Search results

1 – 10 of over 4000
To view the access options for this content please click here
Article
Publication date: 19 June 2017

Hock Yeow Yap and Tong-Ming Lim

This paper aims to present social trust as a variable of influence by demonstrating the possibilities of trusted social nodes to improve influential capability and rate of…

Abstract

Purpose

This paper aims to present social trust as a variable of influence by demonstrating the possibilities of trusted social nodes to improve influential capability and rate of successfully influenced social nodes within a social networking environment.

Design/methodology/approach

This research will be conducted using simulated experiments. The base algorithm in research uses genetics algorithm diffusion model (GADM) where it carries out social influence calculations within a social networking environment. The GADM algorithm will be enhanced by integrating trust values into its influential calculations. The experiment simulates a virtual social network based on a social networking site architecture from the data set used to conduct experiments on the enhanced GADM and observe their influence capabilities.

Findings

The presence of social trust can effectively increase the rate of successfully influenced social nodes by factorizing trust value of one source node and acceptance rate of another recipient node into its probabilistic equation, hence increasing the final acceptance probability.

Research limitations/implications

This research focused exclusively on conceptual mathematical models and technical aspects so far; comprehensive user study, extensive performance and scalability testing is left for future work.

Originality/value

Two key contributions of this paper are the calculation of social trust via content integrity and the application of social trust in social influential diffusion algorithms. Two models will be designed, implemented and evaluated on the application of social trust via trusted social nodes and domain-specified (of specific interest groups) trusted social nodes.

Details

International Journal of Web Information Systems, vol. 13 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

To view the access options for this content please click here
Article
Publication date: 18 June 2018

Saman Forouzandeh, Amir Sheikhahmadi, Atae Rezaei Aghdam and Shuxiang Xu

This paper aims to analyze the role of influential nodes on other users on Facebook social media sites by social and behavioral characteristics of users. Hence, a new…

Abstract

Purpose

This paper aims to analyze the role of influential nodes on other users on Facebook social media sites by social and behavioral characteristics of users. Hence, a new centrality for user is defined, applying susceptible-infected recovered (SIR) model to identify influence of users. Results show that the combination of behavioral and social characteristics would be determined the most influential users that influence majority of nodes on social networks.

Design/methodology/approach

In this paper, the authors define a new centrality for users, considering node status and behaviors. Thus, this node has a high level of influence. Node social status includes node degree, clustering coefficient and average neighbors’ node, and social status of node refers to user activities on Facebook social media website such as sending posts and receiving likes from other users. According to social status and user activity, the new centrality is defined. Finally, through the SIR model, the authors explore infection power of nodes and their influences of other node in the network.

Findings

Results show that the proposed centrality is more effective than other centrality approaches, infecting more nodes in social network. Another significant point in this research is that users who have high social status and activities on Facebook are more influential than users who have only high social status on the Facebook social media.

Originality/value

The influence of user on others in social media includes two key factors. The first factor is user social status such as node degree and clustering coefficient in social media graph and the second factor is related to user social activities in social media sites. Most centralities focused on node social status without considering node behavior. This paper analyzes the role of influential nodes on other users on Facebook social media site by social and behavioral characteristics of users.

Details

International Journal of Web Information Systems, vol. 14 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

To view the access options for this content please click here
Article
Publication date: 30 January 2009

Marcela Mejia, Néstor Peña, José L. Muñoz and Oscar Esparza

Mobile ad hoc networks rely on cooperation to perform essential network mechanisms such as routing. Therefore, network performance depends to a great extent on giving…

Abstract

Purpose

Mobile ad hoc networks rely on cooperation to perform essential network mechanisms such as routing. Therefore, network performance depends to a great extent on giving participating nodes an incentive for cooperation. The level of trust among nodes is the most frequently used parameter for promoting cooperation in distributed systems. There are different models for representing trust, each of which is suited to a particular context and leads to different procedures for computing and propagating trust. The goal of this study is to analyze the most representative approaches for mobile ad hoc networks. It aims to obtain a qualitative comparison of the modeling approaches, according to the three basic components of a trust model: information gathering, information scoring and ranking, and action execution.

