• Aucun résultat trouvé

Вопросы доверия данным социальных сетей (Social Network Data Trust Issues)

N/A
N/A
Protected

Academic year: 2022

Partager "Вопросы доверия данным социальных сетей (Social Network Data Trust Issues)"

Copied!
7
0
0

Texte intégral

(1)

© . .

,

nskv@ipi.ac.ru

!- , !"

, # $%"& '() , ) ! &. * & # $ , # $ , + ! - $!, + ( $ . $, $ &

! ). / ! $"&

! ), #

#) . *%&

$ & ") # ! ) #

#) &!. *+"&

!$) ! ).

1

$, # -$ &

!" $ , +"%

! &$ #& ") , &&& # $ . #- #

& $ #& !",

"# "), - ) , - $+, + $ - .

0 !) , , ) ! &, &&

1 +) !) $) '

"!. / ) ) , +"%

% & &,

#, $ - %&

( - ) ! ).

! ! $ - , & $ &&, +) ,

& 2 ).

* $, # !$

) ! )

# !) $ +, $! $ - ! #!& $!

$ ) ! ).

31 !$ , , $+ ( # . !) &

" 1) $+),

"%& -& - 2( . !!

& +& , # - $"&

!$& ) )

!$ , & 1 ,

# +" $.

0& !& &% &

! ). / !)'

$+ $ 2 +"&

!) .

$ 3 &%( && # !) . / $ 4 "& # & $!

$ , !$

$# . / $

"& '& &

), -& &! !' " - , + )

#) &!, " .

2

3 , $# $!

, ", $+

#. 0 ! ) #

& $ + - ( # ) "%

+ ') - ! + -, +, $+, +(

. / & + !$"&

( %, #

-) , , '& + - . ! &&

-, ' - && - , ( - &" '&.

- +! #

XVII

DAMDID/RCDL’2015 « », !, 13-16 2015

(2)

& &$ - (

&$ ")), $)) ( $, ) -).

0 !$!

!& !, - ('), ' ( -) ' , !,

&$ - !) . # 1 ) ! ) &

$)& !$) . 9 ! , ) ) - ! - !) .

# - ! $#. 9 , ' !$ -, -, -, &&

!". 3) -

&! $ , ) – !",

$&"%-

$! !" , $ $- ".

: ), #, #&

+ !& $ +# $! !"&

- # "). $, "& $ -,

"% # (1- #) &

.

;%( &&& ". * - " $)) () - ")

" $ !- . : # $& #, + -,

$)&, ' $)&,

& - !& &

$!&. -

$) + ! 1 ( " $

$)& &),

$ , "#"% # , - .

, "

#!, &" # ' , ) #",

#"& , # -&&

$#!. +) -)

$" . < $ -

$&" " . 1 # #

$#! # $)& -.

$) # ! ) $! + ! +,

"#& $ )&

, $ &, &, %&.

$! $ ! ) &

% &!!

!$) ) ) .

! # # &&& , # # " &- '& +

# + , $) ' $#,

!') 2( . 91

$ ),

$) # # &

! ! &. $ #(

! 2(

" !'" ! & ).

/ , ) ! &

+ #! ! $#- .

=# #& &

!$&, && &.

: & + &!& $#&

' ) !) ,

"% ( -.

* $ !$

&&& #& &!! !$) , "#"%& + ):

%&, $, %& -

!$). * #

# ' !$) 2 &.

3 & +-

!$& , !' ) ) &" $+!

+, , , -&% # #&

!$).

& !$ ), &

!! ) !$& ,

# () - # ! ! + &

# #) ") .

? ! ) - !&

# '), , - ! &$) +" &$ $) )) !) , - – &$)

&.

? # ') - - #!

$)&, - !$)

%) - !$),

$)&, %&

- !$).

< ) )

$"#& , # #

$-#

. 0& # !$&

(3)

#$ API ) ), &"&, #$

HTTP. & !$) -$ + ). 0&

- !$!&

! +& ) &, "& !$. + ) & + ! -$

% $ +).

