+ All Categories
Home > Education > Social networking&it’s models

Social networking&it’s models

Date post: 27-Jun-2015
Category:
Upload: vishal-raj
View: 205 times
Download: 0 times
Share this document with a friend
Description:
Social Networking -Behind 9/11 Attack
Popular Tags:
62
Social Networking & IT’s Models By JAGDISH.R
Transcript
Page 1: Social networking&it’s models

Social Networking & IT’s ModelsBy

JAGDISH.R

Page 2: Social networking&it’s models

Contents

• Definition• History Of Social Networking.• Analysis of Social Networking.(Kite Network)• Importance Of Social Networking.• Application Of Social networking in 9-11 Attack.• Mathematical Representation.• Literature Survey.• Case Studies.

Page 3: Social networking&it’s models

Definition:

• A Social Networking service is an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people, who, for example, share interests and/or activities

Page 4: Social networking&it’s models

Definition

• The Social networking models are those models that add value to community

environments supporting social networking, and are specifically applicable to the community-driven environments, where users create and share their vocabularies.

Page 5: Social networking&it’s models

History

• The potential for computer networking to facilitate new forms of computer-mediated social interaction was suggested early on. Efforts to support social networks via computer-mediated communication were made in many early online services, including Usenet, ARPANET, LISTSERV, and bulletin board services (BBS)

Page 6: Social networking&it’s models

• Many of these early communities focused on bringing people together to interact with each other through chat rooms, and encouraged users to share personal information and ideas via personal webpages by providing easy-to-use publishing tools and free or inexpensive webspace

Page 7: Social networking&it’s models

• New social networking methods were developed by the end of the 1990s, and many sites began to develop more advanced features for users to find and manage friends.

• . Facebook, launched in 2004, has since become the largest social networking site in the world.Today, it is estimated that there are now over 200 active sites using a wide variety of social networking models

Page 8: Social networking&it’s models
Page 9: Social networking&it’s models

Social Networking Websites

• What are they?

• Tool for:

• Communication

• Expressing interests

• “Nodes and Ties”

• Recent phenomena

• Digg, 2004

• Youtube, 2005

• Myspace, 2003

• Facebook, 2004

Page 10: Social networking&it’s models
Page 11: Social networking&it’s models
Page 12: Social networking&it’s models

Developments

• Third-party applications

• Privacy settings

• Instant messaging

• News feed (Facebook)

• Music (Myspace)

Page 13: Social networking&it’s models

Areas were SN is implemented

• It is Applicable in Marketing.

• It is Applicable in Operations Management.

• No MIS=No Social Network.

• Quality is been accelerating its position in social networks day by day.

• Influence of Operation research in Social Network.

Page 14: Social networking&it’s models

Network

• A Network exists were a group of individuals are involved in interaction.

Page 15: Social networking&it’s models
Page 16: Social networking&it’s models

Decision Making Process

• Strengthening Organizations Strategies.

• To recognize the Leaders.

• Accelerate the level of Competition

Page 17: Social networking&it’s models

MIS IN Social Network

Page 18: Social networking&it’s models
Page 19: Social networking&it’s models

Exercise on SNA: Kite Network

Page 20: Social networking&it’s models

Social Network Analysis We measure Social Network in terms of:

1. Degree Centrality: The number of direct connections a node has. What really matters is where those connections

lead to and how they connect the otherwise unconnected.

2. Betweenness Centrality: A node with high betweenness has great influence over what flows in the network indicating important

links and single point of failure.

3. Closeness Centrality: The measure of closeness of a node which are close to everyone else. The pattern of the direct and indirect ties allows the nodes any other node in the network more quickly

than anyone else. They have the shortest paths to all others.

Page 21: Social networking&it’s models

Exercise on SNA: Kite Network

• Who is the Connecter or Hub in the Network?• Who has control over what flows in the

Network?• Who has best visibility of what is happening in

the Network?• Who are peripheral players? Are they

Important?

Page 22: Social networking&it’s models

SNA and KMS (2)• Short distances transmit information accurately and in a

timely way, while long distances transmit slowly and can distort the information.

• Isolation - People that are not integrated well into a group and therefore, represent both untapped skills and a high likelihood of turnover.

• Highly expert people - Not being utilized appropriately.

• Organizational subgroups or cliques - Can develop their own subcultures and negative attitudes toward other groups.

Page 23: Social networking&it’s models

Kite network Analysis

• Degree Centrality:-• In the kite network above, Diane has the most direct

connections in the network, making hers the most active node in the network. She is a 'connector' or 'hub' in this network. Common wisdom in personal networks is "the more connections, the better." This is not always so. What really matters is where those connections lead to -- and how they connect the otherwise unconnected! Here Diane has connections only to others in her immediate cluster -- her clique. She connects only those who are already connected to each other.

