SlideShare ist ein Scribd-Unternehmen logo
1 von 62
Social Networking & IT’s Models
              By
          JAGDISH.R
Contents
•   Definition
•   History Of Social Networking.
•   Analysis of Social Networking.(Kite Network)
•   Importance Of Social Networking.
•   Application Of Social networking in 9-11 Attack.
•   Mathematical Representation.
•   Literature Survey.
•   Case Studies.
Definition:

• A Social Networking service is an online
  service, platform, or site that focuses on
  building and reflecting of social
  networks or social relations among
  people, who, for example, share interests
  and/or activities
Definition
• The Social networking models are those
 models that add value to community
  environments supporting social
  networking, and are specifically applicable to
  the community-driven environments, where
  users create and share their vocabularies.
History
• The potential for computer networking to
  facilitate new forms of computer-mediated
  social interaction was suggested early
  on. Efforts to support social networks via
  computer-mediated communication were
  made in many early online
  services, including Usenet, ARPANET, LISTSERV
  , and bulletin board services (BBS)
• Many of these early communities focused on
  bringing people together to interact with each
  other through chat rooms, and encouraged
  users to share personal information and ideas
  via personal webpages by providing easy-to-
  use publishing tools and free or inexpensive
  webspace
• New social networking methods were developed by
  the end of the 1990s, and many sites began to
  develop more advanced features for users to find
  and manage friends.
• . Facebook, launched in 2004, has since become
  the largest social networking site in the
  world.Today, it is estimated that there are now over
  200 active sites using a wide variety of social
  networking models
Social Networking Websites
• What are they?
   • Tool for:
       • Communication
       • Expressing interests
• “Nodes and Ties”
• Recent phenomena
   • Digg, 2004
   • Youtube, 2005
   • Myspace, 2003
   • Facebook, 2004
Developments




• Third-party applications
• Privacy settings
• Instant messaging
• News feed (Facebook)
• Music (Myspace)
Areas were SN is implemented

• It is Applicable in   • Quality is been
  Marketing.              accelerating its
• It is Applicable in     position in social
  Operations              networks day by day.
  Management.           • Influence of
• No MIS=No Social        Operation research
  Network.                in Social Network.
Network

• A Network exists
  were a group of
  individuals are
  involved in
  interaction.
Decision Making Process
• Strengthening
  Organizations
  Strategies.
• To recognize the
  Leaders.
• Accelerate the level of
  Competition
MIS IN Social Network
Exercise on SNA: Kite Network
Social Network Analysis
       We measure Social Network in terms of:

1. Degree Centrality:
         The number of direct connections a node has. What really matters is where those connections
     lead to and how they connect the otherwise unconnected.
2. Betweenness Centrality:
  A node with high betweenness has great influence over what flows in the network indicating important
     links and single point of failure.
3. Closeness Centrality:
 The measure of closeness of a node which are close to everyone else.
  The pattern of the direct and indirect ties allows the nodes any other node in the network more quickly
      than anyone else. They have the shortest paths to all others.
Exercise on SNA: Kite Network
• Who is the Connecter or Hub in the Network?
• Who has control over what flows in the
  Network?
• Who has best visibility of what is happening in
  the Network?
• Who are peripheral players? Are they
  Important?
SNA and KMS (2)
• Short distances transmit information accurately and in a
  timely way, while long distances transmit slowly and can
  distort the information.

• Isolation - People that are not integrated well into a group
  and therefore, represent both untapped skills and a high
  likelihood of turnover.

• Highly expert people - Not being utilized appropriately.

• Organizational subgroups or cliques - Can develop their own
  subcultures and negative attitudes toward other groups.
Kite network Analysis
• Degree Centrality:-
• In the kite network above, Diane has the most direct
  connections in the network, making hers the most
  active node in the network. She is a 'connector' or
  'hub' in this network. Common wisdom in personal
  networks is "the more connections, the better." This is
  not always so. What really matters is where those
  connections lead to -- and how they connect the
  otherwise unconnected! Here Diane has connections
  only to others in her immediate cluster -- her clique.
  She connects only those who are already connected to
  each other.
Application of SNA:
• Realizing 9/11 Al- Qaeda Network.
• Build a grass roots political campaign.
• Determine influential journalists and analysts in the
  IT industry.
• Map executive's personal network based on email
  flows.
• Discover the network of Innovators in a regional
  economy.
• Analyze book selling patterns to position a new book
  and many more……
Web Applications of Social Networks
• Analyzing page importance
   – Page Rank
      • Related to recursive in-degree computation
   – Authorities/Hubs
• Discovering Communities
   – Finding near-cliques
• Analyzing Trust
   – Propagating Trust
   – Using propagated trust to fight spam
      • In Email
      • In Web page ranking
Society as a Graph
People are represented as
  nodes.
Society as a Graph
People are represented as
  nodes.