Design/methodology/approach

The paper identifies the different tasks required by a trust system and compares the way they are implemented when the system model itself is based on information theory, social networks, cluster concept, graph theory and game theory. It also provides a common nomenclature for the models. The study concentrates exclusively on the trust models themselves, without taking into account other aspects of the original articles that are beyond the scope of this analysis.

Findings

The study identifies the main components that a trust model must provide, and compares the way they are implemented. It finds that the lack of unity in the different proposed approaches makes it difficult to conduct an objective comparison. Finally, it also notices that most of the models do not properly manage node reintegration.

Originality/value

The best of our knowledge, the study is the first that uses information scoring and ranking as classification key. According to this key, approaches can be classified as based on information theory, clusters and social network theory, and cooperative and non‐cooperative game theory. It also provides a common nomenclature for all of them. Finally, the main contribution of the paper is to provide an analysis of the most representative approaches and present a novel qualitative comparison.

Details

Internet Research, vol. 19 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here
Article
Publication date: 23 September 2019

Rajendran N., Jawahar P.K. and Priyadarshini R.

The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing…

Abstract

Purpose

The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing systems; likewise, there is a noteworthy innovation that supplies virtual equipment and programming assets according to the requirement of mobile ad hoc network.

Design/methodology/approach

It faces different execution and effectiveness-based difficulties. The major challenge is the compromise of performance because of unavailable resources with respect to the MANET. In order to increase the MANET environment’s performance, various techniques are employed for routing and security purpose. An efficient security module requires a quality-of-service (QoS)-based security policy. It performs the task of routing and of the mobile nodes, and it also reduces the routing cost by finding the most trusted node.

Findings

The experimental results specify that QoS-based security policy effectively minimizes the cost, response time as well as the mobile makespan (routing cost and response time) of an application with respect to other existing approaches.

Research limitations/implications

In this paper, the authors proposed an enhancement of Cross Centric Intrusion Detection System named as PIHNSPRA Routing Algorithm (PIHNSPRA).

Practical implications

It maps the security with the secure IDS communication and distributes the packets among different destinations, based on priority. This calculation is proposed for the purpose of routing and security by considering greatest throughput with least routing cost and reaction time.

Social implications

When the concept is applied to practical applications. Quality of Service introduced in the proposed research reduces the cost of routing and improves the throughput.

Originality/value

The proposed calculation is tested by NS2 simulator and the outcomes showed that the execution of the calculation is superior to other conventional algorithms.

Details

International Journal of Intelligent Unmanned Systems, vol. 7 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

To view the access options for this content please click here
Article
Publication date: 21 November 2008

Barbara Carminati and Elena Ferrari

Web‐based social networks (WBSNs) are today one of the most relevant phenomena related to the advent of Web 2.0. The purpose of this paper is to discuss main security and…

Abstract

Purpose

Web‐based social networks (WBSNs) are today one of the most relevant phenomena related to the advent of Web 2.0. The purpose of this paper is to discuss main security and privacy requirements arising in WBSNs, with a particular focus on access control, and to survey the main research activities carried out in the field. The social networking paradigm is today used not only for recreational purposes; it is also used at the enterprise level as a means to facilitate knowledge sharing and information dissemination both at the internet and at the intranet level. As a result of the widespread use of WBSN services, millions of individuals can today easily share personal and confidential information with an incredible amount of (possible unknown) other users. Clearly, this huge amount of information and the ease with which it can be shared and disseminated pose serious security and privacy concerns.

Design/methodology/approach

The paper discusses the main requirements related to access control and privacy enforcement in WBSNs. It presents the protection functionalities provided by today WBSNs and examines the main research proposals defined so far, in view of the identified requirements.

Findings

The area of access control and privacy for WBSNs is new and, therefore, many research issues still remain open. The paper provides an overview of some of these new issues.

Originality/value

The paper provides a useful discussion of the main security and privacy requirements arising in WBSNs, with a particular focus on access control. It also surveys the main research activities carried out in the field.

Details

International Journal of Web Information Systems, vol. 4 no. 4
Type: Research Article
ISSN: 1744-0084

Keywords

To view the access options for this content please click here
Article
Publication date: 29 October 2020

Oleksii Konashevych

The purpose of this paper is to present a concept of the protocol for public registries based on blockchain. New database protocol aims to use the benefits of blockchain…

Abstract

Purpose

The purpose of this paper is to present a concept of the protocol for public registries based on blockchain. New database protocol aims to use the benefits of blockchain technologies and ensure their interoperability.

