Advertisement

Visual Analysis of Information Dissemination Channels in Social Network for Protection Against Inappropriate Content

  • Anton Pronoza
  • Lidia Vitkova
  • Andrey Chechulin
  • Igor Kotenko
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 875)

Abstract

The paper presents an approach to a visual analysis of links in social networks for obtaining information on channels of inappropriate information dissemination. The offered approach is based on the formation of the knowledge base about communication between users and groups, interactive display of propagation paths of inappropriate information and the visual analysis of the received results to detect sources and repeaters of inappropriate information. The interconnections of users and groups in social networks allow the construction of connectivity graphs, and the facts of the transmission of inappropriate information through these channels provide an opportunity to identify the ways of malicious content dissemination. The results of experiments confirming the applicability of the proposed approach are outlined.

Keywords

Social network Visualization Protection against information Inappropriate information Communication graph Visual analytics 

Notes

Acknowledgements

The work is performed by the grant of RSF #18-11-00302 in SPIIRAS.

References

  1. 1.
    Social networks in Russia, summer 2017: figures & trends. https://www.cossa.ru/289/166387/. Accessed 11 Apr 2018
  2. 2.
    Kotenko, I., Chechulin, A., Shorov, A., Komashinsky, D.: Analysis and evaluation of web pages classification techniques for inappropriate content blocking. In: 14th Industrial Conference on Data Mining, LNAI, vol. 8557, pp. 39–54. Springer (2014)Google Scholar
  3. 3.
    Novozhilov, D., Kotenko, I., Chechulin, A.: Improving the categorization of web sites by analysis of html-tags statistics to block inappropriate content. In: 9th International Symposium on Intelligent Distributed Computing, pp. 257–263. Springer (2016)Google Scholar
  4. 4.
    Kotenko, I., Chechulin, A., Komashinsky, D.: Categorisation of web pages for protection against inappropriate content in the internet. Int. J. Internet Protoc. Technol. 10(1), 61–71 (2017)CrossRefGoogle Scholar
  5. 5.
    Zadeh, L., Abbasov, A., Shahbazova, S.: Fuzzy-based techniques in human-like processing of social network data. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 23(Suppl. 1), 1–14 (2015)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Gomzin, A., Kuznetsov, S.: Methods of construction of socio-demographic profiles of Internet users. Program. Comput. Softw. J. 27(4), 129–144 (2015)Google Scholar
  7. 7.
    Drobyshevskiy, M., Korshunov, A., Turdakov, D.: Parallel modularity computation for directed weighted graphs with overlapping communities. Program. Comput. Softw. J. 28(6), 153–170 (2016)Google Scholar
  8. 8.
    Que, F., Rajagopalan, K., Zaman, T.: Penetrating a Social Network: The Follow-back Problem (2018). https://arxiv.org/pdf/1804.02608.pdf. Accessed 15 Apr 2018
  9. 9.
    Opsahl, T., Agneessens, F., Skvoretz, J.: Node centrality in weighted networks: Generalizing degree and shortest paths. Soc. Netw. J. 32(3), 245–251 (2010)CrossRefGoogle Scholar
  10. 10.
    Hickethier, G., Tommelein, I.D., Lostuvali, B.: Social network analysis of information flow in an IPD-project design organization. In: 21th Annual International Group for Lean Construction (2013)Google Scholar
  11. 11.
    Sudhahar, S., Veltri, G., Cristianini, N.: Automated analysis of the US presidential elections using Big Data and network analysis. Big Data Soc. J. 2(1), 1–28 (2015)Google Scholar
  12. 12.
    Paraphrasing and synonymy of text. www.paraphraser.ru. Accessed 15 Apr 2018
  13. 13.
    Kolomeec, M., Chechulin, A., Kotenko, I.: Review of methodological primitives for the phased construction of data visualization model. SPIIRAS Proc. 5, 232–257 (2015)CrossRefGoogle Scholar
  14. 14.
    Kolomeec, M., Chechulin, A., Pronoza, A., Kotenko, I.: Technique of data visualization: Example of network topology display for Security monitoring. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 7(1), 41–57 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Anton Pronoza
    • 1
  • Lidia Vitkova
    • 1
  • Andrey Chechulin
    • 1
  • Igor Kotenko
    • 1
  1. 1.St. Petersburg Institute for Informatics and Automation of the Russian Academy of SciencesSt. PetersburgRussia

Personalised recommendations