Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Social networking&it’s models


Published on

Social Networking -Behind 9/11 Attack

Published in: Education
  • Be the first to comment

  • Be the first to like this

Social networking&it’s models

  1. 1. Social Networking & IT’s Models By JAGDISH.R
  2. 2. Contents• Definition• History Of Social Networking.• Analysis of Social Networking.(Kite Network)• Importance Of Social Networking.• Application Of Social networking in 9-11 Attack.• Mathematical Representation.• Literature Survey.• Case Studies.
  3. 3. Definition:• A Social Networking service is an online service, platform, or site that focuses on building and reflecting of social networks or social relations among people, who, for example, share interests and/or activities
  4. 4. Definition• The Social networking models are those models that add value to community environments supporting social networking, and are specifically applicable to the community-driven environments, where users create and share their vocabularies.
  5. 5. History• The potential for computer networking to facilitate new forms of computer-mediated social interaction was suggested early on. Efforts to support social networks via computer-mediated communication were made in many early online services, including Usenet, ARPANET, LISTSERV , and bulletin board services (BBS)
  6. 6. • Many of these early communities focused on bringing people together to interact with each other through chat rooms, and encouraged users to share personal information and ideas via personal webpages by providing easy-to- use publishing tools and free or inexpensive webspace
  7. 7. • New social networking methods were developed by the end of the 1990s, and many sites began to develop more advanced features for users to find and manage friends.• . Facebook, launched in 2004, has since become the largest social networking site in the world.Today, it is estimated that there are now over 200 active sites using a wide variety of social networking models
  8. 8. Social Networking Websites• What are they? • Tool for: • Communication • Expressing interests• “Nodes and Ties”• Recent phenomena • Digg, 2004 • Youtube, 2005 • Myspace, 2003 • Facebook, 2004
  9. 9. Developments• Third-party applications• Privacy settings• Instant messaging• News feed (Facebook)• Music (Myspace)
  10. 10. Areas were SN is implemented• It is Applicable in • Quality is been Marketing. accelerating its• It is Applicable in position in social Operations networks day by day. Management. • Influence of• No MIS=No Social Operation research Network. in Social Network.
  11. 11. Network• A Network exists were a group of individuals are involved in interaction.
  12. 12. Decision Making Process• Strengthening Organizations Strategies.• To recognize the Leaders.• Accelerate the level of Competition
  13. 13. MIS IN Social Network
  14. 14. Exercise on SNA: Kite Network
  15. 15. Social Network Analysis We measure Social Network in terms of:1. Degree Centrality: The number of direct connections a node has. What really matters is where those connections lead to and how they connect the otherwise unconnected.2. Betweenness Centrality: A node with high betweenness has great influence over what flows in the network indicating important links and single point of failure.3. Closeness Centrality: The measure of closeness of a node which are close to everyone else. The pattern of the direct and indirect ties allows the nodes any other node in the network more quickly than anyone else. They have the shortest paths to all others.
  16. 16. Exercise on SNA: Kite Network• Who is the Connecter or Hub in the Network?• Who has control over what flows in the Network?• Who has best visibility of what is happening in the Network?• Who are peripheral players? Are they Important?
  17. 17. SNA and KMS (2)• Short distances transmit information accurately and in a timely way, while long distances transmit slowly and can distort the information.• Isolation - People that are not integrated well into a group and therefore, represent both untapped skills and a high likelihood of turnover.• Highly expert people - Not being utilized appropriately.• Organizational subgroups or cliques - Can develop their own subcultures and negative attitudes toward other groups.
  18. 18. Kite network Analysis• Degree Centrality:-• In the kite network above, Diane has the most direct connections in the network, making hers the most active node in the network. She is a connector or hub in this network. Common wisdom in personal networks is "the more connections, the better." This is not always so. What really matters is where those connections lead to -- and how they connect the otherwise unconnected! Here Diane has connections only to others in her immediate cluster -- her clique. She connects only those who are already connected to each other.
