Investigating substructures in goal oriented online communities: Case study of Ubuntu IRC

Published on Mar 27, 2014
路 DOI :10.1109/IADCC.2014.6779445
Tanmay Sinha12
Estimated H-index: 12
(VIT University),
Indra Rajasingh16
Estimated H-index: 16
(VIT University)
Sources
Abstract
In this paper, we apply social network analytic methods to unveil the structural dynamics of a popular open source goal oriented IRC community, Ubuntu. The primary objective is to track the development of this ever growing community over time using a social network lens and examine the dynamically changing participation patterns of people. Specifically, our research seeks out to investigate answers to the following question: How can the communication dynamics help us in delineating important substructures in the IRC network? This gives an insight into how open source learning communities function internally and what drives the exhibited IRC behavior. By application of a consistent set of social network metrics, we discern factors that affect people's embeddedness in the overall IRC network, their structural influence and importance as discussion initiators or responders. Deciphering these informal connections are crucial for the development of novel strategies to improve communication and foster collaboration between people conversing in the IRC channel, there by stimulating knowledge flow in the network. Our approach reveals a novel network skeleton, that more closely resembles the behavior of participants interacting online. We highlight bottlenecks to effective knowledge dissemination in the IRC, so that focused attention could be provided to communities with peculiar behavioral patterns.
馃摉 Papers frequently viewed together
2014
References38
Newest
Jul 16, 2013 in SIGMOD (International Conference on Management of Data)
#1Adrien GuilleH-Index: 9
#2Hakim Hacid (Bell Labs)H-Index: 17
Last. Djamel A. ZighedH-Index: 12
view all 4 authors...
Online social networks play a major role in the spread of information at very large scale. A lot of effort have been made in order to understand this phenomenon, ranging from popular topic detection to information diffusion modeling, including influential spreaders identification. In this article, we present a survey of representative methods dealing with these issues and propose a taxonomy that summarizes the state-of-the-art. The objective is to provide a comprehensive analysis and guide of ex...
Source
#1David C. UthusH-Index: 8
#2David W. Aha (NRL: United States Naval Research Laboratory)H-Index: 50
We survey research on the analysis of multiparticipant chat. Multiple research and applied communities (e.g., AI, educational, law enforcement, military) have interest in this topic. After introducing some context, we describe relevant problems and how these have been addressed using AI techniques. We also identify recent research trends and unresolved issues that could benefit from more attention.
Source
May 13, 2013 in WWW (The Web Conference)
#1Cristian Danescu-Niculescu-Mizil (MPG: Max Planck Society)H-Index: 29
#2Robert West (Stanford University)H-Index: 20
Last. Christopher Potts (Stanford University)H-Index: 44
view all 5 authors...
Vibrant online communities are in constant flux. As members join and depart, the interactional norms evolve, stimulating further changes to the membership and its social dynamics. Linguistic change --- in the sense of innovation that becomes accepted as the norm --- is essential to this dynamic process: it both facilitates individual expression and fosters the emergence of a collective identity. We propose a framework for tracking linguistic change as it happens and for understanding how specifi...
Source
#1Vladimir Gligorijevi膰 (Jo啪ef Stefan Institute)H-Index: 13
#2Marcin SkowronH-Index: 14
Last. Bosiljka Tadi膰 (Jo啪ef Stefan Institute)H-Index: 28
view all 3 authors...
Online chats are recently shown to result in long term associations among users, represented by a directed weighted network, similar to dialogs in online social networks. We consider the persistent network which emerges from user-to-user communications found in the empirical dataset from IRC Ubuntu channel. The structure of these networks is determined by computing topological centrality measures, link correlations and community detection, and by testing validity of the "social ties" hypothesis....
Source
#1Antonios Garas (ETH Zurich)H-Index: 17
#2David Garcia (ETH Zurich)H-Index: 28
Last. Frank Schweitzer (ETH Zurich)H-Index: 56
view all 4 authors...