Relationships are represented
  as edges.

  (Relationships may be
  acquaintanceship, friendship, co-
  authorship, etc.)


Allows analysis using tools of
   mathematical graph theory
HOW SOCIAL NETWORKING WAS
         IMPLEMENTED IN 9-11 ATTACK
  • Literature Survey           • Case Study
The Black Hole of 9/11



BY DAVID J. ROTHKOPF | AUGUST
29, 2011
19 Hijackers involved in 9-11 Attack
       And Their Networking
Khalid Sheikh Mohammed
• History             • Linked with Osama
                      • Khalid Sheikh
• He was born in        Mohammed was a
  Kuwait in 1964.       member of Osama bin
                        Laden's terrorist
• He is Mechanical      group al-
                        Qaeda organization, alth
  Engineer who          ough he lived
  graduated from        in Afghanistan, heading
                        alQaeda's propaganda o
  Chowan College in     perations from
  1986.                 sometime around 1999.
Networking Process!!
  In late 1998 or early 1999, bin Laden gave
  approval for Mohammed to go forward
  with organizing the plot.
  Bin Laden was also involved in selecting people to
  participate in the plot, including choosing Mohamed
  Atta as the lead hijacker.

 Bin Laden had been pressuring KSM (Khalid Sheikh
Mohammed) for months to advance the attack date.
Modeling Terrorist Networks
One of the earliest and most
influential maps was developed by Valdis
Krebs (Krebs, 2001)
Within one week of the attack, We soon knew there were 19 hijackers, which planes they
were on, and which nation's passports they had used to get into America.
 As more information about the hijackers' past was uncovered I decided to map links of three
strengths (and corresponding thickness).

 Those living together or attending the same school or the same classes/training would have
the strongest ties. Those travelling together and participating in meetings together would
have ties of moderate strength and medium thickness.

Finally, those who were recorded as having a single transaction together, or an occasional
meeting, and no other ties, I classified as weak ties that were shown with the thinnest links in
the network.
Key points!
After one month of investigation it was
'common knowledge' that Mohamed Atta
was the ring leader of this conspiracy.
Foot Steps of Atta!
On September 10, 2001, Atta picked up Omari from the Milner Hotel
in Boston, Massachusetts, and the two drove their rented Nissan Altima to a Comfort
Inn in South Portland, Maine; on the way they were seen getting gasoline at
an Exxon Gas Station. They arrived at 5:43 p.m. and spent the night in room 232.
While in South Portland, they were seen making two ATM withdrawals, and stopping
atWal-Mart. FBI also reported that "two middle-eastern men" were seen in the
parking lot of a Pizza Hut
Atta and Omari arrived early the next morning, at
5:40 a.m., at the Portland International
Jetport, where they left their rental car in the
parking lot and boarded a 6:00 a.m.




                                         Atta (blue shirt) and Omari in
                                         the Portland International
                                         Jetport in Portland, Maine on the
                                         morning of 9/11
*The hijacking began at 8:14 a.m.—15 minutes after the flight departed—when beverage
service would be starting. At this time, the pilots stopped responding to air traffic
control, and the aircraft began deviating from the planned route. At 8:18 a.m., flight
attendants Betty Ong and Madeline Amy Sweeney began making phone calls to American
Airlines to report what was happening. Ong provided information about lack of
communication with the cockpit, lack of access to the cockpit, and passenger injuries

*At 8:24:38 a.m., a voice believed to be Atta's was heard by air traffic controllers, saying:
"We have some planes. Just stay quiet and you will be OK. We are returning to the airport."
"Nobody move, everything will be OK. If you try to make any moves you'll endanger yourself
and the airplane. Just stay quiet..." "Nobody move please. We are going back to the airport.
Don't try to make any stupid moves." The plane's transponder was turned off at 8:28 a.m. At
8:46:40 a.m., Atta crashed the Boeing 767 into the North Tower of the World Trade Center.
This was the first aircraft to hit the Twin Towers on the morning of September 11, 2001
Car Dealer Adnan G. El Shukrijumah Linked to 9/11
Hijacker Mohamed
Abstract:-
 Social networks are becoming more and more popular with the
 advent of numerous online social networking services.

