Title :
Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach
Author :
Squicciarini, Anna Cinzia ; McGill, William ; Petracca, Giuseppe ; Huang, Shuo
Author_Institution :
Coll. of Inf. Sci. & Technol., Pennsylvania State Univ., PA, USA
Abstract :
One of the main goals of all online social communities is to promote a stable, or perhaps, growing membership built around topics of like interest. Yet, communities are not impermeable to the potentially damaging effects resulting from those few participants that choose to behave in a manner that is counter to established norms of behavior. Typical moderators in online social communities are the ones tasked to reduce the risks associated with unhealthy user behavior by rapidly identifying and removing damaging posts and consequently taking action against the perpetrating user. Yet, the sheer volume of posts relative to the number of moderators available for review suggests a need for modern tools aimed at prioritizing posts based on the assessed risk each user poses to the community. To accomplish this, we propose a threat analysis model. Our model, referred to as TrICO (Threat requires Intent Capability and Opportunity) is implemented using Bayesian Networks, and achieves early detection of damaging behavior in online social communities. To the best of our knowledge, this is the first user-centered model for usage policy enforcement in online sites. We apply our model to a comprehensive data set characterizing the entirety of a popular discussion forum. Our results show that the TrICO model provides accurate results.
Keywords :
belief networks; security of data; social networking (online); user centred design; Bayesian belief network approach; TrICO model; online social communities; policies violations; social media site; threat analysis model; threat requires intent capability and opportunity; unhealthy user behavior; usage policy enforcement; user-centered model; Bayesian methods; Communities; Context; Message systems; Noise measurement; Peer to peer computing; Web 2.0; policy compliance; spam;
Conference_Titel :
Policies for Distributed Systems and Networks (POLICY), 2012 IEEE International Symposium on
Conference_Location :
Chapel Hill, NC
Print_ISBN :
978-1-4673-1993-5
DOI :
10.1109/POLICY.2012.19