Design/methodology/approach

This paper is framed with design science research (DSR). The primary method is exaptation, i.e. adoption of solutions from other fields. The research is looking into existing technologies which are applied here as elements of the protocol: Name-Value Storage (NVS), Berkley DB, RAID protocol, among others. The choice of NVS as a reference technology for creating a database over blockchain is based on the analysis and comparison with two other similar technologies Bigchain and Amazon QLDB.

Findings

The proposed mechanism allows creating a standard database over a bundle of distributed ledgers. It ensures a blockchain agnostic approach and uses the benefits of various blockchain technologies in one ecosystem. In this scheme, blockchains play the role of journal storages (immutable log), whereas the overlaid database is the indexed storage. The distinctive feature of such a system is that in blockchain, users can perform peer-to-peer transactions directly in the ledger using blockchain native mechanism of user access management with public-key cryptography (blockchain does not require to administrate its database).

Originality/value

This paper presents a new method of creating a public peer-to-peer database across a bundle of distributed ledgers.

Details

International Journal of Web Information Systems, vol. 16 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

To view the access options for this content please click here
Article
Publication date: 28 October 2019

Elena Veretennik and Aino Kianto

The purpose of this paper is to provide an understanding of how two types of informal social networks – those related to instrumental purposes of information sharing and…

Abstract

Purpose

The purpose of this paper is to provide an understanding of how two types of informal social networks – those related to instrumental purposes of information sharing and those related to expressive purposes of interpersonal trust – impact teachers’ job satisfaction.

Design/methodology/approach

This paper uses social network analysis (SNA) degree and betweenness measures and job satisfaction scales from the Job Diagnostic Survey to collect longitudinal data from employees in one of the vocational schools in Saint Petersburg, Russia via structured interviews. Data on a total of 354 ties were analysed for 40 ego networks in 2018 and 33 ego networks in 2019.

Findings

The obtained results partially confirm the positive effect of teachers’ position in instrumental and expressive networks on job satisfaction. More centrally positioned teachers were more satisfied with peers and colleagues. They feel more secure in regard to job security, given the unique and multi-faceted knowledge they possess. Structural diversity of the network, as well as the category of a teacher (core subject or vocational subject), are found to explain the uneven evolvement of network size. The authors argue that the decrease in network size can be treated as a positive externality of changes in an informal network. The variation in teachers’ experience seems to explain both job satisfaction and network composition.

Research limitations/implications

The paper is based on a case study and its findings are limited to one particular organization. Nonetheless, the proposed SNA application is of potential value for similar organizations in terms of enhancing their capacity to benefit from networks. This study uses a structured interview to collect network data and job satisfaction data. However, overt observation or secondary data on written communication (e-mail, reports) may provide additional insights about the sought impact in the context of school.

Practical implications

Both teachers and managers benefit from the results of the paper. Educational policymakers and schools’ administration can exploit the bird’s eye view on an organization that SNA provides. By identifying focal employees and their attitude towards school, one receives an opportunity to prevent structural holes, organizational conflicts and uneven distribution of workload. Novice teachers can nurture their well-being by enhancing personal and instrumental social networks at the start of their careers. Experienced teachers benefit from social cooperation as it fosters the exchange of experience and skills, which is vital for job retention.

Originality/value

This research extends the understanding of the role of different kinds of social networks in teachers’ job satisfaction. The paper provides new insights into the SNA application to vocational schools and developing economies. Authors address teachers’ informal networks both from ego and complete network analyses to provide the holistic, yet detailed view. The use of longitudinal data advances the understanding of how personal and group networks develop over time.

To view the access options for this content please click here
Article
Publication date: 5 June 2017

Chuang Wei, Zhao-Ji Yu and Xiao-Nan Chen

This paper aims to solve the problem of information overload and reduce search costs. It proposes a social e-commerce online reputation formation model and community…

Abstract

Purpose

This paper aims to solve the problem of information overload and reduce search costs. It proposes a social e-commerce online reputation formation model and community state-introduced model. A system dynamics trend simulation has been run to capture the relationship among the sellers, buyers, social e-commerce platforms and external environment to obtain an online reputation.