Page 24: Social networking&it’s models
Page 25: Social networking&it’s models

Application of SNA:

• Realizing 9/11 Al- Qaeda Network.• Build a grass roots political campaign. • Determine influential journalists and analysts in the

IT industry. • Map executive's personal network based on email

flows. • Discover the network of Innovators in a regional

economy. • Analyze book selling patterns to position a new book

and many more……

Page 26: Social networking&it’s models

Web Applications of Social Networks

• Analyzing page importance– Page Rank

• Related to recursive in-degree computation– Authorities/Hubs

• Discovering Communities– Finding near-cliques

• Analyzing Trust– Propagating Trust– Using propagated trust to fight spam

• In Email• In Web page ranking

Page 27: Social networking&it’s models

Society as a Graph

People are represented as nodes.

Page 28: Social networking&it’s models

People are represented as nodes.

Relationships are represented as edges.

(Relationships may be acquaintanceship, friendship, co-authorship, etc.)

Allows analysis using tools of mathematical graph theory

Society as a Graph

Page 29: Social networking&it’s models

HOW SOCIAL NETWORKING WAS IMPLEMENTED IN 9-11 ATTACK

• Literature Survey • Case StudyThe Black Hole of 9/11

BY DAVID J. ROTHKOPF | AUGUST 29, 2011

Page 30: Social networking&it’s models

19 Hijackers involved in 9-11 Attack And Their Networking

Page 31: Social networking&it’s models

Khalid Sheikh Mohammed

• History• He was born in

Kuwait in 1964.• He is Mechanical

Engineer who graduated from Chowan College in 1986.

• Linked with Osama• Khalid Sheikh Mohammed

was a member of Osama bin Laden's terrorist group al-Qaeda organization, although he lived in Afghanistan, heading alQaeda's propaganda operations from sometime around 1999.

Page 32: Social networking&it’s models
Page 33: Social networking&it’s models
Page 34: Social networking&it’s models

Networking Process!!In late 1998 or early 1999, bin Laden gave approval for Mohammed to go forward with organizing the plot.

Bin Laden was also involved in selecting people to participate in the plot, including choosing Mohamed Atta as the lead hijacker.

Bin Laden had been pressuring KSM (Khalid Sheikh Mohammed) for months to advance the attack date.

Page 35: Social networking&it’s models
Page 36: Social networking&it’s models
Page 37: Social networking&it’s models

Modeling Terrorist NetworksOne of the earliest and mostinfluential maps was developed by Valdis Krebs (Krebs, 2001)

Page 38: Social networking&it’s models
Page 39: Social networking&it’s models

Within one week of the attack, We soon knew there were 19 hijackers, which planes they were on, and which nation's passports they had used to get into America. As more information about the hijackers' past was uncovered I decided to map links of three strengths (and corresponding thickness).

Those living together or attending the same school or the same classes/training would have the strongest ties. Those travelling together and participating in meetings together would have ties of moderate strength and medium thickness.

Finally, those who were recorded as having a single transaction together, or an occasional meeting, and no other ties, I classified as weak ties that were shown with the thinnest links in the network.

Page 40: Social networking&it’s models

Key points!

After one month of investigation it was 'common knowledge' that Mohamed Atta was the ring leader of this conspiracy.

Page 41: Social networking&it’s models
Page 42: Social networking&it’s models

Foot Steps of Atta!

On September 10, 2001, Atta picked up Omari from the Milner Hotel in Boston, Massachusetts, and the two drove their rented Nissan Altima to a Comfort Inn in South Portland, Maine; on the way they were seen getting gasoline at an Exxon Gas Station. They arrived at 5:43 p.m. and spent the night in room 232. While in South Portland, they were seen making two ATM withdrawals, and stopping atWal-Mart. FBI also reported that "two middle-eastern men" were seen in the parking lot of a Pizza Hut

Page 43: Social networking&it’s models

Atta and Omari arrived early the next morning, at 5:40 a.m., at the Portland International Jetport, where they left their rental car in the parking lot and boarded a 6:00 a.m.

Atta (blue shirt) and Omari in the Portland International Jetport in Portland, Maine on the morning of 9/11

Page 44: Social networking&it’s models

*The hijacking began at 8:14 a.m.—15 minutes after the flight departed—when beverage service would be starting. At this time, the pilots stopped responding to air traffic control, and the aircraft began deviating from the planned route. At 8:18 a.m., flight attendants Betty Ong and Madeline Amy Sweeney began making phone calls to American Airlines to report what was happening. Ong provided information about lack of communication with the cockpit, lack of access to the cockpit, and passenger injuries

*At 8:24:38 a.m., a voice believed to be Atta's was heard by air traffic controllers, saying: "We have some planes. Just stay quiet and you will be OK. We are returning to the airport." "Nobody move, everything will be OK. If you try to make any moves you'll endanger yourself and the airplane. Just stay quiet..." "Nobody move please. We are going back to the airport. Don't try to make any stupid moves." The plane's transponder was turned off at 8:28 a.m. At 8:46:40 a.m., Atta crashed the Boeing 767 into the North Tower of the World Trade Center. This was the first aircraft to hit the Twin Towers on the morning of September 11, 2001

Page 45: Social networking&it’s models

Car Dealer Adnan G. El Shukrijumah Linked to 9/11 Hijacker Mohamed

Page 46: Social networking&it’s models
Page 47: Social networking&it’s models
Page 48: Social networking&it’s models
Page 49: Social networking&it’s models

Abstract:-

Social networks are becoming more and more popular with the advent of numerous online social networking services.