  19. 19. Application of SNA:• Realizing 9/11 Al- Qaeda Network.• Build a grass roots political campaign.• Determine influential journalists and analysts in the IT industry.• Map executives personal network based on email flows.• Discover the network of Innovators in a regional economy.• Analyze book selling patterns to position a new book and many more……
  20. 20. Web Applications of Social Networks• Analyzing page importance – Page Rank • Related to recursive in-degree computation – Authorities/Hubs• Discovering Communities – Finding near-cliques• Analyzing Trust – Propagating Trust – Using propagated trust to fight spam • In Email • In Web page ranking
  21. 21. Society as a GraphPeople are represented as nodes.
  22. 22. Society as a GraphPeople are represented as nodes.Relationships are represented as edges. (Relationships may be acquaintanceship, friendship, co- authorship, etc.)Allows analysis using tools of mathematical graph theory
  23. 23. HOW SOCIAL NETWORKING WAS IMPLEMENTED IN 9-11 ATTACK • Literature Survey • Case StudyThe Black Hole of 9/11BY DAVID J. ROTHKOPF | AUGUST29, 2011
  24. 24. 19 Hijackers involved in 9-11 Attack And Their Networking
  25. 25. Khalid Sheikh Mohammed• History • Linked with Osama • Khalid Sheikh• He was born in Mohammed was a Kuwait in 1964. member of Osama bin Ladens terrorist• He is Mechanical group al- Qaeda organization, alth Engineer who ough he lived graduated from in Afghanistan, heading alQaedas propaganda o Chowan College in perations from 1986. sometime around 1999.
  26. 26. Networking Process!! In late 1998 or early 1999, bin Laden gave approval for Mohammed to go forward with organizing the plot. Bin Laden was also involved in selecting people to participate in the plot, including choosing Mohamed Atta as the lead hijacker. Bin Laden had been pressuring KSM (Khalid SheikhMohammed) for months to advance the attack date.
  27. 27. Modeling Terrorist NetworksOne of the earliest and mostinfluential maps was developed by ValdisKrebs (Krebs, 2001)
  28. 28. Within one week of the attack, We soon knew there were 19 hijackers, which planes theywere on, and which nations passports they had used to get into America. As more information about the hijackers past was uncovered I decided to map links of threestrengths (and corresponding thickness). Those living together or attending the same school or the same classes/training would havethe strongest ties. Those travelling together and participating in meetings together wouldhave ties of moderate strength and medium thickness.Finally, those who were recorded as having a single transaction together, or an occasionalmeeting, and no other ties, I classified as weak ties that were shown with the thinnest links inthe network.
  29. 29. Key points!After one month of investigation it wascommon knowledge that Mohamed Attawas the ring leader of this conspiracy.
  30. 30. Foot Steps of Atta!On September 10, 2001, Atta picked up Omari from the Milner Hotelin Boston, Massachusetts, and the two drove their rented Nissan Altima to a ComfortInn in South Portland, Maine; on the way they were seen getting gasoline atan Exxon Gas Station. They arrived at 5:43 p.m. and spent the night in room 232.While in South Portland, they were seen making two ATM withdrawals, and stoppingatWal-Mart. FBI also reported that "two middle-eastern men" were seen in theparking lot of a Pizza Hut
  31. 31. Atta and Omari arrived early the next morning, at5:40 a.m., at the Portland InternationalJetport, where they left their rental car in theparking lot and boarded a 6:00 a.m. Atta (blue shirt) and Omari in the Portland International Jetport in Portland, Maine on the morning of 9/11
  32. 32. *The hijacking began at 8:14 a.m.—15 minutes after the flight departed—when beverageservice would be starting. At this time, the pilots stopped responding to air trafficcontrol, and the aircraft began deviating from the planned route. At 8:18 a.m., flightattendants Betty Ong and Madeline Amy Sweeney began making phone calls to AmericanAirlines to report what was happening. Ong provided information about lack ofcommunication with the cockpit, lack of access to the cockpit, and passenger injuries*At 8:24:38 a.m., a voice believed to be Attas was heard by air traffic controllers, saying:"We have some planes. Just stay quiet and you will be OK. We are returning to the airport.""Nobody move, everything will be OK. If you try to make any moves youll endanger yourselfand the airplane. Just stay quiet..." "Nobody move please. We are going back to the airport.Dont try to make any stupid moves." The planes transponder was turned off at 8:28 a.m. At8:46:40 a.m., Atta crashed the Boeing 767 into the North Tower of the World Trade Center.This was the first aircraft to hit the Twin Towers on the morning of September 11, 2001
