Skip to main content

2020 | OriginalPaper | Buchkapitel

How to Prevent Harmful Information Spreading in Social Networks Using Simulation Tools

verfasst von : Ivan Dmitriev, Elena Zamyatina

Erschienen in: Analysis of Images, Social Networks and Texts

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The paper discusses the problems of preventing harmful information spreading in social Networks. Social networks are widespread nowadays and are used not only for managers and marketers propagation of advertising, promotion of goods, but also by attackers to spread harmful information. Thus, there is a need to counter the attackers. This paper presents simulation tools and several features that contribute to the successful application for modeling social networks and examine different strategies preventing rumors and harmful information spreading. The authors cite an example of a simulation model for identifying intruders in a social network, software tools and the results of simulation experiments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gubanov, D., Chkhartishvili, A.: A conceptual approach to the analysis of online social networks. Large-Scale Syst. Control (45), 222–236 (2013) Gubanov, D., Chkhartishvili, A.: A conceptual approach to the analysis of online social networks. Large-Scale Syst. Control (45), 222–236 (2013)
2.
Zurück zum Zitat Davydenko, V.A., Romashkina, G.F., Chukanov, S.N.: Modelirovanie sotsial’nkh setei, pp. 68–79. Vesntik TSU (2005) Davydenko, V.A., Romashkina, G.F., Chukanov, S.N.: Modelirovanie sotsial’nkh setei, pp. 68–79. Vesntik TSU (2005)
3.
Zurück zum Zitat Zhao, N., Cheng, X., Guo, X.: Impact of information spread and investment behavior on the diffusion of internet investment products. Phys. A 512, 427–436 (2018)CrossRef Zhao, N., Cheng, X., Guo, X.: Impact of information spread and investment behavior on the diffusion of internet investment products. Phys. A 512, 427–436 (2018)CrossRef
4.
Zurück zum Zitat Zhang, Y., Zhu, J.: Stability analysis of I2S2R rumor spreading model in complex networks. Phys. A 503, 862–881 (2018)MathSciNetCrossRef Zhang, Y., Zhu, J.: Stability analysis of I2S2R rumor spreading model in complex networks. Phys. A 503, 862–881 (2018)MathSciNetCrossRef
5.
Zurück zum Zitat Zan, Y., Wu, J., Li, P., Yu, Q.: SICR rumor spreading model in complex networks: Counterattack and self-resistance. Phys. A 405, 159–170 (2014)MathSciNetCrossRef Zan, Y., Wu, J., Li, P., Yu, Q.: SICR rumor spreading model in complex networks: Counterattack and self-resistance. Phys. A 405, 159–170 (2014)MathSciNetCrossRef
6.
Zurück zum Zitat Ilieva, D.: Fake news, telecommunications and information security. Int. J. “Inf. Theor. Appl.” 25(2), 174–181 (2018)MathSciNet Ilieva, D.: Fake news, telecommunications and information security. Int. J. “Inf. Theor. Appl.” 25(2), 174–181 (2018)MathSciNet
7.
Zurück zum Zitat Yang, D., Liao, X., Shen, H., Cheng, X., Chen, G.: Dynamic node immunization for restraint of harmful information diffusion in social networks. Phys. A 503, 640–649 (2018)CrossRef Yang, D., Liao, X., Shen, H., Cheng, X., Chen, G.: Dynamic node immunization for restraint of harmful information diffusion in social networks. Phys. A 503, 640–649 (2018)CrossRef
8.
Zurück zum Zitat Bindu, P.V., Thilagam, P.S., Ahuja, D.: Discovering suspicious behavior in multilayer social networks. Comput. Hum. Behav. 73, 568–582 (2017)CrossRef Bindu, P.V., Thilagam, P.S., Ahuja, D.: Discovering suspicious behavior in multilayer social networks. Comput. Hum. Behav. 73, 568–582 (2017)CrossRef
9.
Zurück zum Zitat Tumbinskaya, M.V.: Protection of information in social networks from social engineering attacks of the attacker. J. Appl. Inform. 12(3(69)), 88–102 (2017) Tumbinskaya, M.V.: Protection of information in social networks from social engineering attacks of the attacker. J. Appl. Inform. 12(3(69)), 88–102 (2017)
10.
Zurück zum Zitat Filippov, P.B.: Use and implementation of personal data protection in social networks of the Internet. J. Appl. Inform. (2(38)), 71–77 (2012) Filippov, P.B.: Use and implementation of personal data protection in social networks of the Internet. J. Appl. Inform. (2(38)), 71–77 (2012)
11.
Zurück zum Zitat Dang-Pham, D., Pittayachawan, S., Bruno, V.: Applications of social network analysis in behavioural information security research: concepts and empirical analysis. Comput. Secur. 68, 1–15 (2017)CrossRef Dang-Pham, D., Pittayachawan, S., Bruno, V.: Applications of social network analysis in behavioural information security research: concepts and empirical analysis. Comput. Secur. 68, 1–15 (2017)CrossRef
12.
Zurück zum Zitat Raigorodskii, A.M.: Proceedings of Moscow Institute of Physics and Technology (State University). In: Random Graph Models and Their Application, pp. 130–140 (2010) Raigorodskii, A.M.: Proceedings of Moscow Institute of Physics and Technology (State University). In: Random Graph Models and Their Application, pp. 130–140 (2010)
