In the rapidly evolving landscape of online microblogging platforms, hate speech has emerged as a particularly troubling issue. Alarmingly, numerous countries have seen a sharp increase in hate crimes driven by malici...
详细信息
ISBN:
(纸本)9783031785535;9783031785542
In the rapidly evolving landscape of online microblogging platforms, hate speech has emerged as a particularly troubling issue. Alarmingly, numerous countries have seen a sharp increase in hate crimes driven by malicious hate campaigns. While the detection of hate speech has gained attention as a major research field, the complexities of its genesis and spread across online social networks remain largely unexamined. In this study, we focus on developing a benchmark dataset for hate and abusive speech, related to various aspects of Indian politics, and religious topics. The dataset comprises of a vast user base of politically active individuals, enabling us to capture the nuances of hate speech propagation within this context. Additionally, we employ advanced topic modeling techniques to analyze the data, uncovering the underlying themes and user reactions associated with the data. This detailed analysis reveals how people respond to these topics, the temporal activation of discussions, and the comparative trends between different hashtags. This study offers valuable insights for policymakers, social media companies, and researchers, helping them develop better strategies to reduce hate speech and promote positive online interactions.
End-to-end verifiable e-voting schemes enhance the verifiability of individual votes during the election process. Specifically, methods for cast-as-intended verifiability empower voters to confirm that their cast vote...
详细信息
ISBN:
(纸本)9783031692307;9783031692314
End-to-end verifiable e-voting schemes enhance the verifiability of individual votes during the election process. Specifically, methods for cast-as-intended verifiability empower voters to confirm that their cast votes have not been manipulated by the voting client. There are mainly three approaches to implement cast-as-intended verifiability in remote evoting systems: (1) return-code based, (2) challenge-based and (3) second-device-approach. To investigate the usability, perceived trustworthiness and manipulation effectiveness for the second-device-approach, we conducted a user study with 133 participants. The results are similar to those from related work investigating the other two approaches.
This research paper explores the evolution of the Venezuelan prison gang Tren de Aragua. This criminal group has emerged as one of the most influential entities in Latin America, exerting control that extends beyond p...
详细信息
ISBN:
(纸本)9783031785474;9783031785481
This research paper explores the evolution of the Venezuelan prison gang Tren de Aragua. This criminal group has emerged as one of the most influential entities in Latin America, exerting control that extends beyond prison walls into broader societal, business, and political spheres. This paper utilizes Social Network Analysis (SNA) to dissect the intricate relationships and networks surrounding the Tren de Aragua. We introduce the concept of "converged governance," which challenges traditional views of the separations between state and non-state actors. This theoretical framework proposes that the clandestine links between these state and non-state entities allow for covert collaborations that maintain internal cohesion while promoting extensive criminal activities. Our study not only provides a detailed map of the Tren de Aragua's network structure through SNA but also emphasizes the prison's role as a critical territory where state and non-state systems intersect. This offers a more systemic insight into the dynamics of criminal governance and its impact on national and regional security. By investigating the conditions under which prison gangs like the Tren de Aragua assume control over state facilities and evolve into transnational criminal organizations, this paper significantly enhances our understanding of systemic challenges by highlighting the complex, often symbiotic relationships between criminal organizations and state actors.
A widespread moderation strategy by online news platforms is to feature what the platform deems high quality comments, usually called editor picks or featured comments. In this paper, we compare online discussions of ...
详细信息
ISBN:
(纸本)9783031785375;9783031785382
A widespread moderation strategy by online news platforms is to feature what the platform deems high quality comments, usually called editor picks or featured comments. In this paper, we compare online discussions of news articles in which certain comments are featured, versus discussions in which no comments are featured. We measure the impact of featuring comments on the discussion, by estimating and comparing the quality of discussions from the perspective of the user base and the platform itself. Our analysis shows that the impact on discussion quality is limited. However, we do observe an increase in discussion activity after the first comments are featured by moderators, suggesting that the moderation strategy might be used to increase user engagement and to postpone the natural decline in user activity over time.
Bluesky is a Twitter-like decentralized social media platform that has recently grown in popularity. After an invite-only period, it opened to the public worldwide on February 6th, 2024. In this paper, we provide a lo...
详细信息
ISBN:
(纸本)9783031785405;9783031785412
Bluesky is a Twitter-like decentralized social media platform that has recently grown in popularity. After an invite-only period, it opened to the public worldwide on February 6th, 2024. In this paper, we provide a longitudinal analysis of user activity in the two months around the opening, studying changes in the general characteristics of the platform due to the rapid growth of the user base. We observe a broad distribution of activity similar to more established platforms, but a higher volume of original than reshared content, and very low toxicity. After opening to the public, Bluesky experienced a large surge in new users and activity, especially posting English and Japanese content. In particular, several accounts entered the discussion with suspicious behavior, like following many accounts and sharing content from low-credibility news outlets. Some of these have already been classified as spam or suspended, suggesting effective moderation.
