications.

http://arxiv.org/abs/1402.2699

The End of Shops: Social Buying and the Battle for the Customer

Examining the future of the traditional retailer, this book explores the new buying behaviour of consumers (the new shopping), the evolution of retail (how it used to be, how it is now and what it has to become) and shows what the future for the shop will actually look like.

Collaborative Communication Processes and Decision Making in Organizations

“With a focus on the role of technology in organizational decision-making processes and activities, this comprehensive reference provides academics and management teams with current research in the field of virtual teams in organizations.”

http://www.igi-global.com/book/collaborative-communication-processes-decision-making/75842

Notifications to rule the smartphone interface

When iOS 8 hits, the notification centre is going to be the most important screen in your iPhone. Interactive notifications will spur all sorts of new behaviours. ┬áSome of these will be simple, like the ability to reply to an email or text message. But they’re powerful in that you can do this without quitting whatever you’re already doing. And this interactivity is not just limited to system apps. Third-party developers can take advantage of this new capability as well, so you could comment on something on Facebook, respond to a tweet, or even check in on Foursquare. But others are going to be radical, stuff we haven’t imagined yet. Once developers begin to really harness what interactive notifications can do in iOS 8 — and they will — it’s going to cause one of the most radical changes since third-party apps. With the advent of iOS 8, notifications are the new interface frontier.

http://www.wired.co.uk/news/archive/2014-06/08/notification-centre-phone