13.
Zurück zum Zitat Roth, M., et al.: Suggesting friends using the implicit social graph. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, pp. 233–242 (2010) Roth, M., et al.: Suggesting friends using the implicit social graph. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, pp. 233–242 (2010)
14.
Zurück zum Zitat Buckley, P., Osthus, D.: Popularity based random graph models leading to a scale-free degree sequence. Discrete Math. 282(1–3), 53–68 (2004)MathSciNetCrossRef Buckley, P., Osthus, D.: Popularity based random graph models leading to a scale-free degree sequence. Discrete Math. 282(1–3), 53–68 (2004)MathSciNetCrossRef
15.
Zurück zum Zitat Watts, D., Strogatz, S.: Collective dynamics of ‘small-world’ networks. Nature 393, 440–442 (1998)CrossRef Watts, D., Strogatz, S.: Collective dynamics of ‘small-world’ networks. Nature 393, 440–442 (1998)CrossRef
16.
Zurück zum Zitat Kumar, R., Raghavan, P., Rajagopalan, S., Sivakumar, D., Tomkins, A., Upfal, E.: Stochastic models for the web graph. In: Proceedings of the 41st Symposium on Foundations of Computer Science, p. 57 (2000) Kumar, R., Raghavan, P., Rajagopalan, S., Sivakumar, D., Tomkins, A., Upfal, E.: Stochastic models for the web graph. In: Proceedings of the 41st Symposium on Foundations of Computer Science, p. 57 (2000)
17.
Zurück zum Zitat Zhou, C., Lu, W.-X., Zhang, J., Li, L., Hu, Y., Guo, L.: Early detection of dynamic harmful cascades in large-scale networks. J. Comput. Sci. 28, 304–317 (2018)MathSciNetCrossRef Zhou, C., Lu, W.-X., Zhang, J., Li, L., Hu, Y., Guo, L.: Early detection of dynamic harmful cascades in large-scale networks. J. Comput. Sci. 28, 304–317 (2018)MathSciNetCrossRef
18.
Zurück zum Zitat Zhukov, D., Khvatova, T., Lesko, S., Zaltcman, A.: Managing social networks: applying the percolation theory methodology to understand individuals’ attitudes and moods. Technol. Forecast. Soc. Chang. 129, 297–307 (2018)CrossRef Zhukov, D., Khvatova, T., Lesko, S., Zaltcman, A.: Managing social networks: applying the percolation theory methodology to understand individuals’ attitudes and moods. Technol. Forecast. Soc. Chang. 129, 297–307 (2018)CrossRef
19.
Zurück zum Zitat Abramov, K.G.: Modeli ugrozy rasprostraneniya zapreshchennoi informatsii v informatsionno-telekommunikatsionnykh setyakh., Vladimir (2014) Abramov, K.G.: Modeli ugrozy rasprostraneniya zapreshchennoi informatsii v informatsionno-telekommunikatsionnykh setyakh., Vladimir (2014)
21.
Zurück zum Zitat Kang, H., Munoz, D.: A dynamic network analysis approach for evaluating knowledge dissemination in a multi-disciplinary collaboration network in obesity research. In: Proceedings of the 2015 Winter Simulation Conference, Huntington Beach, pp. 1319–1330 (2015) Kang, H., Munoz, D.: A dynamic network analysis approach for evaluating knowledge dissemination in a multi-disciplinary collaboration network in obesity research. In: Proceedings of the 2015 Winter Simulation Conference, Huntington Beach, pp. 1319–1330 (2015)
23.
Zurück zum Zitat Zamyatina, E.B., Mikov, A.I., Mikheev, R.A.: TRIADNS computer networks simulator linguistic and intelligent tools. Int. J. “Inf. theor. Appl.” (IJ ITA) 19(4), 355–368 (2012) Zamyatina, E.B., Mikov, A.I., Mikheev, R.A.: TRIADNS computer networks simulator linguistic and intelligent tools. Int. J. “Inf. theor. Appl.” (IJ ITA) 19(4), 355–368 (2012)
24.
Zurück zum Zitat Zamyatina, E.B., Mikov, A.I.: Programmnye sredstva sistemy imitatsii Triad.Net dlya obespecheniya ee adaptiruemosti i otkrytosti. Informatizatsiya i svyaz (5), 130–133 (2012) Zamyatina, E.B., Mikov, A.I.: Programmnye sredstva sistemy imitatsii Triad.Net dlya obespecheniya ee adaptiruemosti i otkrytosti. Informatizatsiya i svyaz (5), 130–133 (2012)
25.
Zurück zum Zitat Mikov, A.I.: Formal method for design of dynamic objects and its implementation in CAD systems. In: Gero, J.S., Sudweeks F. (eds.) Advances in Formal Design Methods for CAD, Preprints of the IFIP WG 5.2 Workshop on Formal Design Methods for Computer-Aided Design, Mexico, pp. 105–127 (1995) Mikov, A.I.: Formal method for design of dynamic objects and its implementation in CAD systems. In: Gero, J.S., Sudweeks F. (eds.) Advances in Formal Design Methods for CAD, Preprints of the IFIP WG 5.2 Workshop on Formal Design Methods for Computer-Aided Design, Mexico, pp. 105–127 (1995)
26.
Zurück zum Zitat Mikov, A.I.: Avtomatizatsiya sinteza mikroprotsessornykh upravlyayushchikh system. Irkutsk University Publ., Irkutsk (1987) Mikov, A.I.: Avtomatizatsiya sinteza mikroprotsessornykh upravlyayushchikh system. Irkutsk University Publ., Irkutsk (1987)
Metadaten
Titel
How to Prevent Harmful Information Spreading in Social Networks Using Simulation Tools
verfasst von
Ivan Dmitriev
Elena Zamyatina
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-39575-9_21

Premium Partner