Visibility and exploitation in social networks

Social media is not a neutral channel. How visible information posted online is depends on many factors such as the network structure, the emotional volatility of the content, and the design of the social media platform. In this paper, we use formal methods to study the visibility of agents and info...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Mathematical structures in computer science 2024-08, Vol.34 (7), p.615-644
Hauptverfasser: Galimullin, Rustam, Pedersen, Mina Young
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 644
container_issue 7
container_start_page 615
container_title Mathematical structures in computer science
container_volume 34
creator Galimullin, Rustam
Pedersen, Mina Young
description Social media is not a neutral channel. How visible information posted online is depends on many factors such as the network structure, the emotional volatility of the content, and the design of the social media platform. In this paper, we use formal methods to study the visibility of agents and information in a social network, as well as how vulnerable the network is to exploitation. We introduce a modal logic to reason about a social network of agents that can follow each other, post, and share information. We show that by imposing some simple rules on the system, a potentially malicious agent can take advantage of the network construction to post an unpopular opinion that may reach many agents. The network is presented both in static and dynamic forms. We prove completeness, expressivity, and model checking problem complexity results for the corresponding logical systems.
doi_str_mv 10.1017/S0960129523000397
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3131716316</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cupid>10_1017_S0960129523000397</cupid><sourcerecordid>3131716316</sourcerecordid><originalsourceid>FETCH-LOGICAL-c312t-8630af17fe253f3d15a550cbcff95743498d552d7939d1986a670fcd8c8677903</originalsourceid><addsrcrecordid>eNp1kM1LAzEQxYMoWKt_gLcFz1tndppkc5TiFxQ8-HFd0nxI6nZTky3a_94tLXgQYWAOb35vHo-xS4QJAsrrZ1ACsFK8IgAgJY_YCKdClTXI6piNdnK500_ZWc5LACQENWKTt5DDIrSh3xa6s4X7Xrcx9LoPsStCV-Rogm6LzvVfMX3kc3bidZvdxWGP2evd7cvsoZw_3T_ObualIaz6shYE2qP0ruLkySLXnINZGO8Vl1OaqtpyXlmpSFlUtdBCgje2NrWQUgGN2dXed53i58blvlnGTeqGlw0NySUKGmbMcH9lUsw5Od-sU1jptG0Qml0tzZ9aBoYOjF4tUrDv7tf6f-oHIH5iZg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3131716316</pqid></control><display><type>article</type><title>Visibility and exploitation in social networks</title><source>Cambridge University Press Journals Complete</source><creator>Galimullin, Rustam ; Pedersen, Mina Young</creator><creatorcontrib>Galimullin, Rustam ; Pedersen, Mina Young</creatorcontrib><description>Social media is not a neutral channel. How visible information posted online is depends on many factors such as the network structure, the emotional volatility of the content, and the design of the social media platform. In this paper, we use formal methods to study the visibility of agents and information in a social network, as well as how vulnerable the network is to exploitation. We introduce a modal logic to reason about a social network of agents that can follow each other, post, and share information. We show that by imposing some simple rules on the system, a potentially malicious agent can take advantage of the network construction to post an unpopular opinion that may reach many agents. The network is presented both in static and dynamic forms. We prove completeness, expressivity, and model checking problem complexity results for the corresponding logical systems.</description><identifier>ISSN: 0960-1295</identifier><identifier>EISSN: 1469-8072</identifier><identifier>DOI: 10.1017/S0960129523000397</identifier><language>eng</language><publisher>Cambridge, UK: Cambridge University Press</publisher><subject>Design factors ; Digital media ; Exploitation ; Formal method ; Logic ; Social network analysis ; Social networks ; Special Issue: WoLLIC 2022 ; Visibility</subject><ispartof>Mathematical structures in computer science, 2024-08, Vol.34 (7), p.615-644</ispartof><rights>The Author(s), 2023. Published by Cambridge University Press</rights><rights>The Author(s), 2023. Published by Cambridge University Press. This work is licensed under the Creative Commons Attribution License This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution and reproduction, provided the original article is properly cited. (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c312t-8630af17fe253f3d15a550cbcff95743498d552d7939d1986a670fcd8c8677903</cites><orcidid>0000-0001-8122-6236</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.cambridge.org/core/product/identifier/S0960129523000397/type/journal_article$$EHTML$$P50$$Gcambridge$$Hfree_for_read</linktohtml><link.rule.ids>164,314,776,780,27901,27902,55603</link.rule.ids></links><search><creatorcontrib>Galimullin, Rustam</creatorcontrib><creatorcontrib>Pedersen, Mina Young</creatorcontrib><title>Visibility and exploitation in social networks</title><title>Mathematical structures in computer science</title><addtitle>Math. Struct. Comp. Sci</addtitle><description>Social media is not a neutral channel. How visible information posted online is depends on many factors such as the network structure, the emotional volatility of the content, and the design of the social media platform. In this paper, we use formal methods to study the visibility of agents and information in a social network, as well as how vulnerable the network is to exploitation. We introduce a modal logic to reason about a social network of agents that can follow each other, post, and share information. We show that by imposing some simple rules on the system, a potentially malicious agent can take advantage of the network construction to post an unpopular opinion that may reach many agents. The network is presented both in static and dynamic forms. We prove completeness, expressivity, and model checking problem complexity results for the corresponding logical systems.