3+ $! , #, +

! '"%) 1 &!!" # [1].

$, , ', -&& & ! $ , 2(, $# #, #, , $& &

$ '& ( $#.

3 ! "

3 # #

!$& ! &) [2].

/-, & !) , #) $! ,

!) !" && #! (accuracy)

$). , #! $& + !, & $!

$! "&, "

# ( -$ +"%" !!

. $& - &, '& "& &

#- &&

'& - "), -$ #, + $& 1- # &.

/-, & (+! (reliability)

$), && $ $!

$&. 3 $) ! & !

& # # '). /

# &"%)& !) (+! $) + ! !

& , # & $ $

# $ .

/-!, +) ) # ) &&& ! (validity) $). * # ! : ,

$ & '& () $#,

# -$ .

/ & #! (+! $) ! & #" $ #)"

-'! $), ! $)

& #) -'.

@$, % & .

4 #"

0 ! ), #

$# , "

$# , - ! ! + & ) #

$& - & )

&. 3 ) +

&! & &.

3# $#) $"

) ! ), $& ,

# $.

4.1 !$"

0 ) ! ) #

" -# ! &. /- , - ! #! &,

!$"%" ! . : % -#, $ !$&

. , $+ %! $!

) +) . * - & # $#

$), &$ ! "!,

!$"%& ! &.

/-, -#

) )) !) , ( !$&,

! . 3 ) !

& & , - ! & &$) .

/-!, #!, # # - " #, - " , !$!

!) ! , # !& ) ) . , $, # " ' $!.

4.2 %

3 ) ! ) $ -

$#). @$, , - ! $ & !$&

( $# & & -$

!', # + ! %!" .

*, # , #"

#( . ) ! &,

& ) %),

$) , - ' !& ). +

(4)

+! & - "), +&

#) , $#.

/ $&

" - ,

# . 9# +

) %) ') $# # #(

). #!, #

# - + $ $#!

" $ ", &&! #!) # & &

+-, + ! + ") # !$& $

! #. 3# -

& #! + ) --#) . /

& $ &!

%) - -

!' # ').

/ & $&

& &, #

#! , & (!

%( $ $-$ -, # %& -

! % &,

& $). /&

) & !$) $!, $(&, .

! $

$ ,

& )! -

& . 3!$ ) ) &$ - + +) 1 "

%& #

& &$. <#) ) &

#( &$, !$- )

&.

% &" +

$+, &

) ! &. , !, &$ )

%), ) -) , % &"

") .

4.3 $" "

+ & #( &

(& ##) , ) ! & "

$"& % $#"%&

& [3], # + &! $ ",

" " $" ,

&&"%& ) ).

/ !"

& $ #) & &

!, # &! # . <

-# &, ! &" &&

$!, " , - $!& $.

*% + ) ! &

&&& , # ) & - ) & & & $&

%). 3 %)

!$ ) - ! -#

! & -

) #

! %), #% -

!$ &" # &

#) $ %). * !

$!& ! &

, $-! + - ,

! $)&

! '. / & "

"& ! ) $ ' %& &

+"%- , + & -

$! ! . $, -!

$& (

$+! #& &

'.

0- , - $&

$) ! , &&&

$& &, " # # &. 3 (

&" !" , +- ) ! & – % "

!$) 1) $ ", &$ . , #, #"%) , #! , # #

! !" ".

=, '%) )) ,

!& $! %) () + ) . 3"%

! ) $&

& +) &! # , & # & &.

/ - ! !" & $!

&. + # 1 & #+, , $&

! &, $! #

" % $ $-$

- - &

$!, -$- # $ %.

!$) !'

& & !

& & . : &

$ $!

!' ) ! ), " "

'& - -, &&

'& !) +$, " $+!

(5)

$&! ! ! .

* &

2"% + & ! $ & -+

- - ( + +! #'& # #

!$) ! ). $, & - &

-" " " "#!

"% + ! + . : &

) $ , !! # ,

& "!. = )

&" , $&" $ &, # % !--#

).