Design/methodology/approach

Empirical research relating to social e-commerce reputation has been used to confirm the influencing factors in social e-commerce, and a conceptual framework is developed for social e-commerce reputation formation. Thereafter, a trend simulation is generated to classify the relationship among the factors based on system dynamics. Also, the improved algorithm for community detection and a state-introduced model based on a Markov network are proposed to achieve better network partition for better online reputation management.

Findings

The empirical model captures the interaction effect of social e-commerce reputation and the state-introduced model to guide community public opinion and improve the efficiency of social e-commerce reputation formation. This helps minimize searching cost thereby improving social e-commerce reputation construction and management.

Research limitations/implications

There is no appropriate online reputation system to be constructed to test the relationship proposed in the study for a field experiment. Also, deeper investigation for the nodes’ attributes in social networks should be made in future research. Besides, researchers are advised to explore measurement for the reputation of a given seller by using social media data as from Twitter or micro blogs.

Originality/value

Investigations that study online reputation in the social e-commerce are limited. The empirical research figured out the factors which can influence the formation of online reputation in social e-commerce. An SD model was proposed to explain the factors interaction and trend simulation was run. Also, a state-introduced model was proposed to highlight the effect of nodes’ attributes on communities’ detection to give a deeper investigation for the online reputation management.

Details

Kybernetes, vol. 46 no. 06
Type: Research Article
ISSN: 0368-492X

Keywords

To view the access options for this content please click here
Article
Publication date: 18 July 2016

Victoria Louise Lemieux

The purpose of this paper is to explore the value of Blockchain technology as a solution to creating and preserving trustworthy digital records, presenting some of the…

Abstract

Purpose

The purpose of this paper is to explore the value of Blockchain technology as a solution to creating and preserving trustworthy digital records, presenting some of the limitations, risks and opportunities of the approach.

Design/methodology/approach

The methodological approach involves using the requirements embedded in records management and digital preservation standards, specifically ISO 15,489, ARMA’s Generally Accepted Recordkeeping Principles, ISO 14,721 and ISO 16,363, as a general evaluative framework for a risk-based assessment of a specific proposed implementation of Blockchain technology for a land registry system in a developing country.

Findings

The results of the analysis suggest that Blockchain technology can be used to address issues associated with information integrity in the present and near term, assuming proper security architecture and infrastructure management controls. It does not, however, guarantee reliability of information in the first place, and would have several limitations as a long-term solution for maintaining trustworthy digital records.

Originality/value

This paper contributes an original analysis of the application of Blockchain technology for recordkeeping.

Details

Records Management Journal, vol. 26 no. 2
Type: Research Article
ISSN: 0956-5698

Keywords

To view the access options for this content please click here
Article
Publication date: 20 December 2007

Jamal Bentahar, Francesca Toni, John‐Jules Ch. Meyer and Jihad Labban

This paper aims to address some security issues in open systems such as service‐oriented applications and grid computing. It proposes a security framework for these…

Abstract

Purpose

This paper aims to address some security issues in open systems such as service‐oriented applications and grid computing. It proposes a security framework for these systems taking a trust viewpoint. The objective is to equip the entities in these systems with mechanisms allowing them to decide about trusting or not each other before starting transactions.

Design/methodology/approach

In this paper, the entities of open systems (web services, virtual organizations, etc.) are designed as software autonomous agents equipped with advanced communication and reasoning capabilities. Agents interact with one another by communicating using public dialogue game‐based protocols and strategies on how to use these protocols. These strategies are private to individual agents, and are defined in terms of dialogue games with conditions. Agents use their reasoning capabilities to evaluate these conditions and deploy their strategies. Agents compute the trust they have in other agents, represented as a subjective quantitative value, using direct and indirect interaction histories with these other agents and the notion of social networks.

Findings

The paper finds that trust is subject to many parameters such as the number of interactions between agents, the size of the social network, and the timely relevance of information. Combining these parameters provides a comprehensive trust model. The proposed framework is proved to be computationally efficient and simulations show that it can be used to detect malicious entities.

Originality/value

The paper proposes different protocols and strategies for trust computation and different parameters to consider when computing this trust. It proposes an efficient algorithm for this computation and a prototype simulating it.

Details

International Journal of Web Information Systems, vol. 3 no. 4
Type: Research Article
ISSN: 1744-0084

Keywords

1 – 10 of over 4000