</description><subject>Design factors</subject><subject>Digital media</subject><subject>Exploitation</subject><subject>Formal method</subject><subject>Logic</subject><subject>Social network analysis</subject><subject>Social networks</subject><subject>Special Issue: WoLLIC 2022</subject><subject>Visibility</subject><issn>0960-1295</issn><issn>1469-8072</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>IKXGN</sourceid><recordid>eNp1kM1LAzEQxYMoWKt_gLcFz1tndppkc5TiFxQ8-HFd0nxI6nZTky3a_94tLXgQYWAOb35vHo-xS4QJAsrrZ1ACsFK8IgAgJY_YCKdClTXI6piNdnK500_ZWc5LACQENWKTt5DDIrSh3xa6s4X7Xrcx9LoPsStCV-Rogm6LzvVfMX3kc3bidZvdxWGP2evd7cvsoZw_3T_ObualIaz6shYE2qP0ruLkySLXnINZGO8Vl1OaqtpyXlmpSFlUtdBCgje2NrWQUgGN2dXed53i58blvlnGTeqGlw0NySUKGmbMcH9lUsw5Od-sU1jptG0Qml0tzZ9aBoYOjF4tUrDv7tf6f-oHIH5iZg</recordid><startdate>20240801</startdate><enddate>20240801</enddate><creator>Galimullin, Rustam</creator><creator>Pedersen, Mina Young</creator><general>Cambridge University Press</general><scope>IKXGN</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0001-8122-6236</orcidid></search><sort><creationdate>20240801</creationdate><title>Visibility and exploitation in social networks</title><author>Galimullin, Rustam ; Pedersen, Mina Young</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c312t-8630af17fe253f3d15a550cbcff95743498d552d7939d1986a670fcd8c8677903</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Design factors</topic><topic>Digital media</topic><topic>Exploitation</topic><topic>Formal method</topic><topic>Logic</topic><topic>Social network analysis</topic><topic>Social networks</topic><topic>Special Issue: WoLLIC 2022</topic><topic>Visibility</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Galimullin, Rustam</creatorcontrib><creatorcontrib>Pedersen, Mina Young</creatorcontrib><collection>Cambridge Journals Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Mathematical structures in computer science</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Galimullin, Rustam</au><au>Pedersen, Mina Young</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Visibility and exploitation in social networks</atitle><jtitle>Mathematical structures in computer science</jtitle><addtitle>Math. Struct. Comp. Sci</addtitle><date>2024-08-01</date><risdate>2024</risdate><volume>34</volume><issue>7</issue><spage>615</spage><epage>644</epage><pages>615-644</pages><issn>0960-1295</issn><eissn>1469-8072</eissn><abstract>Social media is not a neutral channel. How visible information posted online is depends on many factors such as the network structure, the emotional volatility of the content, and the design of the social media platform. In this paper, we use formal methods to study the visibility of agents and information in a social network, as well as how vulnerable the network is to exploitation. We introduce a modal logic to reason about a social network of agents that can follow each other, post, and share information. We show that by imposing some simple rules on the system, a potentially malicious agent can take advantage of the network construction to post an unpopular opinion that may reach many agents. The network is presented both in static and dynamic forms. We prove completeness, expressivity, and model checking problem complexity results for the corresponding logical systems.</abstract><cop>Cambridge, UK</cop><pub>Cambridge University Press</pub><doi>10.1017/S0960129523000397</doi><tpages>30</tpages><orcidid>https://orcid.org/0000-0001-8122-6236</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0960-1295
ispartof Mathematical structures in computer science, 2024-08, Vol.34 (7), p.615-644
issn 0960-1295
1469-8072
language eng
recordid cdi_proquest_journals_3131716316
source Cambridge University Press Journals Complete
subjects Design factors
Digital media
Exploitation
Formal method
Logic
Social network analysis
Social networks
Special Issue: WoLLIC 2022
Visibility
title Visibility and exploitation in social networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-21T20%3A17%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Visibility%20and%20exploitation%20in%20social%20networks&rft.jtitle=Mathematical%20structures%20in%20computer%20science&rft.au=Galimullin,%20Rustam&rft.date=2024-08-01&rft.volume=34&rft.issue=7&rft.spage=615&rft.epage=644&rft.pages=615-644&rft.issn=0960-1295&rft.eissn=1469-8072&rft_id=info:doi/10.1017/S0960129523000397&rft_dat=%3Cproquest_cross%3E3131716316%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3131716316&rft_id=info:pmid/&rft_cupid=10_1017_S0960129523000397&rfr_iscdi=true