4.4 $

3 $ ! )

& #! &

-) ) &!

) ! &.

/ # ) ! ) - &$!

+& ( , -&

& %) ) %& !$). - - -& - ! $#

&!& $ -- -

&.

#( $, $ &

, & %- &, ) !$) - ), &&! "#!

& $.

!$ - ! % +! $! $) ! ).

-'&, - ) ! &, # "#"

- & ) ) !" , $+, !) ). *

!$ ) $" !

!$ . 3 1 &

1#) !$&

&. !$

) ! ), ,

#$ $ #( $), !$ &

! # ,

! # 1 ! ), +& -

&, & &&!

#( $ & "#& $ - ! ).

5 & '

) ! ) (', $ #

#& . / ) ! & +

#!& ) ', - + '. : $&

! ! , +

#! -

#! $. 3 $+

! !') !) -" #- (sampling), $&" ! ) - !) 1 !& ! - , ) [4]. : + & -, # !') # )) !) + )-

!" ! ( + . 0& $ ! ) (

%& '& ) 1 - - #!&.

9 $ +) %) -, ! ) $ + . : +&

&. & '& &

+ ! ( , $&

& $ # .

5.1 %

0& $+ # , #

$ $ $ # ($ 3). & %! ,

# $ , [1]. : $&, -,

! $ $ #, &

#! (+! &

'", -, -%! ,

# , ,

# %!" - .

0 $ ) ! ) $ +! ,

&$ &!!" ( !$).

!, &! ! !

$), 1-

$)& + &!, , + !$" $! . $ !

$! $)&, #$ & # $ $)) . &&

& !$ $)) , -

(6)

$)) , + ! #!

$&.

-) , !", " !

$)&, $ +!

") $),

&& 2! &

$)& - .

/ , " !$) #% & 2

$)&,

$)) !$& – 2 ' . 31 +

& ! $ ,

$! &"&

!$& ) ! ),

$ & .

5.2 &(

9 " $)& + , , %&

$) -" " &!!

) ! &, & ' ") &

&. 3!$ "

! &$ - -,

$)" ! !') #!"

&$ $) [5]. !

" $)) +, ,

% ! - !

&$) [6].

$)& &" ) )& !$) '"

-, "% -

!. 9#

$)) $& $#! !',

# [7].

%!" - $

!$) ) ! #$ HTTP

$+ &. ) $& !

) ( # +!), # $))

!$&. * + !$!&

$ & - ! ), !& !$) ,

"% ! +.

3 $)), $ + + - ), &"%

# : #, $

%"% &$),

% - $&.

; !- & & !'"

, & $ !

$ # "

& # ) &, - )& ") , +% &,

$ $ . ; +

& $!

), "& ) + ) , # !- .

$ & # ! ) $&$ ') - $#, $ -, $ ), !$& ,

$ && , ,

! )- &!

.

3 $ & - $"

. 0&

'& 1 + - - !) ,

#"% ( #(

$ ) + . 5.3

*! ) & && & !$), +! , !!

- . 0&

'& # $) &

! ) +! & + [8]. 0 $ $& # " %

!'" ! & + $+

# .

+& - "#!, !- -# - , $#! # , )! , --#

, - , #&

# - + . 3 #

& !$&

+ $"& $ &

& , ,

!, # && + , "% .

5.4!

9 1 , 1 $ + ! & # & -, # !! $+

&$" &!!.

!" $& ,

& , &

! !$)

(7)

- ) ) ! & $' - $!

+ ! #( $),

! %"% $ !

!$), &!

+& & # [9].

3 #-, $! )

&! ! & &&&

+ # ' + $. $-$ ! #(

$) &$) && - &

( . !$

"& ! $, #

$! " !!. * -" + & !

#, + + +, , $+( $.

9! + #( $)

! ") $& $' + &.

3! #( $ & '&

! $" - - # -. @ &&"& &$, (& ! !

"!. 31 ' &

"#& - &&& , ) && %.

%, +% ',

"& !, +%

' – ! [10].

