Social Platform

Home » 2015

Yearly Archives: 2015

Rethinking Machine Ethics in the Age of Ubiquitous Technology

As the utilization of intelligent machines spreads to numerous realms, the discourse of machine ethics has also developed and expanded. Concerns over machine intelligence and the role of automata in everyday life must be addressed before artificial intelligence and robotic technologies may be fully integrated into human society.

Rethinking Machine Ethics in the Age of Ubiquitous Technology blends forward-looking, constructive, and interdisciplinary visions of ethical ideals, aims, and applications of machine technology. This visionary reference work incorporates ethical conversations in the fields of technology, computer science, robotics, and the medical industry, creating a vibrant dialogue between philosophical ideals and the applied sciences. With its broad scope of relevant topics, this book serves as an excellent tool for policymakers, academicians, researchers, advanced-level students, technology developers, and government officials.

This timely publication features thoroughly researched articles on the topics of artificial moral agency, cyber-warfare, transhumanism, organic neural nets, human worker replacement, automaticity and global governance, security and surveillance, military drones, and more.

http://www.igi-global.com/book/rethinking-machine-ethics-age-ubiquitous

 

Security and Privacy in Social Networks

Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.

http://www.springer.com/us/book/9781461441380

Privacy Awareness Diffusion in Social Networks

Can everyday social interactions establish and maintain privacy awareness? Game theory and an innovative diffusion model show that privacy awareness can be spread to large populations by taking advantage of individuals’ social-network connections.
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7349080

The Strength of the Strongest Ties in Collaborative Problem Solving

Complex problem solving in science, engineering, and business has become a highly collaborative endeavor. Teams of scientists or engineers collaborate on projects using their social networks to gather new ideas and feedback. Here we bridge the literature on team performance and information networks by studying teams’ problem solving abilities as a function of both their within-team networks and their members’ extended networks. We show that, while an assigned team’s performance is strongly correlated with its networks of expressive and instrumental ties, only the strongest ties in both networks have an effect on performance. Both networks of strong ties explain more of the variance than other factors, such as measured or self-evaluated technical competencies, or the personalities of the team members. In fact, the inclusion of the network of strong ties renders these factors non-significant in the statistical analysis. Our results have consequences for the organization of teams of scientists, engineers, and other knowledge workers tackling today’s most complex problems.

http://www.nature.com/srep/2014/140613/srep05277/full/srep05277.html

A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks

Online social networks (OSNs), which attract thousands of million people to use everyday, greatly extend OSN users’ social circles by friend recommendations. OSN users’ existing social relationship can be characterized as 1-hop trust relationship, and further establish a multi-hop trust chain during the recommendation process. As the same as what people usually experience in the daily life, the social relationship in cyberspaces are potentially formed by OSN users’ shared attributes, e.g., colleagues, family members, or classmates, which indicates the attribute-based recommendation process would lead to more fine-grained social relationships between strangers. Unfortunately, privacy concerns raised in the recommendation process impede the expansion of OSN users’ friend circle. Some OSN users refuse to disclose their identities and their friends’ information to the public domain.

In this paper, we propose a trust-based privacy-preserving friend recommendation scheme for OSNs, where OSN users apply their attributes to find matched friends, and establish social relationships with strangers via a multi-hop trust chain. Based on trace-driven experimental results and security analysis, we have shown the feasibility and privacy preservation of our proposed scheme.

http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6894195

1st International Conference on Social Networking and Computing

Welcome to the 1st International Conference on Social Networking and Computing (MIC-Social 2015). This event is intended to represent a major forum for researchers, engineers and students from all over the world to meet in Milan to present their latest research results and to exchange new ideas and practical experience in the following major areas:
SNMA: Social Network Models and Architectures
SNTA: Social Networking Techniques and Applications
SNIP: Social Network Information Processing
SNSP: Social Network Security and Privacy
SNME: Social Network Management and Economics

http://mosharaka.net/?Cat=Conferences&Pag=ConfHome&Cid=63

First International Workshop on Social Sensing (SocialSens 2015)

Social sensing has emerged as a new paradigm for collecting sensory measurements by means of “crowd-sourcing” sensory data collection tasks to a human population. Humans can act as sensor carriers (e.g., carrying GPS devices that share location data), sensor operators (e.g., taking pictures with smart phones), or as sensors themselves (e.g., sharing their observations on Twitter). The proliferation of sensors in the possession of the average individual, together with the popularity of social networks that allow massive information dissemination, heralds an era of social sensing that brings about new research challenges and opportunities in this emerging field.

http://www3.nd.edu/~dwang5/SocialSens2015/

2nd IEEE WiMob 2015 Workshop on Dynamic Social Networks

Online Social networks (OSNs) are one of the latest revolutions that have taken the world by storm; they are so popular nowadays that people want to use them anytime and everywhere through heterogeneous devices in order to facilitate human interaction as well as creating professional relationships. Their use within vehicles has attracted many companies to develop and to integrate basic social features to navigation applications and services.

http://www.polymtl.ca/dsonets2015/index.html

Developing Churn Models Using Data Mining Techniques and Social Network Analysis

Churn prediction, recognition, and mitigation have become essential topics in various industries. As a means for forecasting and managing risk, further research in this field can greatly assist companies in making informed decisions based on future possible scenarios.
Developing Churn Models Using Data Mining Techniques and Social Network Analysis provides an in-depth analysis of attrition modeling relevant to business planning and management. Through its insightful and detailed explanation of best practices, tools, and theory surrounding churn prediction and the integration of analytics tools, this publication is especially relevant to managers, data specialists, business analysts, academicians, and upper-level students.

ISBN13: 9781466662889

Security Risks in Social Media Technologies: Safe Practices in Public Service Applications

Focusing on the security issues of social media, specifically in the public sector, this book helps readers understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. By Alan Oxley.

ISBN:9781843347149