 In this paper, we explore social rating networks, which record not only
 social relations but also user ratings for items.

 We distinguish two types of user behaviour: adopting an item and
 adopting a rating value for that item. We propose models to analyze
 and measure the influence of neighbours on both
 item and rating adoption behaviour of users.
• The main contributions of this paper are as
  follows:
• We analyze the effect of social influence and
  correlation influence on item adoption and
  rating adoption in the Flixster and the Epinions
  dataset (section IV).
• We present models for item and rating
  adoption, based on so-called influence
  coefficients (section V.A), and for the actual
  rating behaviour of users, based on their
  neighbours' ratings (section V.B).
• We introduce the concept of social authority of
  individual users and a way to inject social authority
  into a recommender to improve the accuracy of
  recommendation in social networks (section VII).
CONCLUSION
Social networks are becoming more and more popular with the advent
of numerous social networking services online such as
Facebook, MySpace, Flixster, etc. which
allow complex interactions among users.

 In this paper we focused on social rating networks: social networks in
which users can express ratings on items. We explored the effect of
social and correlation influence on the behaviour of users. We analyzed
and modelled the item adoption and rating adoption behaviour in social
and similarity networks.
We proposed a simple model for rating behaviour of users. Our
experiments on Epinions and Flixster demonstrated that the influence
coefficients in social networks are higher than those in similarity
networks.
Literature Survey-2
 • Seeking New Social Networking Models


How applications will adapt to the upcoming
network bandwidth perimeters and impact the Social
Web topology.
• Abstract:-           The Web is rapidly evolving form a human-to-machine
                       to a human-to-human communication means.


  Unfortunately the current proliferation of Social Networking Web sites is
  generating fragmentation and lack of interoperability.


   In order to be in contact with friends users must be subscribed and
   upload their contents to the same online Social networking provider.


In this paper we propose a concrete alternative to the current state of the art:
overcoming vertical silos' approach and enabling open, distributed and Context
Aware Social Networking being respectful of users’ privacy and data ownership.
Telecom Italia is investing in this research area within EU FP7 project
SOCIETIES.
INTRODUCTION
• Despite the increasing success of the current
  isolated online Social Networking
  initiatives, several concerns are intrinsic to this
  mechanism data ownership.
• In addition to that, the upcoming NGAN (Next
  generation access network) is promising a
  symmetric link of 100 Mb it to residential
  customer’s premises.
• A federated Social Networking platform could
  therefore permit individuals to be part of the
  Social Web and securely share their own
  multimedia resources in a fully distributed
  manner.
 USE CASE: BRIDGING PERSONAL SOCIAL ISLANDS
Accessing smart home contents from the Internet.
CONCLUSIONS
 Time has come to replace the Social Networking silo approach and unblock novel Social
 Area Network paradigms


Decentralizing Identity management and profile information will avoid a centralized
control and ownership of data.




A Social aware sharing of intelligent devices services may furthermore be seen as a
compelling use case for the Internet of Things paradigm.
Refrences
•   Del Valle, ST, Hyman, JM, Hethcote, HW, and Eubank, SG. in review. Mixing
    patterns between age
•   groups using social networks.
•   Dugatkin, LA andWilson, DS. 1991. Rover: a strategy for exploiting cooperators in a
    patchy environment.
•   Am. Nat. 138:687-701.
•   Fishbein M, Higgins, DL, Rietmeijer, C & Wolitski, RJ. 1999. Community-level HIV
    Intervention in
•   5 Cities: Final outcome data from the CDC AIDS Community Demonstration
    Projects. American
•   Journal of Public Health, 89(3): 336-345.
•   Hirshleifer, D and Rasmusen, E. 1989. Cooperation in a repeated Prisoners’
    Dilemma with ostracism.
•   J. Econ. Behav. Organiz. 12: 87-106.
•   Hyman, JM, and Stanley, EA. 1988. Using Mathematical Models to Understand the
    AIDS epidemic.
•   Math. Biosci., 90:415-473.
Thanking You

Weitere ähnliche Inhalte

Was ist angesagt?

