• Title/Summary/Keyword: social graph

Search Result 164, Processing Time 0.023 seconds

A Causality Analysis of Lottery Gambling and Unemployment in Thailand

  • KHANTHAVIT, Anya
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.8
    • /
    • pp.149-156
    • /
    • 2021
  • Gambling negatively affects the economy, and it brings unwanted financial, social, and health outcomes to gamblers. On the one hand, unemployment is argued to be a leading cause of gambling. On the other hand, gambling can cause unemployment in the second-order via gambling-induced poor health, falling productivity, and crime. In terms of significant effects, previous studies were able to establish an association, but not causality. The current study examines the time-sequence and contemporaneous causalities between lottery gambling and unemployment in Thailand. The Granger causality and directed acyclic graph (DAG) tests employ time-series data on gambling- and unemployment-related Google Trends indexes from January 2004 to April 2021 (208 monthly observations). These tests are based on the estimates from a vector autoregressive (VAR) model. Granger causality is a way to investigate causality between two variables in a time series. However, this approach cannot detect the contemporaneous causality among variables that occurred within the same period. The contemporaneous causal structure of gambling and unemployment was identified via the data-determined DAG approach. The use of time-series Google Trends indexes in gambling studies is new. Based on this data set, unemployment is found to contemporaneously cause gambling, whereas gambling Granger causes unemployment. The causalities are circular and last for four months.

A Method to Decide the Number of Additional Edges to Integrate the Communities in Social Network by Using Modularity (모듈래러티를 이용한 소셜 네트워크의 커뮤니티 통합에 필요한 에지 수 결정 방법)

  • Jun, Byung-Hyun;Han, Chi-Geun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.7
    • /
    • pp.101-109
    • /
    • 2013
  • In this paper, a method to decide the number of additional edges to integrate two communities in social network by using modularity is studied. The modularity is a measure to be used to describe the quality of the community. By adding additional edges to the communities, the quality of the communities is enhanced, To integrate two communities, we propose methods to decide the number of additional edges by calculating the modularity. Also, the conditions that the proposed method is valid is investigated in a simple test graph and the efficiency of the proposed method is approved by integrating two communities in Zachary Karate Club network.

Automated Video Clip Creation Using Time-based Social Bookmark Clustering (소셜 북마크의 시간 정보 클러스터링을 이용한 비디오 클립 생성 자동화)

  • Han, Sung-Hee;Lee, Jae-Ho;Kang, Dae-Kap
    • Journal of Broadcast Engineering
    • /
    • v.15 no.1
    • /
    • pp.144-147
    • /
    • 2010
  • Recently the change of content consumption trend activated the social video sharing platform and the video clip itself. There have been intensive interests and efforts to automatically abstract compact and meaningful video clips. In this paper, we propose a method which use the clustering of the bookmark data created by collective intelligence instead of using the video content analysis. The partitional clustering of points in 2-dimensional space derived from the bookmark data make it possible to abstract highlights effectively. The method is enhanced by the 1-dimensional accumulated bookmark count graph. Experiments on the real data from KBS internet service show the effectiveness of the proposed method.

Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph (온라인 소셜 네트워크 그래프에 내포된 시스템-차원 시빌-저항 신뢰도 추출)

  • Kim, Kyungbaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.533-540
    • /
    • 2013
  • Anonymity is the one of main reasons for substantial improvement of Internet. It encourages various users to express their opinion freely and helps Internet based distributed systems vitalize. But, anonymity can cause unexpected threats because personal information of an online user is hidden. Especially, distributed systems are threatened by Sybil attack, where one malicious user creates and manages multiple fake online identities. To prevent Sybil attack, the traditional solutions include increasing the complexity of identity generation and mapping online identities to real-world identities. But, even though the high complexity of identity generation increases the generation cost of Sybil identities, eventually they are generated and there is no further way to suppress their activity. Also, the mapping between online identities and real identities may cause high possibility of losing anonymity. Recently, some methods using online social network to prevent Sybil attack are researched. In this paper, a new method is proposed for extracting a user's system-wide Sybil-resistant trust value by using the properties embedded in online social network graphs. The proposed method can be categorized into 3 types based on sampling and decision strategies. By using graphs sampled from Facebook, the performance of the 3 types of the proposed method is evaluated. Moreover, the impact of Sybil attack on nodes with different characteristics is evaluated in order to understand the behavior of Sybil attack.

