Skip to main content
Top

2020 | OriginalPaper | Chapter

How to Prevent Harmful Information Spreading in Social Networks Using Simulation Tools

Authors : Ivan Dmitriev, Elena Zamyatina

Published in: Analysis of Images, Social Networks and Texts

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The paper discusses the problems of preventing harmful information spreading in social Networks. Social networks are widespread nowadays and are used not only for managers and marketers propagation of advertising, promotion of goods, but also by attackers to spread harmful information. Thus, there is a need to counter the attackers. This paper presents simulation tools and several features that contribute to the successful application for modeling social networks and examine different strategies preventing rumors and harmful information spreading. The authors cite an example of a simulation model for identifying intruders in a social network, software tools and the results of simulation experiments.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gubanov, D., Chkhartishvili, A.: A conceptual approach to the analysis of online social networks. Large-Scale Syst. Control (45), 222–236 (2013) Gubanov, D., Chkhartishvili, A.: A conceptual approach to the analysis of online social networks. Large-Scale Syst. Control (45), 222–236 (2013)
2.
go back to reference Davydenko, V.A., Romashkina, G.F., Chukanov, S.N.: Modelirovanie sotsial’nkh setei, pp. 68–79. Vesntik TSU (2005) Davydenko, V.A., Romashkina, G.F., Chukanov, S.N.: Modelirovanie sotsial’nkh setei, pp. 68–79. Vesntik TSU (2005)
3.
go back to reference Zhao, N., Cheng, X., Guo, X.: Impact of information spread and investment behavior on the diffusion of internet investment products. Phys. A 512, 427–436 (2018)CrossRef Zhao, N., Cheng, X., Guo, X.: Impact of information spread and investment behavior on the diffusion of internet investment products. Phys. A 512, 427–436 (2018)CrossRef
4.
go back to reference Zhang, Y., Zhu, J.: Stability analysis of I2S2R rumor spreading model in complex networks. Phys. A 503, 862–881 (2018)MathSciNetCrossRef Zhang, Y., Zhu, J.: Stability analysis of I2S2R rumor spreading model in complex networks. Phys. A 503, 862–881 (2018)MathSciNetCrossRef
5.
go back to reference Zan, Y., Wu, J., Li, P., Yu, Q.: SICR rumor spreading model in complex networks: Counterattack and self-resistance. Phys. A 405, 159–170 (2014)MathSciNetCrossRef Zan, Y., Wu, J., Li, P., Yu, Q.: SICR rumor spreading model in complex networks: Counterattack and self-resistance. Phys. A 405, 159–170 (2014)MathSciNetCrossRef
6.
go back to reference Ilieva, D.: Fake news, telecommunications and information security. Int. J. “Inf. Theor. Appl.” 25(2), 174–181 (2018)MathSciNet Ilieva, D.: Fake news, telecommunications and information security. Int. J. “Inf. Theor. Appl.” 25(2), 174–181 (2018)MathSciNet
7.
go back to reference Yang, D., Liao, X., Shen, H., Cheng, X., Chen, G.: Dynamic node immunization for restraint of harmful information diffusion in social networks. Phys. A 503, 640–649 (2018)CrossRef Yang, D., Liao, X., Shen, H., Cheng, X., Chen, G.: Dynamic node immunization for restraint of harmful information diffusion in social networks. Phys. A 503, 640–649 (2018)CrossRef
8.
go back to reference Bindu, P.V., Thilagam, P.S., Ahuja, D.: Discovering suspicious behavior in multilayer social networks. Comput. Hum. Behav. 73, 568–582 (2017)CrossRef Bindu, P.V., Thilagam, P.S., Ahuja, D.: Discovering suspicious behavior in multilayer social networks. Comput. Hum. Behav. 73, 568–582 (2017)CrossRef
9.
go back to reference Tumbinskaya, M.V.: Protection of information in social networks from social engineering attacks of the attacker. J. Appl. Inform. 12(3(69)), 88–102 (2017) Tumbinskaya, M.V.: Protection of information in social networks from social engineering attacks of the attacker. J. Appl. Inform. 12(3(69)), 88–102 (2017)
10.
go back to reference Filippov, P.B.: Use and implementation of personal data protection in social networks of the Internet. J. Appl. Inform. (2(38)), 71–77 (2012) Filippov, P.B.: Use and implementation of personal data protection in social networks of the Internet. J. Appl. Inform. (2(38)), 71–77 (2012)
11.
go back to reference Dang-Pham, D., Pittayachawan, S., Bruno, V.: Applications of social network analysis in behavioural information security research: concepts and empirical analysis. Comput. Secur. 68, 1–15 (2017)CrossRef Dang-Pham, D., Pittayachawan, S., Bruno, V.: Applications of social network analysis in behavioural information security research: concepts and empirical analysis. Comput. Secur. 68, 1–15 (2017)CrossRef
12.
go back to reference Raigorodskii, A.M.: Proceedings of Moscow Institute of Physics and Technology (State University). In: Random Graph Models and Their Application, pp. 130–140 (2010) Raigorodskii, A.M.: Proceedings of Moscow Institute of Physics and Technology (State University). In: Random Graph Models and Their Application, pp. 130–140 (2010)
