Diffusion of Confidential Information on Networks
نویسنده
چکیده
The development of information and network technology enables us to share information at anywhere and anytime. The social networks on the Internet, for example BBS, SNS, Twitter etc. in the Web, have become the personal network media of information. They are quite useful in information sharing each other. On the other hand, we faced the difficulties in the confidentiality of sensitive content, which have the risk of diffusion of personal or secret information over the Internet. Once the personal and secret information diffuses on the Internet, people on the Internet can know the information anywhere and anytime even in future. This paper presents mathematical models for diffusion phenomena of personal or secret information on the Internet in particular. We investigate the behavior of the models using analytical and computational methods with numerical Monte Carlo simulation. We also consider the structure and dynamics of diffusion on networks constructed by a large number of people with interaction or communication each other. As is well known that social networks have grown rapidly on the Internet. The community on the Internet is in general visible from access logs in servers, rather than that in the real world, so that we can easily analyze the structure and dynamics of the social networks. Not only the element but also the link of a social network determines the behavior of social systems. A network [8] is a set of points (also called vertices or nodes) connected by lines (also called edges or links). We may call complex networks, if the number of points and links is so large that only computational calculation can analyze them. Any system with coupled elements can be represented as a network, so that our world is full of networks[5]. This is a natural generalization of the previous work by Dan [3]. In this paper, we consider the diffusion phenomena of personal or secret information on the variety of networks, such as complete, random, stochastic and scale-free networks.
منابع مشابه
A Knowledge Management Approach to Discovering Influential Users in Social Media
A key step for success of marketer is to discover influential users who diffuse information and their followers have interest to this information and increase to diffuse information on social media. They can reduce the cost of advertising, increase sales and maximize diffusion of information. A key problem is how to precisely identify the most influential users on social networks. In this pape...
متن کاملConfidential Business Information in Jurisprudence and Iranian law
As a result of information technology era and possibility of swift access to information, endorsement of Confidential Business Information (CBI) has found an extraordinary importance; whereas the CBI concept and legal warranty in order to support it thoroughly in Iran is not emphasized in the framework of a specific law. This issue has led to legal problems in the trial with allegation of CBI v...
متن کاملDiscover Tipping Users For Cross Network Influencing
Traditional viral marketing problem aims at selecting a set of influential seed users to maximize the awareness of products and ideas in one single social network. However, in real scenarios, users’ profiles in the target social network (e.g., Facebook) are usually confidential to the public, which block the conventional viral marketing strategies reaching the target consumers effectively. Inst...
متن کاملImpacts of the Negative-exponential and the K-distribution modeled FSO turbulent links on the theoretical and simulated performance of the distributed diffusion networks
Merging the adaptive networks with the free space optical (FSO) communication technology is a very interesting field of research because by adding the benefits of this technology, the adaptive networks become more efficient, cheap and secure. This is due to the fact that FSO communication uses unregistered visible light bandwidth instead of the overused radio spectrum. However, in spite of all ...
متن کاملBalanced clusters and diffusion process in signed networks
In this paper we study the topology effects on diffusion process in signed networks. Considering a simple threshold model for diffusion process, it is extended to signed networks and some appropriate definitions are proposed. This model is a basic model that could be extended and applied in analyzing dynamics of many real phenomena such as opinion forming or innovation diffusion in social netwo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1101.0345 شماره
صفحات -
تاریخ انتشار 2011