Unveiling Hidden Patterns to Find Social Relevance
- 1 October 2011
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
Abstract
Twitter is both a useful social networking device and an incredible marketing tool. However, it is also a venue for dangerous stalkers and a sub-world of internet users that most people would intuitively avoid if seeing them in real life. It would improve Twitter's safety to have filters available which would allow users to select an audience for their status updates without being forced into changing their profiles to a private setting. The hypothetical filter, or model, studied in this paper was based on two particular attributes: activity correlations and vocabulary similarities between users and followers. If implemented, this model would restrict the availability of status updates to an automatically generated group of socially relevant followers. The result of this study shows that both of the attributes can be used to define social relevance, however, it was found that activity patterns have better predictive capabilities than correlating vocabulary usage between users and followers.Keywords
This publication has 16 references indexed in Scilit:
- How much do you tell?Published by Association for Computing Machinery (ACM) ,2009
- Inferring private information using social network dataPublished by Association for Computing Machinery (ACM) ,2009
- Designing Privacy into Online CommunitiesSSRN Electronic Journal, 2008
- Characterizing privacy in online social networksPublished by Association for Computing Machinery (ACM) ,2008
- Social phishingCommunications of the ACM, 2007
- Examining privacy and disclosure in a social networking communityPublished by Association for Computing Machinery (ACM) ,2007
- Information revelation and privacy in online social networksPublished by Association for Computing Machinery (ACM) ,2005
- Impacts of User Privacy Preferences on Personalized SystemsHuman–Computer Interaction Series, 2004
- Social and emotional patterns in adulthood: Support for socioemotional selectivity theory.Psychology and Aging, 1992
- The Strength of Weak Ties: A Network Theory RevisitedSociological Theory, 1983