Algorithmic aspects of manipulation and anonymization in social choice and social networks

نویسنده

  • Nimrod Talmon
چکیده

This thesis presents a study of several combinatorial problems related to social choice and social networks. The main concern is their computational complexity, with an emphasis on their parameterized complexity. The goal is to devise efficient algorithms for each of the problems studied here, or to prove that, under widely-accepted assumptions, such algorithms cannot exist. The problems discussed in Chapter 3 and in Chapter 4 are about manipulating a given election, where some relationships between the entities of the election are assumed. This can be seen as if the election occurs on top of an underlying social network, connecting the voters participating in the election or the candidates which the voters vote on. The problem discussed in Chapter 3, COMBINATORIAL CANDIDATE CONTROL, following the paper by Chen et al. [42], is about manipulating an election by changing the set of candidates which the voters vote on. That is, there is an external agent who can add new candidates or delete existing candidates. A combinatorial structure over the candidates is assumed, such that whenever the external agent adds or removes a candidate, a predefined set of candidates (related to the chosen candidate) are added or removed from the election. The problem discussed in Chapter 4, COMBINATORIAL SHIFT BRIBERY, following the paper by Bredereck et al. [31], is also about manipulating an election. Here, however, the external agent can change the way some voters vote. Specifically, a combinatorial structure over the voters is assumed, such that the external agent can change the position of its preferred candidate in sets of voters, following some predefined patterns. The problem discussed in Chapter 5, ELECTION ANONYMIZATION, following the paper by Talmon [139], is also about elections. The main concern here, however, is preserving the privacy of the voters, when the votes are published, along with some additional (private) information. The task is to transform a given election such that each vote would appear at least k times. By doing so, even an adversary which knows how some voters vote, cannot identify individual voters.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Effective Method for Utility Preserving Social Network Graph Anonymization Based on Mathematical Modeling

In recent years, privacy concerns about social network graph data publishing has increased due to the widespread use of such data for research purposes. This paper addresses the problem of identity disclosure risk of a node assuming that the adversary identifies one of its immediate neighbors in the published data. The related anonymity level of a graph is formulated and a mathematical model is...

متن کامل

To Examine Dimensions of Social Networks’ Filtering Regulations in Iran’s law

Social networks play a significant role in today world. These sites affect different aspects of individual and social life of people and the national and even international levels. Accordingly, they are spreading, and will play more important role in the future life. This paper aims to examine the positive and negative effects of social networks’ filtering, that creates curiosity and has invers...

متن کامل

To Examine Dimensions of Social Networks’ Filtering Regulations in Iran’s law

Social networks play a significant role in today world. These sites affect different aspects of individual and social life of people and the national and even international levels. Accordingly, they are spreading, and will play more important role in the future life. This paper aims to examine the positive and negative effects of social networks’ filtering, that creates curiosity and has invers...

متن کامل

Comparative Analysis of Information Dissemination Capabilities of Media and Social Networks

Background and Aim: Human Knowledge depends on data and information that is emerged and transffered from different channels. The dessimination process is different from type, form of transfer, and distribution based on information or awareness. This survey compares the librarians and information scienctist’s information transferring capabilities in mass media and social networks. Methods: This ...

متن کامل

Data Analysis Methods in Social Networks

Background and Aim. The promising outlook of easy communication incurring minimum cost has caused social networks to face increasing number of active members each day. These members develop and expand international communication through information sharing including personal information. Thus, big data analysis of social networks provides companies, organizations and governments with ample and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016