Detecting Unexplained Human Behaviors in Social Networks

Author(s):  
F. Amato ◽  
A. De Santo ◽  
V. Moscato ◽  
F. Persia ◽  
A. Picariello
2019 ◽  
Vol 30 (11) ◽  
pp. 1950094 ◽  
Author(s):  
Jianye Yu ◽  
Junjie Lv ◽  
Yuanzhuo Wang ◽  
Jingyuan Li

Information dissemination groups, especially those disseminating the same kind of information such as advertising, product promotion, etc., compete with each other when their information spread on social networks. Most of the existing methods analyze the dissemination mechanism mainly upon the information itself without considering human characteristics, e.g. relation networks, cooperation/defection, etc. In this paper, we introduce a framework of social evolutionary game (SEG) to investigate the influence of human behaviors in competitive information dissemination. Coordination game is applied to represent human behaviors in the competition of asynchronous information diffusion. We perform a series of simulations through a specific game model to analyze the mechanism and factors of information diffusion, and show that when the benefits of competitive information is around 1.2 times of the original one, it can compensate the loss of reputation caused by the change of strategy. Furthermore, through experiments on a dataset of two films on Sina Weibo, we described the mechanism of competition evolution over real data of social network, and validated the effectiveness of our model.


Author(s):  
Yuhi Kaihoko ◽  
Phan Xuan Tan ◽  
Eiji Kamioka

Nowadays, with smartphones people can easily take photos, post photos to any social networks and use the photos for some purposes. This leads to a social problem that unintended appearance in photos may threaten the privacy of photographed person. Some solutions to protect facial privacy in photos have already been proposed. However, most of them rely on different techniques to de-identify photos which can be done only by photographers, giving no choice to photographed person. To deal with that, we propose an approach that allows photographed person to proactively detect whether someone is intentionally/unintentionally trying to take pictures of him/her. Thereby, he/she can have appropriate reaction to protect the privacy. In this approach, we assume that the photographed person uses a wearable camera to record the surrounding environment in real-time. The skeleton information of likely photographers who are captured in the monitoring video is then extracted to be put into the calculation of dynamic programming score which is eventually compared with a threshold for recognition of photo-taking behavior. Experimental results demonstrate that by using the proposed approach, the photo-taking behavior is precisely recognized with high accuracy of 92.5%.


Author(s):  
Mark E. Dickison ◽  
Matteo Magnani ◽  
Luca Rossi

2006 ◽  
Vol 27 (2) ◽  
pp. 108-115 ◽  
Author(s):  
Ana-Maria Vranceanu ◽  
Linda C. Gallo ◽  
Laura M. Bogart

The present study investigated whether a social information processing bias contributes to the inverse association between trait hostility and perceived social support. A sample of 104 undergraduates (50 men) completed a measure of hostility and rated videotaped interactions in which a speaker disclosed a problem while a listener reacted ambiguously. Results showed that hostile persons rated listeners as less friendly and socially supportive across six conversations, although the nature of the hostility effect varied by sex, target rated, and manner in which support was assessed. Hostility and target interactively impacted ratings of support and affiliation only for men. At least in part, a social information processing bias could contribute to hostile persons' perceptions of their social networks.


Sign in / Sign up

Export Citation Format

Share Document