In this paper we revisit the idea of participation privacy in secure voting, i.e., when public data does not reveal whether a given voter participated in the election. This is an important property, especially when de...
详细信息
ISBN:
(纸本)9783031692307;9783031692314
In this paper we revisit the idea of participation privacy in secure voting, i.e., when public data does not reveal whether a given voter participated in the election. This is an important property, especially when defining coercion-resistance preventing forced abstention attacks, and it is frequently mentioned as one of the main necessary conditions. However, what has been largely overlooked in the secure voting literature, is the idea of preventing forced participation attacks, i.e., where a voter is forced, or more subtly feels forced, to participate in an election. Whereas a high participation rate might seem like a desirable democratic property, there are cases when a part of the society wants to boycott the vote, e.g., in order to express its disapproval, or to prevent the proposed legislation. We logically formalise the idea of resistance to forced participation and, perhaps surprisingly, show that it is to some extent dual to forced abstention resistance. We also give intuitive examples of systems that satisfy one, but not the other.
Single Transferable Vote (STV) elections are a principled approach to electing multiple candidates in a single election. Each ballot has a starting value of 1, and a candidate is elected if they gather a total vote va...
ISBN:
(纸本)9783031692307;9783031692314
Single Transferable Vote (STV) elections are a principled approach to electing multiple candidates in a single election. Each ballot has a starting value of 1, and a candidate is elected if they gather a total vote value more than a defined quota. Votes over the quota have their value reduced by a transfer value so as to remove the quota, and are passed to the next candidate on the ballot. Risk-limiting audits (RLAs) are a statistically sound approach to election auditing which guarantees that failure to detect an error in the result is bounded by a limit. A first approach to RLAs for 2-seat STV elections has been defined. In this paper we show how we can improve this approach by reasoning about lower bounds on transfer values, and how we can extend the approach to partially audit an election, if the method does not support a full audit.
Concerns related to the veracity and originality of the content on social networks are at an ongoing rise. Considerable work has been done on information spreading, and tools have been built, while approaches with pro...
详细信息
ISBN:
(纸本)9783031785375;9783031785382
Concerns related to the veracity and originality of the content on social networks are at an ongoing rise. Considerable work has been done on information spreading, and tools have been built, while approaches with provenance-based analysis are rare. We are of the opinion that provenance-based analysis and visualization tools can make (mis-)information spreading analysis more efficient. Thus, we study provenance, and present a provenance pipeline for data analytics, where users are able to interact with multiple network analysis modules through a graphical user interface, and describe a proof-of-concept system. Although provenance visualization can suffice in capturing all the necessary metadata, integration with other network visualization modules suited to the same data enhanced our results analysis and conclusions. Having designed distinct provenance models, we captured and analysed lineage of information on community dynamics. We tested our proposed prototype with a real-world dataset comprising of more than 10 million filtered tweets, focused on COVID-19 vaccinations, and conducted an analysis on community dynamics with network science metrics and NLP.
作者:
Shalileh, SorooshHSE Univ
Lab Artificial Intelligence Cognit Sci AICS Moscow Russia HSE Univ
Ctr Language & Brain CLB Moscow Russia
Community detection in attributed networks aims to recover clusters in which the within-community nodes are as interconnected and as homogeneous as possible, while the between-communities nodes are as disconnected and...
详细信息
ISBN:
(纸本)9783031785375;9783031785382
Community detection in attributed networks aims to recover clusters in which the within-community nodes are as interconnected and as homogeneous as possible, while the between-communities nodes are as disconnected and as heterogeneous as possible. The current research proposes a straightforward data-driven model with an integrated regularization term to recover communities. For further improvement of the quality of detected communities we also propose a softmax-scaled-dot-product to transform the data spaces into more cluster-friendly data spaces. We adopt the gradient descent optimization strategy to optimize our proposed clustering objective function. We compare the performance of the proposed method using both real-world and synthetic data sets with three state-of-art algorithms. Our results showed that the proposed method obtains promising result.
Coercion and vote-buying are challenging and multi-faceted threats that prevent people from expressing their will freely. Even though there are known techniques to resist or partially mitigate coercion and vote-buying...
详细信息
ISBN:
(纸本)9783031722431;9783031722448
Coercion and vote-buying are challenging and multi-faceted threats that prevent people from expressing their will freely. Even though there are known techniques to resist or partially mitigate coercion and vote-buying, we explicitly demonstrate that they generally underestimate the power of malicious actors by not accounting for current technological tools that could support coercion and vote-selling. In this paper, we give several examples of how a coercer can force voters to comply with his demands or how voters can prove how they voted. To do so, we use tools like blockchains, delay encryption, privacy-preserving smart contracts, or trusted hardware. Since some of the successful coercion attacks occur on voting schemes that were supposed/claimed/proven to be coercion-resistant or receipt-free, the main conclusion of this work is that the coercion models should be re-evaluated, and new definitions of coercion and receipt-freeness are necessary. We propose such new definitions as part of this paper and investigate their implications.
暂无评论