Internet censorship
Internet censorshipInternet censorship
Internet censorshipmateo davis
 
Internet (uses,merits and demerits)
Internet (uses,merits and demerits)Internet (uses,merits and demerits)
Internet (uses,merits and demerits)Saba96
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for ChangeTeodoro Llanes II
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationmoralsus
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentationbollmanp
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safetyalandang
 
Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Luca De Biase
 
presentation on internet (power point presentation)
presentation on internet (power point presentation)presentation on internet (power point presentation)
presentation on internet (power point presentation)shaloof shaan
 
The internet-presentation
The internet-presentationThe internet-presentation
The internet-presentationarmilapratiwi
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the WorldNitine
 
Presentation on INTERNET
Presentation on INTERNETPresentation on INTERNET
Presentation on INTERNETSaleh Ibne Omar
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingNicole Black
 
Pros and cons of using internet
Pros and cons of using internetPros and cons of using internet
Pros and cons of using internetnivi88
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Saptarshi Ghosh
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
 
The Social Capital Effects: Resources, Tie Strength, & Digital Divides
The Social Capital Effects: Resources, Tie Strength, & Digital Divides The Social Capital Effects: Resources, Tie Strength, & Digital Divides
The Social Capital Effects: Resources, Tie Strength, & Digital Divides Wenhong Chen
 

Was ist angesagt? (20)

Internet censorship
Internet censorshipInternet censorship
Internet censorship
 
Internet (uses,merits and demerits)
Internet (uses,merits and demerits)Internet (uses,merits and demerits)
Internet (uses,merits and demerits)
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Team rocket presentation
Team rocket presentationTeam rocket presentation
Team rocket presentation
 
Children and Online Safety
Children and Online SafetyChildren and Online Safety
Children and Online Safety
 
Corso pisa-7 dh-2017
Corso pisa-7 dh-2017Corso pisa-7 dh-2017
Corso pisa-7 dh-2017
 
Cyber security issues part a
Cyber security issues  part a Cyber security issues  part a
Cyber security issues part a
 
presentation on internet (power point presentation)
presentation on internet (power point presentation)presentation on internet (power point presentation)
presentation on internet (power point presentation)
 
The internet-presentation
The internet-presentationThe internet-presentation
The internet-presentation
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
Internet
InternetInternet
Internet
 
Presentation on INTERNET
Presentation on INTERNETPresentation on INTERNET
Presentation on INTERNET
 
Pennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud ComputingPennsylvania Rules on Lawyers Using Cloud Computing
Pennsylvania Rules on Lawyers Using Cloud Computing
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
Pros and cons of using internet
Pros and cons of using internetPros and cons of using internet
Pros and cons of using internet
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript051309 Federal Interest And Social Security Metanomics Transcript
051309 Federal Interest And Social Security Metanomics Transcript
 
The Social Capital Effects: Resources, Tie Strength, & Digital Divides
The Social Capital Effects: Resources, Tie Strength, & Digital Divides The Social Capital Effects: Resources, Tie Strength, & Digital Divides
The Social Capital Effects: Resources, Tie Strength, & Digital Divides
 

Andere mochten auch

Political Cartoon appearing in context in Commonsense Political Thinking Book...
Political Cartoon appearing in context in Commonsense Political Thinking Book...Political Cartoon appearing in context in Commonsense Political Thinking Book...
Political Cartoon appearing in context in Commonsense Political Thinking Book...Gerald Furnkranz
 
Hatem El Karnshawy . BSc, PMP, MASCE
Hatem El Karnshawy . BSc, PMP, MASCEHatem El Karnshawy . BSc, PMP, MASCE
Hatem El Karnshawy . BSc, PMP, MASCEenghatem
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Siddharth Kishan
 
văn minh ai cập thời kỳ trung vương quốc
 văn minh ai cập thời kỳ trung vương quốc văn minh ai cập thời kỳ trung vương quốc
văn minh ai cập thời kỳ trung vương quốcthaodang312
 

Andere mochten auch (6)

Political Cartoon appearing in context in Commonsense Political Thinking Book...
Political Cartoon appearing in context in Commonsense Political Thinking Book...Political Cartoon appearing in context in Commonsense Political Thinking Book...
Political Cartoon appearing in context in Commonsense Political Thinking Book...
 