How do users behave in online chatrooms, where they instantaneously read and write posts? We analyzed about 2.5 million posts covering various topics in Internet relay channels, and found that user activity patterns follow known power-law and stretched exponential distributions, indicating that online chat activity is not different from other forms of communication. Analysing the emotional expressions (positive, negative, neutral) of users, we revealed a remarkable persistence both for individua...
Source
#1Jinie Pak (UMBC: University of Maryland, Baltimore County)H-Index: 5
#2Lina Zhou (UMBC: University of Maryland, Baltimore County)H-Index: 43
The digital information era has allowed increasing online deception opportunities. In addition, the performance of detecting deception has been no better than chance in face-to-face communication, and is reported to be even worse in computer-mediated communication (CMC). Thus, there is a great need to uncover effective cues to deception in CMC. Online interaction weaves an implicit social network. However, Deception in CMC has not been examined from the social network perspective. To fill this g...
Source
Jul 5, 2011 in FUSION (International Conference on Information Fusion)
#1Rong Yang (Western Kentucky University)H-Index: 6
#2Leyla Zhuhadar (University of Louisville)H-Index: 12
Last. Olfa Nasraoui (University of Louisville)H-Index: 37
view all 3 authors...
The bow-tie structure is frequently cited in the literature of the World Wide Web and in many other areas, such as metabolic networks, but it has never been precisely defined, so that to some extent the concept being discussed remains vague. This paper first provides a formal definition of a bow-tie structure relative to a given strongly connected components. That definition details distinctions which are not usually made, such as the difference between intendrils and outtendrils. Theorems and a...
Jun 19, 2011 in ACL (Meeting of the Association for Computational Linguistics)
#1Elijah Mayfield (CMU: Carnegie Mellon University)H-Index: 15
#2Carolyn Penstein Ros茅 (CMU: Carnegie Mellon University)H-Index: 54
We present a novel computational formulation of speaker authority in discourse. This notion, which focuses on how speakers position themselves relative to each other in discourse, is first developed into a reliable coding scheme (0.71 agreement between human annotators). We also provide a computational model for automatically annotating text using this coding scheme, using supervised learning enhanced by constraints implemented with Integer Linear Programming. We show that this constrained model...
Feb 27, 2011 in LAK (Learning Analytics and Knowledge)
#1Devan Rosen (Ithaca College)H-Index: 12
#2Victor Miagkikh (UH: University of Hawaii)H-Index: 1
Last. Daniel D. Suthers (UH: University of Hawaii)H-Index: 47
view all 3 authors...
Multi-user virtual environments (MUVEs) allow many users to explore the environment and interact with other users as they learn new content and share their knowledge with others. The semi-synchronous communicative interaction within these learning environments is typically text-based Internet relay chat (IRC). IRC data is stored in the form of chatlogs and can generate a large volume of data, posing a difficulty for researchers looking to evaluate learning in the interaction by analyzing and int...
Source
Jan 1, 2011 in AAAI (National Conference on Artificial Intelligence)
#1Tomek Strzalkowski (SUNY: State University of New York System)H-Index: 27
#2George Aaron Broadwell (SUNY: State University of New York System)H-Index: 9
Last. Sarah TaylorH-Index: 7
view all 6 authors...
We present in this paper, the application of a novel approach to computational modeling, understanding and detection of social phenomena in online multiparty discourse. A two-tiered approach was developed to detect a collection of social phenomena deployed by participants, such as topic control, task control, disagreement and involvement. We discuss how the mid-level social phenomena can be reliably detected in discourse and these measures can be used to differentiate participants of online disc...
Cited By10
Newest
#1Hocine MerzoukiH-Index: 1
#2Nada MattaH-Index: 12
Last. Hassan AtifiH-Index: 6
view all 3 authors...
Source
Moderation of user-generated content in an online community is a challenge that has great socio-economic ramifications. However, the costs incurred by delegating this paper to human agents are high. For this reason, an automatic system able to detect abuse in user-generated content is of great interest. There are a number of ways to tackle this problem, but the most commonly seen in practice are word filtering or regular expression matching. The main limitations are their vulnerability to intent...