In this paper, we explore social rating networks, which record not only social relations but also user ratings for items.

We distinguish two types of user behaviour: adopting an item and adopting a rating value for that item. We propose models to analyze and measure the influence of neighbours on bothitem and rating adoption behaviour of users.

Page 50: Social networking&it’s models

• The main contributions of this paper are as follows:

• We analyze the effect of social influence and correlation influence on item adoption and rating adoption in the Flixster and the Epinions dataset (section IV).

• We present models for item and rating adoption, based on so-called influence coefficients (section V.A), and for the actual rating behaviour of users, based on their neighbours' ratings (section V.B).

Page 51: Social networking&it’s models

• We introduce the concept of social authority of individual users and a way to inject social authority into a recommender to improve the accuracy of recommendation in social networks (section VII).

Page 52: Social networking&it’s models

CONCLUSIONSocial networks are becoming more and more popular with the advent of numerous social networking services online such as Facebook, MySpace, Flixster, etc. whichallow complex interactions among users.

In this paper we focused on social rating networks: social networks in which users can express ratings on items. We explored the effect of social and correlation influence on the behaviour of users. We analyzed and modelled the item adoption and rating adoption behaviour in social and similarity networks.We proposed a simple model for rating behaviour of users. Our experiments on Epinions and Flixster demonstrated that the influence coefficients in social networks are higher than those in similarity networks.

Page 53: Social networking&it’s models

Literature Survey-2• Seeking New Social Networking Models

How applications will adapt to the upcoming network bandwidth perimeters and impact the Social Web topology.

Page 54: Social networking&it’s models

• Abstract:- The Web is rapidly evolving form a human-to-machineto a human-to-human communication means.

Unfortunately the current proliferation of Social Networking Web sites isgenerating fragmentation and lack of interoperability.

In order to be in contact with friends users must be subscribed and upload their contents to the same online Social networking provider.

In this paper we propose a concrete alternative to the current state of the art: overcoming vertical silos' approach and enabling open, distributed and Context Aware Social Networking being respectful of users’ privacy and data ownership. Telecom Italia is investing in this research area within EU FP7 projectSOCIETIES.

Page 55: Social networking&it’s models

INTRODUCTION

• Despite the increasing success of the current isolated online Social Networking initiatives, several concerns are intrinsic to this mechanism data ownership.

• In addition to that, the upcoming NGAN (Next generation access network) is promising a symmetric link of 100 Mb it to residential customer’s premises.

Page 56: Social networking&it’s models

• A federated Social Networking platform could therefore permit individuals to be part of the Social Web and securely share their own multimedia resources in a fully distributed manner.

USE CASE: BRIDGING PERSONAL SOCIAL ISLANDS

Page 57: Social networking&it’s models

Accessing smart home contents from the Internet.

Page 58: Social networking&it’s models

CONCLUSIONSTime has come to replace the Social Networking silo approach and unblock novel Social Area Network paradigms

Decentralizing Identity management and profile information will avoid a centralized control and ownership of data.

A Social aware sharing of intelligent devices services may furthermore be seen as a compelling use case for the Internet of Things paradigm.

Page 59: Social networking&it’s models

Refrences• Del Valle, ST, Hyman, JM, Hethcote, HW, and Eubank, SG. in review. Mixing patterns

between age• groups using social networks.• Dugatkin, LA andWilson, DS. 1991. Rover: a strategy for exploiting cooperators in a patchy

environment.• Am. Nat. 138:687-701.• Fishbein M, Higgins, DL, Rietmeijer, C & Wolitski, RJ. 1999. Community-level HIV

Intervention in• 5 Cities: Final outcome data from the CDC AIDS Community Demonstration Projects.

American• Journal of Public Health, 89(3): 336-345.• Hirshleifer, D and Rasmusen, E. 1989. Cooperation in a repeated Prisoners’ Dilemma with

ostracism.• J. Econ. Behav. Organiz. 12: 87-106.• Hyman, JM, and Stanley, EA. 1988. Using Mathematical Models to Understand the AIDS

epidemic.• Math. Biosci., 90:415-473.

Page 60: Social networking&it’s models
Page 61: Social networking&it’s models
Page 62: Social networking&it’s models

Thanking You


Recommended