Butterflies of Summer
Butterflies of SummerButterflies of Summer
Butterflies of Summer
 
Hatem El Karnshawy . BSc, PMP, MASCE
Hatem El Karnshawy . BSc, PMP, MASCEHatem El Karnshawy . BSc, PMP, MASCE
Hatem El Karnshawy . BSc, PMP, MASCE
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
Chipmunk trust
Chipmunk trustChipmunk trust
Chipmunk trust
 
văn minh ai cập thời kỳ trung vương quốc
 văn minh ai cập thời kỳ trung vương quốc văn minh ai cập thời kỳ trung vương quốc
văn minh ai cập thời kỳ trung vương quốc
 

Ähnlich wie Social networking&it’s models

2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc SmithMarc Smith
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingCiarán Mc Mahon
 
Social media - enterprise2.0 - course 2010 2011
Social media - enterprise2.0 - course 2010   2011Social media - enterprise2.0 - course 2010   2011
Social media - enterprise2.0 - course 2010 2011guillaume ereteo
 
SOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxSOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxFrancis Dave Mabborang
 
Marc Smith - Charting Collections of Connections in Social Media: Creating Ma...
Marc Smith - Charting Collections of Connections in Social Media: Creating Ma...Marc Smith - Charting Collections of Connections in Social Media: Creating Ma...
Marc Smith - Charting Collections of Connections in Social Media: Creating Ma...Saratoga
 
Social networking sites.
Social networking sites.Social networking sites.
Social networking sites.Jagdeep Gill
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesmatarid
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesnincher
 
How To Write A Visual Analysis Essay Examples Art Analysis Template
How To Write A Visual Analysis Essay Examples Art Analysis TemplateHow To Write A Visual Analysis Essay Examples Art Analysis Template
How To Write A Visual Analysis Essay Examples Art Analysis TemplateKris Cundiff
 
Introduction to Social Networking
Introduction to Social NetworkingIntroduction to Social Networking
Introduction to Social NetworkingHariharan Ganesan
 
1 October 2012
1 October 20121 October 2012
1 October 2012renabivens
 
World Wide Web Presentation
World Wide Web Presentation World Wide Web Presentation
World Wide Web Presentation guttt
 

Ähnlich wie Social networking&it’s models (20)

2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
2010-November-8-NIA - Smart Society and Civic Culture - Marc Smith
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
Social networks v2
Social networks v2Social networks v2
Social networks v2
 
Social media - enterprise2.0 - course 2010 2011
Social media - enterprise2.0 - course 2010   2011Social media - enterprise2.0 - course 2010   2011
Social media - enterprise2.0 - course 2010 2011
 
SOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxSOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptx
 
Why Community Matters
Why Community MattersWhy Community Matters
Why Community Matters
 
Marc Smith - Charting Collections of Connections in Social Media: Creating Ma...
Marc Smith - Charting Collections of Connections in Social Media: Creating Ma...Marc Smith - Charting Collections of Connections in Social Media: Creating Ma...
Marc Smith - Charting Collections of Connections in Social Media: Creating Ma...
 
2_Doc5_2.pdf
2_Doc5_2.pdf2_Doc5_2.pdf
2_Doc5_2.pdf
 
The Role of Social Media in Da'awah
The Role of Social Media in Da'awahThe Role of Social Media in Da'awah
The Role of Social Media in Da'awah
 
Social networking sites.
Social networking sites.Social networking sites.
Social networking sites.
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
 
Social networking
Social networkingSocial networking
Social networking
 
Chapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theoriesChapter 2 cmc, diffusion & theories
Chapter 2 cmc, diffusion & theories
 
How To Write A Visual Analysis Essay Examples Art Analysis Template
How To Write A Visual Analysis Essay Examples Art Analysis TemplateHow To Write A Visual Analysis Essay Examples Art Analysis Template
How To Write A Visual Analysis Essay Examples Art Analysis Template
 
Social network (1)
Social network (1)Social network (1)
Social network (1)
 
Social network
Social networkSocial network
Social network
 
Introduction to Social Networking
Introduction to Social NetworkingIntroduction to Social Networking
Introduction to Social Networking
 