6 )("

3() $ &

& , # $ ) ! ). - + ! , # -# ) ) " + #&.

) #( &&

$!, #, # +- $

$( & #"% ") $ -#- . 0& '&

& ) ! )

& !$!

, ), "&, ! #, ! &

#, +! +&.

*

[1] F. Abdesslem, I. Parris, T. Henderson. Reliable online social network data collection //

Computational Social Networks. – Springer London, 2012. – P. 183-210.

[2] S. Wasserman, K. Faust. Social Network Analysis:

Methods and Applications. – Cambridge

University Press, 1994. – 825 p. – ISBN:

9780521387071.

[3] F. Conrad, M. Schober, C. Lampe, J. Pasek, L.

Guggenheim. Can analyses of social media ever replace survey estimates? – 5th sociological conference named by B. A. Grushin “Big sociology: dataspace extension”. – 2015.

[4] M. Gjoka, M. Kurant, C. Butts, A. Markopoulou.

Practical recommendations on crawling online social networks // Selected Areas in

Communications, IEEE Journal on. – 2011. – V.

29. No. 9. – P. 1872-1892.

[5] !) «/ ». – URL: http://ifnm.ru/weight/

[6] C. Wilson, B. Boe, A. Sala, K. Puttaswamy, B.

Zhao. User interactions in social networks and their implications // The 4th ACM European conference on Computer systems. – ACM, 2009. – P. 205-218.

[7] J. Jiang, C. Wilson, X. Wang, W. Sha, P. Huang, Y. Dai, B. Zhao. Understanding latent interactions in online social networks // ACM Transactions on the Web (TWEB). – 2013. – Vol. 7, No. 4. – P.

18:1-39.

[8] G. Barbier, Z. Feng, P. Gundecha, H. Liu.

Provenance data in social media // Synthesis Lectures on Data Mining and Knowledge Discovery. – 2013. – Vol. 4, No. 1. – P. 1-84.

[9] H. Gao, J. Hu, T. Huang, J. Wang, Y. Chen.

Security issues in online social networks // Internet Computing, IEEE. – 2011. – Vol. 15, No. 4. – P.

56-63.

[10] Q. Cao, M. Sirivianos, X. Yang, T. Pregueiro.

Aiding the detection of fake accounts in large- scale social online services // The 9th USENIX conference on Networked Systems Design and Implementation. – USENIX Association, 2012. – P. 197-210.

Social Network Data Trust Issues Nikolay A. Skvortsov

Traditional approaches to social-oriented data acquisition such as interviewing and questionnaires are often replaced with a cheaper web-based and social network data acquisition. However, for a number of reasons analysis of data obtained from the internet may lead to different results than using traditional approaches. Thus the problem of social network data reliability appears. In the paper, specificity of social network data and factors of its dissimilarity from questionnaire data are analyzed. Attention drawn to person behavior analysis as a social network data source and to its difference from public activity. Accessibility issues of social network user behavior are discussed.

Références

Documents relatifs

Cette thèse avait pour objectif principal la détermination des propriétés élastiques et l’étude de l’influence de la morphologie des inclusions/pores sur ces dernières à savoir

Everyday, a user performs multiple roles in different social contexts and present himself in accordance with audience, to model this contextual representation of the user, the

Instagram, younger users change their access control setting more frequently. For instance, 18.09% Instagram users be- tween 11 and 30 years old have changed at least once and

However, the recruitment process in Online Social Networks (OSNs) is much different, because it is made using friend requests. Such a recruitment has three main specificities that

Once the linear programming characterization is provided our goal is to propose an application of the control of the Katz-Bonacich Centrality based on the minimization of a

The aerosol proper- ties in the visible range were characterized using redundant measurements with several instruments to determine the col- umn aerosol optical depth, the

We evaluate an OSN, where software agents represent users for privacy decisions and decide for sharing or not sharing co-owned content, according to our normative decision

Computing those two scores using a set of valued attributes can be a complex process due to the incompleteness and the uncertainty of the used information. For decision making,