Visualization method of User Hierarchy of among SNS users (소셜 네트워크 서비스 사용자의 계층 시각화 방법)

  • Park, Sun;Jeong, Jong-Geun;Yeu, Moo-Song;Lee, Seong-Ro
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1717-1724
    • /
    • 2012
  • Information of social relationship of users on online is useful information for other services such as recommend information of commercial activity. So, there is a lot of studies analysis with connection to visualization of social network. Most of the previous works of visualization focus on representing user's relationship on social network by a complex multi dimension graph. However, this method is difficult to identify the important of relationship to focus on personal user intuitively. In order to resolve above problem, this paper proposes a new visualization method using the user's correlation and user relationship of network node. The proposed method visualizes the hierarchy relationship of users using the internal relation of network reflecting user's message and external relation of network nodes.

Efficient Hop-based Access Control for Private Social Networks (소셜 네트워크에서 프라이버시를 보호하는 효율적인 거리기반 접근제어)

  • Jung, Sang-Im;Kim, Dong-Min;Jeong, Ik-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.505-514
    • /
    • 2012
  • Because people usually establish their online social network based on their offline relationship, the social networks (i.e., the graph of friendship relationships) are often used to share contents. Mobile devices let it easier in these days, but it also increases the privacy risk such as access control of shared data and relationship exposure to untrusted server. To control the access on encrypted data and protect relationship from the server, M. Atallah et al. proposed a hop-based scheme in 2009. Their scheme assumed a distributed environment such as p2p, and each user in it shares encrypted data on their social network. On the other hand, it is very inefficient to keep their relationship private, so we propose an improved scheme. In this paper, among encrypted contents and relationships, some authenticated users can only access the data in distributed way. For this, we adopt 'circular-secure symmetric encryption' first. Proposed scheme guarantees the improved security and efficiency compared to the previous work.

A Graph Layout Algorithm for Scale-free Network (척도 없는 네트워크를 위한 그래프 레이아웃 알고리즘)

  • Cho, Yong-Man;Kang, Tae-Won
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.5_6
    • /
    • pp.202-213
    • /
    • 2007
  • A network is an important model widely used in natural and social science as well as engineering. To analyze these networks easily it is necessary that we should layout the features of networks visually. These Graph-Layout researches have been performed recently according to the development of the computer technology. Among them, the Scale-free Network that stands out in these days is widely used in analyzing and understanding the complicated situations in various fields. The Scale-free Network is featured in two points. The first, the number of link(Degree) shows the Power-function distribution. The second, the network has the hub that has multiple links. Consequently, it is important for us to represent the hub visually in Scale-free Network but the existing Graph-layout algorithms only represent clusters for the present. Therefor in this thesis we suggest Graph-layout algorithm that effectively presents the Scale-free network. The Hubity(hub+ity) repulsive force between hubs in suggested algorithm in this thesis is in inverse proportion to the distance, and if the degree of hubs increases in a times the Hubity repulsive force between hubs is ${\alpha}^{\gamma}$ times (${\gamma}$??is a connection line index). Also, if the algorithm has the counter that controls the force in proportion to the total node number and the total link number, The Hubity repulsive force is independent of the scale of a network. The proposed algorithm is compared with Graph-layout algorithm through an experiment. The experimental process is as follows: First of all, make out the hub that exists in the network or not. Check out the connection line index to recognize the existence of hub, and then if the value of connection line index is between 2 and 3, then conclude the Scale-free network that has a hub. And then use the suggested algorithm. In result, We validated that the proposed Graph-layout algorithm showed the Scale-free network more effectively than the existing cluster-centered algorithms[Noack, etc.].