1 October 2012
1 October 20121 October 2012
1 October 2012
 
The Internet and the Rise of a Fifth Estate
The Internet and the Rise of a Fifth EstateThe Internet and the Rise of a Fifth Estate
The Internet and the Rise of a Fifth Estate
 
World Wide Web Presentation
World Wide Web Presentation World Wide Web Presentation
World Wide Web Presentation
 

Kürzlich hochgeladen

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 

Kürzlich hochgeladen (20)

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 

Social networking&it’s models

  • 1. Social Networking & IT’s Models By JAGDISH.R
  • 2. Contents • Definition • History Of Social Networking. • Analysis of Social Networking.(Kite Network) • Importance Of Social Networking. • Application Of Social networking in 9-11 Attack. • Mathematical Representation. • Literature Survey. • Case Studies.
  • 3. Definition: • A Social Networking service is an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people, who, for example, share interests and/or activities
  • 4. Definition • The Social networking models are those models that add value to community environments supporting social networking, and are specifically applicable to the community-driven environments, where users create and share their vocabularies.
  • 5. History • The potential for computer networking to facilitate new forms of computer-mediated social interaction was suggested early on. Efforts to support social networks via computer-mediated communication were made in many early online services, including Usenet, ARPANET, LISTSERV , and bulletin board services (BBS)
  • 6. • Many of these early communities focused on bringing people together to interact with each other through chat rooms, and encouraged users to share personal information and ideas via personal webpages by providing easy-to- use publishing tools and free or inexpensive webspace
  • 7. • New social networking methods were developed by the end of the 1990s, and many sites began to develop more advanced features for users to find and manage friends. • . Facebook, launched in 2004, has since become the largest social networking site in the world.Today, it is estimated that there are now over 200 active sites using a wide variety of social networking models
  • 8.
  • 9. Social Networking Websites • What are they? • Tool for: • Communication • Expressing interests • “Nodes and Ties” • Recent phenomena • Digg, 2004 • Youtube, 2005 • Myspace, 2003 • Facebook, 2004
  • 10.
  • 11.
  • 12. Developments • Third-party applications • Privacy settings • Instant messaging • News feed (Facebook) • Music (Myspace)
  • 13. Areas were SN is implemented • It is Applicable in • Quality is been Marketing. accelerating its • It is Applicable in position in social Operations networks day by day. Management. • Influence of • No MIS=No Social Operation research Network. in Social Network.
  • 14. Network • A Network exists were a group of individuals are involved in interaction.
  • 15.
  • 16. Decision Making Process • Strengthening Organizations Strategies. • To recognize the Leaders. • Accelerate the level of Competition
  • 17. MIS IN Social Network
  • 18.
  • 19. Exercise on SNA: Kite Network
  • 20. Social Network Analysis We measure Social Network in terms of: 1. Degree Centrality: The number of direct connections a node has. What really matters is where those connections lead to and how they connect the otherwise unconnected. 2. Betweenness Centrality: A node with high betweenness has great influence over what flows in the network indicating important links and single point of failure. 3. Closeness Centrality: The measure of closeness of a node which are close to everyone else. The pattern of the direct and indirect ties allows the nodes any other node in the network more quickly than anyone else. They have the shortest paths to all others.
  • 21. Exercise on SNA: Kite Network • Who is the Connecter or Hub in the Network? • Who has control over what flows in the Network? • Who has best visibility of what is happening in the Network? • Who are peripheral players? Are they Important?
  • 22. SNA and KMS (2) • Short distances transmit information accurately and in a timely way, while long distances transmit slowly and can distort the information. • Isolation - People that are not integrated well into a group and therefore, represent both untapped skills and a high likelihood of turnover. • Highly expert people - Not being utilized appropriately. • Organizational subgroups or cliques - Can develop their own subcultures and negative attitudes toward other groups.
  • 23. Kite network Analysis • Degree Centrality:- • In the kite network above, Diane has the most direct connections in the network, making hers the most active node in the network. She is a 'connector' or 'hub' in this network. Common wisdom in personal networks is "the more connections, the better." This is not always so. What really matters is where those connections lead to -- and how they connect the otherwise unconnected! Here Diane has connections only to others in her immediate cluster -- her clique. She connects only those who are already connected to each other.