  33. 33. Car Dealer Adnan G. El Shukrijumah Linked to 9/11Hijacker Mohamed
  34. 34. Abstract:- Social networks are becoming more and more popular with the advent of numerous online social networking services. In this paper, we explore social rating networks, which record not only social relations but also user ratings for items. We distinguish two types of user behaviour: adopting an item and adopting a rating value for that item. We propose models to analyze and measure the influence of neighbours on both item and rating adoption behaviour of users.
  35. 35. • The main contributions of this paper are as follows:• We analyze the effect of social influence and correlation influence on item adoption and rating adoption in the Flixster and the Epinions dataset (section IV).• We present models for item and rating adoption, based on so-called influence coefficients (section V.A), and for the actual rating behaviour of users, based on their neighbours ratings (section V.B).
  36. 36. • We introduce the concept of social authority of individual users and a way to inject social authority into a recommender to improve the accuracy of recommendation in social networks (section VII).
  37. 37. CONCLUSIONSocial networks are becoming more and more popular with the adventof numerous social networking services online such asFacebook, MySpace, Flixster, etc. whichallow complex interactions among users. In this paper we focused on social rating networks: social networks inwhich users can express ratings on items. We explored the effect ofsocial and correlation influence on the behaviour of users. We analyzedand modelled the item adoption and rating adoption behaviour in socialand similarity networks.We proposed a simple model for rating behaviour of users. Ourexperiments on Epinions and Flixster demonstrated that the influencecoefficients in social networks are higher than those in similaritynetworks.
  38. 38. Literature Survey-2 • Seeking New Social Networking ModelsHow applications will adapt to the upcomingnetwork bandwidth perimeters and impact the SocialWeb topology.
  39. 39. • Abstract:- The Web is rapidly evolving form a human-to-machine to a human-to-human communication means. Unfortunately the current proliferation of Social Networking Web sites is generating fragmentation and lack of interoperability. In order to be in contact with friends users must be subscribed and upload their contents to the same online Social networking provider.In this paper we propose a concrete alternative to the current state of the art:overcoming vertical silos approach and enabling open, distributed and ContextAware Social Networking being respectful of users’ privacy and data ownership.Telecom Italia is investing in this research area within EU FP7 projectSOCIETIES.
  40. 40. INTRODUCTION• Despite the increasing success of the current isolated online Social Networking initiatives, several concerns are intrinsic to this mechanism data ownership.• In addition to that, the upcoming NGAN (Next generation access network) is promising a symmetric link of 100 Mb it to residential customer’s premises.
  41. 41. • A federated Social Networking platform could therefore permit individuals to be part of the Social Web and securely share their own multimedia resources in a fully distributed manner. USE CASE: BRIDGING PERSONAL SOCIAL ISLANDS
  42. 42. Accessing smart home contents from the Internet.
  43. 43. CONCLUSIONS Time has come to replace the Social Networking silo approach and unblock novel Social Area Network paradigmsDecentralizing Identity management and profile information will avoid a centralizedcontrol and ownership of data.A Social aware sharing of intelligent devices services may furthermore be seen as acompelling use case for the Internet of Things paradigm.
  44. 44. Refrences• Del Valle, ST, Hyman, JM, Hethcote, HW, and Eubank, SG. in review. Mixing patterns between age• groups using social networks.• Dugatkin, LA andWilson, DS. 1991. Rover: a strategy for exploiting cooperators in a patchy environment.• Am. Nat. 138:687-701.• Fishbein M, Higgins, DL, Rietmeijer, C & Wolitski, RJ. 1999. Community-level HIV Intervention in• 5 Cities: Final outcome data from the CDC AIDS Community Demonstration Projects. American• Journal of Public Health, 89(3): 336-345.• Hirshleifer, D and Rasmusen, E. 1989. Cooperation in a repeated Prisoners’ Dilemma with ostracism.• J. Econ. Behav. Organiz. 12: 87-106.• Hyman, JM, and Stanley, EA. 1988. Using Mathematical Models to Understand the AIDS epidemic.• Math. Biosci., 90:415-473.
  45. 45. Thanking You