13.
go back to reference Roth, M., et al.: Suggesting friends using the implicit social graph. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, pp. 233–242 (2010) Roth, M., et al.: Suggesting friends using the implicit social graph. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, pp. 233–242 (2010)
14.
go back to reference Buckley, P., Osthus, D.: Popularity based random graph models leading to a scale-free degree sequence. Discrete Math. 282(1–3), 53–68 (2004)MathSciNetCrossRef Buckley, P., Osthus, D.: Popularity based random graph models leading to a scale-free degree sequence. Discrete Math. 282(1–3), 53–68 (2004)MathSciNetCrossRef
15.
go back to reference Watts, D., Strogatz, S.: Collective dynamics of ‘small-world’ networks. Nature 393, 440–442 (1998)CrossRef Watts, D., Strogatz, S.: Collective dynamics of ‘small-world’ networks. Nature 393, 440–442 (1998)CrossRef
16.
go back to reference Kumar, R., Raghavan, P., Rajagopalan, S., Sivakumar, D., Tomkins, A., Upfal, E.: Stochastic models for the web graph. In: Proceedings of the 41st Symposium on Foundations of Computer Science, p. 57 (2000) Kumar, R., Raghavan, P., Rajagopalan, S., Sivakumar, D., Tomkins, A., Upfal, E.: Stochastic models for the web graph. In: Proceedings of the 41st Symposium on Foundations of Computer Science, p. 57 (2000)
17.
go back to reference Zhou, C., Lu, W.-X., Zhang, J., Li, L., Hu, Y., Guo, L.: Early detection of dynamic harmful cascades in large-scale networks. J. Comput. Sci. 28, 304–317 (2018)MathSciNetCrossRef Zhou, C., Lu, W.-X., Zhang, J., Li, L., Hu, Y., Guo, L.: Early detection of dynamic harmful cascades in large-scale networks. J. Comput. Sci. 28, 304–317 (2018)MathSciNetCrossRef
18.
go back to reference Zhukov, D., Khvatova, T., Lesko, S., Zaltcman, A.: Managing social networks: applying the percolation theory methodology to understand individuals’ attitudes and moods. Technol. Forecast. Soc. Chang. 129, 297–307 (2018)CrossRef Zhukov, D., Khvatova, T., Lesko, S., Zaltcman, A.: Managing social networks: applying the percolation theory methodology to understand individuals’ attitudes and moods. Technol. Forecast. Soc. Chang. 129, 297–307 (2018)CrossRef
19.
go back to reference Abramov, K.G.: Modeli ugrozy rasprostraneniya zapreshchennoi informatsii v informatsionno-telekommunikatsionnykh setyakh., Vladimir (2014) Abramov, K.G.: Modeli ugrozy rasprostraneniya zapreshchennoi informatsii v informatsionno-telekommunikatsionnykh setyakh., Vladimir (2014)
21.
go back to reference Kang, H., Munoz, D.: A dynamic network analysis approach for evaluating knowledge dissemination in a multi-disciplinary collaboration network in obesity research. In: Proceedings of the 2015 Winter Simulation Conference, Huntington Beach, pp. 1319–1330 (2015) Kang, H., Munoz, D.: A dynamic network analysis approach for evaluating knowledge dissemination in a multi-disciplinary collaboration network in obesity research. In: Proceedings of the 2015 Winter Simulation Conference, Huntington Beach, pp. 1319–1330 (2015)
23.
go back to reference Zamyatina, E.B., Mikov, A.I., Mikheev, R.A.: TRIADNS computer networks simulator linguistic and intelligent tools. Int. J. “Inf. theor. Appl.” (IJ ITA) 19(4), 355–368 (2012) Zamyatina, E.B., Mikov, A.I., Mikheev, R.A.: TRIADNS computer networks simulator linguistic and intelligent tools. Int. J. “Inf. theor. Appl.” (IJ ITA) 19(4), 355–368 (2012)
24.
go back to reference Zamyatina, E.B., Mikov, A.I.: Programmnye sredstva sistemy imitatsii Triad.Net dlya obespecheniya ee adaptiruemosti i otkrytosti. Informatizatsiya i svyaz (5), 130–133 (2012) Zamyatina, E.B., Mikov, A.I.: Programmnye sredstva sistemy imitatsii Triad.Net dlya obespecheniya ee adaptiruemosti i otkrytosti. Informatizatsiya i svyaz (5), 130–133 (2012)
25.
go back to reference Mikov, A.I.: Formal method for design of dynamic objects and its implementation in CAD systems. In: Gero, J.S., Sudweeks F. (eds.) Advances in Formal Design Methods for CAD, Preprints of the IFIP WG 5.2 Workshop on Formal Design Methods for Computer-Aided Design, Mexico, pp. 105–127 (1995) Mikov, A.I.: Formal method for design of dynamic objects and its implementation in CAD systems. In: Gero, J.S., Sudweeks F. (eds.) Advances in Formal Design Methods for CAD, Preprints of the IFIP WG 5.2 Workshop on Formal Design Methods for Computer-Aided Design, Mexico, pp. 105–127 (1995)
26.
go back to reference Mikov, A.I.: Avtomatizatsiya sinteza mikroprotsessornykh upravlyayushchikh system. Irkutsk University Publ., Irkutsk (1987) Mikov, A.I.: Avtomatizatsiya sinteza mikroprotsessornykh upravlyayushchikh system. Irkutsk University Publ., Irkutsk (1987)
Metadata
Title
How to Prevent Harmful Information Spreading in Social Networks Using Simulation Tools
Authors
Ivan Dmitriev
Elena Zamyatina
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-39575-9_21

Premium Partner