  • 24.
  • 25. Application of SNA: • Realizing 9/11 Al- Qaeda Network. • Build a grass roots political campaign. • Determine influential journalists and analysts in the IT industry. • Map executive's personal network based on email flows. • Discover the network of Innovators in a regional economy. • Analyze book selling patterns to position a new book and many more……
  • 26. Web Applications of Social Networks • Analyzing page importance – Page Rank • Related to recursive in-degree computation – Authorities/Hubs • Discovering Communities – Finding near-cliques • Analyzing Trust – Propagating Trust – Using propagated trust to fight spam • In Email • In Web page ranking
  • 27. Society as a Graph People are represented as nodes.
  • 28. Society as a Graph People are represented as nodes. Relationships are represented as edges. (Relationships may be acquaintanceship, friendship, co- authorship, etc.) Allows analysis using tools of mathematical graph theory
  • 29. HOW SOCIAL NETWORKING WAS IMPLEMENTED IN 9-11 ATTACK • Literature Survey • Case Study The Black Hole of 9/11 BY DAVID J. ROTHKOPF | AUGUST 29, 2011
  • 30. 19 Hijackers involved in 9-11 Attack And Their Networking
  • 31. Khalid Sheikh Mohammed • History • Linked with Osama • Khalid Sheikh • He was born in Mohammed was a Kuwait in 1964. member of Osama bin Laden's terrorist • He is Mechanical group al- Qaeda organization, alth Engineer who ough he lived graduated from in Afghanistan, heading alQaeda's propaganda o Chowan College in perations from 1986. sometime around 1999.
  • 32.
  • 33.
  • 34. Networking Process!! In late 1998 or early 1999, bin Laden gave approval for Mohammed to go forward with organizing the plot. Bin Laden was also involved in selecting people to participate in the plot, including choosing Mohamed Atta as the lead hijacker. Bin Laden had been pressuring KSM (Khalid Sheikh Mohammed) for months to advance the attack date.
  • 35.
  • 36.
  • 37. Modeling Terrorist Networks One of the earliest and most influential maps was developed by Valdis Krebs (Krebs, 2001)
  • 38.
  • 39. Within one week of the attack, We soon knew there were 19 hijackers, which planes they were on, and which nation's passports they had used to get into America. As more information about the hijackers' past was uncovered I decided to map links of three strengths (and corresponding thickness). Those living together or attending the same school or the same classes/training would have the strongest ties. Those travelling together and participating in meetings together would have ties of moderate strength and medium thickness. Finally, those who were recorded as having a single transaction together, or an occasional meeting, and no other ties, I classified as weak ties that were shown with the thinnest links in the network.
  • 40. Key points! After one month of investigation it was 'common knowledge' that Mohamed Atta was the ring leader of this conspiracy.
  • 41.
  • 42. Foot Steps of Atta! On September 10, 2001, Atta picked up Omari from the Milner Hotel in Boston, Massachusetts, and the two drove their rented Nissan Altima to a Comfort Inn in South Portland, Maine; on the way they were seen getting gasoline at an Exxon Gas Station. They arrived at 5:43 p.m. and spent the night in room 232. While in South Portland, they were seen making two ATM withdrawals, and stopping atWal-Mart. FBI also reported that "two middle-eastern men" were seen in the parking lot of a Pizza Hut
  • 43. Atta and Omari arrived early the next morning, at 5:40 a.m., at the Portland International Jetport, where they left their rental car in the parking lot and boarded a 6:00 a.m. Atta (blue shirt) and Omari in the Portland International Jetport in Portland, Maine on the morning of 9/11
  • 44. *The hijacking began at 8:14 a.m.—15 minutes after the flight departed—when beverage service would be starting. At this time, the pilots stopped responding to air traffic control, and the aircraft began deviating from the planned route. At 8:18 a.m., flight attendants Betty Ong and Madeline Amy Sweeney began making phone calls to American Airlines to report what was happening. Ong provided information about lack of communication with the cockpit, lack of access to the cockpit, and passenger injuries *At 8:24:38 a.m., a voice believed to be Atta's was heard by air traffic controllers, saying: "We have some planes. Just stay quiet and you will be OK. We are returning to the airport." "Nobody move, everything will be OK. If you try to make any moves you'll endanger yourself and the airplane. Just stay quiet..." "Nobody move please. We are going back to the airport. Don't try to make any stupid moves." The plane's transponder was turned off at 8:28 a.m. At 8:46:40 a.m., Atta crashed the Boeing 767 into the North Tower of the World Trade Center. This was the first aircraft to hit the Twin Towers on the morning of September 11, 2001