Exploiting Friend's Username to De-anonymize Users across Heterogeneous Social Networking Sites (이종 소셜 네트워크 상에서 친구계정의 이름을 이용한 사용자 식별 기법)

  • Kim, Dongkyu;Park, Seog
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1110-1116
    • /
    • 2014
  • Nowadays, social networking sites (SNSs), such as Twitter, LinkedIn, and Tumblr, are coming into the forefront, due to the growth in the number of users. While users voluntarily provide their information in SNSs, privacy leakages resulting from the use of SNSs is becoming a problem owing to the evolution of large data processing techniques and the raising awareness of privacy. In order to solve this problem, the studies on protecting privacy on SNSs, based on graph and machine learning, have been conducted. However, examples of privacy leakages resulting from the advent of a new SNS are consistently being uncovered. In this paper, we propose a technique enabling a user to detect privacy leakages beforehand in the case where the service provider or third-party application developer threatens the SNS user's privacy maliciously.

A Study on the social implications of changes in the spatial structure of the Chinese museums since 2000 (2000년 이후 중국 뮤지엄의 공간구조 변화에 관한 사회적 의미 연구)

  • Weng, Ling-Ling;Moon, Jung Mook
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.5
    • /
    • pp.336-342
    • /
    • 2012
  • Chinese society, which maintained the feudal social system, has taken an isolationist policy in response to the Western aggression since $20^{th}$ century. However, in the wake of the Opium War of 1840, China had actively accepted Western culture, not in just politics and economy, but in diverse area of social property. Since these process, the modernization of China had begun and the Chinese museum has been erected and evolved through the process of it. And it can be deducted that the philosophy of socialist society had a considerable influence on the spatial configuration of the Chinese museum since it was at the heart of china's modernization. And another social shift has been made since 2000 that is regarded as the internationalization of China. It brought a new point of de-structuralism to the society since 2000 and it is leading the changes of various areas of culture and arts, including museology in Chinese society. The purpose of this study is to understand what changes have been made to the museums in China since 2000 and how the internationalization of China is engaged with this it, in terms of the spatial structure of a museum. To do this the study examined the spatial changes of the museum in the mathematical approach including Space Syntax tool and it was engaged with the changes of museum type. Throughout the study, it was concluded that spatial structure of museums in china has been changed from structural organization to de-structural one since 2000 of China's internationalization.

  • PDF

Identification of Profane Words in Cyberbullying Incidents within Social Networks

  • Ali, Wan Noor Hamiza Wan;Mohd, Masnizah;Fauzi, Fariza
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.1
    • /
    • pp.24-34
    • /
    • 2021
  • The popularity of social networking sites (SNS) has facilitated communication between users. The usage of SNS helps users in their daily life in various ways such as sharing of opinions, keeping in touch with old friends, making new friends, and getting information. However, some users misuse SNS to belittle or hurt others using profanities, which is typical in cyberbullying incidents. Thus, in this study, we aim to identify profane words from the ASKfm corpus to analyze the profane word distribution across four different roles involved in cyberbullying based on lexicon dictionary. These four roles are: harasser, victim, bystander that assists the bully, and bystander that defends the victim. Evaluation in this study focused on occurrences of the profane word for each role from the corpus. The top 10 common words used in the corpus are also identified and represented in a graph. Results from the analysis show that these four roles used profane words in their conversation with different weightage and distribution, even though the profane words used are mostly similar. The harasser is the first ranked that used profane words in the conversation compared to other roles. The results can be further explored and considered as a potential feature in a cyberbullying detection model using a machine learning approach. Results in this work will contribute to formulate the suitable representation. It is also useful in modeling a cyberbullying detection model based on the identification of profane word distribution across different cyberbullying roles in social networks for future works.