Source
#1Etienne Papegnies (University of Avignon)H-Index: 5
#2Vincent Labatut (University of Avignon)H-Index: 19
Last. Georges Linar猫s (University of Avignon)H-Index: 16
view all 4 authors...
While online communities have become increasingly important over the years, the moderation of user-generated content is still performed mostly manually. Automating this task is an important step in reducing the financial cost associated with moderation, but the majority of automated approaches strictly based on message content are highly vulnerable to intentional obfuscation. In this paper, we discuss methods for extracting conversational networks based on raw multi-participant chat logs, and we...
Source
#1Sicong Shao (UA: University of Arizona)H-Index: 3
#2Cihan Tunc (UA: University of Arizona)H-Index: 10
Last. Salim HaririH-Index: 31
view all 4 authors...
Most of the social media platforms generate a massive amount of raw data that is slow-paced. On the other hand, Internet Relay Chat (IRC) protocol, which has been extensively used by hacker community to discuss and share their knowledge, facilitates fast-paced and real-time text communications. Previous studies of malicious IRC behavior analysis were mostly either offline or batch processing. This results in a long response time for data collection, pre-processing, and threat detection. However,...
Source
#1Victor BenjaminH-Index: 9
#2Bin ZhangH-Index: 10
Last. Hsinchun ChenH-Index: 100
view all 4 authors...
AbstractTo further cybersecurity, there is interest in studying online cybercriminal communities to learn more about emerging cyber threats. Literature documents the existence of many online Internet Relay Chat (IRC) cybercriminal communities where cybercriminals congregate and share hacking tools, malware, and more. However, many cybercriminal community participants appear unskilled and have fleeting interests, making it difficult to detect potential long-term or key participants. This is a cha...
Source
#1Jiakai Yu (UA: University of Arizona)H-Index: 9
#2Cihan Tunc (UA: University of Arizona)H-Index: 10
Last. Salim HaririH-Index: 31
view all 3 authors...
Cyber security is a challenging research problem especially when one considers exponential growth in information technologies. Most previous cyber security research have generally centered on securing and protecting physical resources (computers, network devices, and mobile platforms), protocols and applications. However, little work has focused on the human side and behavior, what motivates cyber attackers to launch attacks, their goals, and where they get their hacking and attacking tools. In ...
Source
#1Victor BenjaminH-Index: 9
SECURING CYBERSPACE: ANALYZING CYBERCRIMINAL COMMUNITIES THROUGH WEB AND TEXT MINING PERSPECTIVES by Victor Benjamin __________________________ Copyright 漏 Victor Benjamin 2016 A Dissertation Submitted to the Faculty of the DEPARTMENT OF MANAGEMENT INFORMATION SYSTEMS In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA
#1Imran Ghafoor (National University of Sciences and Technology)H-Index: 1
#2Imran Jattala (Isra University)H-Index: 3
Last. Ch Muhammad TahirH-Index: 1
view all 4 authors...
The attack of 鈥楽tuxnet鈥 computer warm on the Iranian nuclear program highlighted the need of cybersecurity for critical infrastructure and embedded systems. The evolution of embedded systems to Internet-of-Things (IoT), where every device from a light-bulb to a medical implant device will be connected over internet. This connected world scenario requires secure communication channels to ensure information-security. OpenSSL is a defacto standard for secure communication over the internet. The mem...
Source
#1Victor Benjamin (UA: University of Arizona)H-Index: 9
#2Hsinchun Chen (UA: University of Arizona)H-Index: 100
As computing and communication technologies become ubiquitous throughout society, researchers and practitioners have become motivated to advance current cybersecurity capabilities. In particular, research on the human element behind cybercrime would offer new knowledge on securing cyberspace against those with malicious intent. Past work documents the existence of many hacker communities with participants sharing various cybercriminal assets and knowledge. However, participants vary in expertise...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.