  • 45. Car Dealer Adnan G. El Shukrijumah Linked to 9/11 Hijacker Mohamed
  • 46.
  • 47.
  • 48.
  • 49. Abstract:- Social networks are becoming more and more popular with the advent of numerous online social networking services. In this paper, we explore social rating networks, which record not only social relations but also user ratings for items. We distinguish two types of user behaviour: adopting an item and adopting a rating value for that item. We propose models to analyze and measure the influence of neighbours on both item and rating adoption behaviour of users.
  • 50. • The main contributions of this paper are as follows: • We analyze the effect of social influence and correlation influence on item adoption and rating adoption in the Flixster and the Epinions dataset (section IV). • We present models for item and rating adoption, based on so-called influence coefficients (section V.A), and for the actual rating behaviour of users, based on their neighbours' ratings (section V.B).
  • 51. • We introduce the concept of social authority of individual users and a way to inject social authority into a recommender to improve the accuracy of recommendation in social networks (section VII).
  • 52. CONCLUSION Social networks are becoming more and more popular with the advent of numerous social networking services online such as Facebook, MySpace, Flixster, etc. which allow complex interactions among users. In this paper we focused on social rating networks: social networks in which users can express ratings on items. We explored the effect of social and correlation influence on the behaviour of users. We analyzed and modelled the item adoption and rating adoption behaviour in social and similarity networks. We proposed a simple model for rating behaviour of users. Our experiments on Epinions and Flixster demonstrated that the influence coefficients in social networks are higher than those in similarity networks.
  • 53. Literature Survey-2 • Seeking New Social Networking Models How applications will adapt to the upcoming network bandwidth perimeters and impact the Social Web topology.
  • 54. • Abstract:- The Web is rapidly evolving form a human-to-machine to a human-to-human communication means. Unfortunately the current proliferation of Social Networking Web sites is generating fragmentation and lack of interoperability. In order to be in contact with friends users must be subscribed and upload their contents to the same online Social networking provider. In this paper we propose a concrete alternative to the current state of the art: overcoming vertical silos' approach and enabling open, distributed and Context Aware Social Networking being respectful of users’ privacy and data ownership. Telecom Italia is investing in this research area within EU FP7 project SOCIETIES.
  • 55. INTRODUCTION • Despite the increasing success of the current isolated online Social Networking initiatives, several concerns are intrinsic to this mechanism data ownership. • In addition to that, the upcoming NGAN (Next generation access network) is promising a symmetric link of 100 Mb it to residential customer’s premises.
  • 56. • A federated Social Networking platform could therefore permit individuals to be part of the Social Web and securely share their own multimedia resources in a fully distributed manner. USE CASE: BRIDGING PERSONAL SOCIAL ISLANDS
  • 57. Accessing smart home contents from the Internet.
  • 58. CONCLUSIONS Time has come to replace the Social Networking silo approach and unblock novel Social Area Network paradigms Decentralizing Identity management and profile information will avoid a centralized control and ownership of data. A Social aware sharing of intelligent devices services may furthermore be seen as a compelling use case for the Internet of Things paradigm.
  • 59. Refrences • Del Valle, ST, Hyman, JM, Hethcote, HW, and Eubank, SG. in review. Mixing patterns between age • groups using social networks. • Dugatkin, LA andWilson, DS. 1991. Rover: a strategy for exploiting cooperators in a patchy environment. • Am. Nat. 138:687-701. • Fishbein M, Higgins, DL, Rietmeijer, C & Wolitski, RJ. 1999. Community-level HIV Intervention in • 5 Cities: Final outcome data from the CDC AIDS Community Demonstration Projects. American • Journal of Public Health, 89(3): 336-345. • Hirshleifer, D and Rasmusen, E. 1989. Cooperation in a repeated Prisoners’ Dilemma with ostracism. • J. Econ. Behav. Organiz. 12: 87-106. • Hyman, JM, and Stanley, EA. 1988. Using Mathematical Models to Understand the AIDS epidemic. • Math. Biosci., 90:415-473.
  • 60.
  • 61.