Modeling Virtual Footprints

نویسندگان

  • Rajiv Kadaba
  • Suratna Budalakoti
  • David DeAngelis
  • K. Suzanne Barber
چکیده

Entities interacting on the web establish their identity by creating virtual personas. These entities, or agents, can be human users or software-based. This research models identity using the Entity-Persona Model, a semantically annotated social network inferred from the persistent traces of interaction between personas on the web. A Persona Mapping Algorithm is proposed which compares the local views of personas in their social network referred to as their Virtual Signatures, for structural and semantic similarity. The semantics of the Entity-Persona Model are modeled by a vector space model of the text associated with the personas in the network, which allows comparison of their Virtual Signatures. This enables all the publicly accessible personas of an entity to be identified on the scale of the web. This research enables an agent to identify a single entity using multiple personas on different networks, provided that multiple personas exhibit characteristic behavior. The agent is able to increase the trustworthiness of on-line interactions by establishing the identity of entities operating under multiple personas. Consequently, reputation measures based on on-line interactions with multiple personas can be aggregated and resolved to the true singular identity. a name and its associated attributes, which an entity uses to communicate with other personas. The virtual world in the context of this research refers collectively to various explicit or inferred social networks. Examples of explicit social networks are websites such as Facebook, Orkut, MySpace, and LinkedIn. Social networks can be inferred from the digital traces of interaction between entities, or individuals, on the Internet, such as in the blogosphere (Kumar et al., 2004), online discussion forums, knowledge sharing sites, IRC logs and the co-occurrence of names in the large amount of textual data on the Internet (Jin et al., 2007). In an explicit social DOI: 10.4018/jats.2011040101 2 International Journal of Agent Technologies and Systems, 3(2), 1-17, April-June 2011 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. network there exists a framework by which entities can specify to whom they are related and the context of this relationship. Access to explicit networks is generally controlled (Grimmelmann, 2008) because of the privacy concerns of its participants (Acquisti & Gross, 2006). Inferred social networks lack the privacy mechanisms of explicit networks as its users assume they are as anonymous as they wish to be. The work in this paper counters this assumption since users must engage in consistent and information rich interactions in order to provide value to the framework. The establishment of the reputation of an entity’s virtual persona within the framework is an important motivating factor for its consistent use, as others use reputation to assess the reliability of information associated with the persona (Donath, 1999). Every new persona created will need to establish its reputation within its social network, which requires time and effort. This penalty associated with creating a persona which is capable of meaningful interaction makes a persona valuable. Virtual personas with erratic interactions are not worth detecting as they have little value. In a more general sense; an entity is an agent interacting within a multi agent framework. An agent could be a software program that acts according to an internally specified set of goals, or objectives. An agent can also be a dedicated piece of hardware designed to accomplish a particular task in the virtual world. An agent can even be a team of humans operating under a common goal. This research explores the canonical example of matching multiple virtual personas to a single human entity. Search engines treat personal names and pseudonyms as keywords, giving virtual personas the same status as ordinary text. Queries for people’s names only find occurrences with verbatim matches to the query text while they may have interacted extensively, using various personas. The model proposed in this paper can be used to find more accurate results for the information associated with an individual available publicly on the web. Augmenting web search with the ability to link entities and their personas can be perceived as an attack on an individual’s privacy, as information which may have been exchanged with the expectation of anonymity granted by a virtual persona is now linked back to its progenitor. Conversely this research can also contribute to an individual’s ability to safeguard their privacy and protect their identity from theft. As the concept of identity in the virtual world is formalized and an upper bound on the ability of a determined adversarial agent is found, techniques to remain anonymous in spite of sophisticated statistical tools can be developed. Further, software agents who are capable of warning users of the unintended inferences which can be made with the data they publish may also be possible. The proposed technique for resolving multiple personas requires that an entity exhibit characteristic behavior across multiple personas. Measurable entity behaviors can be both content-based and link-based. Content-based behaviors include the creation of text content as well as any metadata created by the entity such as endorsements of other content. Link-based behaviors include any action which defines the structure of a network, such as message passing or “befriending”. One application of this research is in the task of anti-aliasing in social networks. Anti-aliasing (Novak et al., 2004) is the task of identifying when a single user has multiple aliases in a social network. This is important in trust networks, as a distrusted user or set of users, after being removed from a network (by a moderator, for example), can insert themselves into a network at a later point in time with a pseudonym. Agents capable of continuously associating personas with the singular identity of an entity will offer increased assurance of entity reputations based on interactions of associated personas. The proposed technique is not designed to resolve multiple personas into a single entity when that entity exhibits completely different behavior in different networks. One example is the task of resolving a person with two social networks: a professional network, and a personal network. The person may not speak (create content) about similar topics, and he 15 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/article/modeling-virtualfootprints/55226?camid=4v1 This title is available in InfoSci-Journals, InfoSci-Journal Disciplines Computer Science, Security, and Information Technology. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=2

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigation of Virtual Water and Ecological Footprints of Water in Wheat Fields of Isfahan Province

Despite the recent droughts in Isfahan province, climatic changes and the rising trend of population growth, as well as development of industrial and agricultural activities, are exposed to the water crisis. Thus, in order to tackle this problem, the essential strategies should including exploring virtual water and water foot print for strategic crops in agricultural sector should be taken into...

متن کامل

Virtual Walls: Protecting Digital Privacy in Pervasive Environments

As pervasive environments become more commonplace, the privacy of users is placed at increased risk. The numerous and diverse sensors in these environments can record users’ contextual information, leading to users unwittingly leaving “digital footprints.” Users must thus be allowed to control how their digital footprints are reported to third parties. While a significant amount of prior work h...

متن کامل

Virtual Putty: Reshaping the Physical Footprint of Virtual Machines

Virtualization is a key technology underlying cloud computing platforms, where applications encapsulated within virtual machines are dynamically mapped onto a pool of physical servers. In this paper, we argue that cloud providers can significantly lower operational costs, and improve hosted application performance, by accounting for affinities and conflicts between co-placed virtual machines. W...

متن کامل

A Validation Study of a Novel 3-Dimensional MRI Modeling Technique to Identify the Anatomic Insertions of the Anterior Cruciate Ligament

BACKGROUND Anatomic single bundle anterior cruciate ligament (ACL) reconstruction is the current gold standard in ACL reconstructive surgery. However, placement of femoral and tibial tunnels at the anatomic center of the ACL insertion sites can be difficult intraoperatively. We developed a "virtual arthroscopy" program that allows users to identify ACL insertions on preoperative knee magnetic r...

متن کامل

Automatic Building Extraction from DEMs using an Object Approach and Application to the 3D-city Modeling

In this paper, we present an automatic building extraction method based on an object approach from Digital Elevation Models. First, a rough approximation of the building footprints is realized by a method based on marked point processes: the building footprints are modeled by rectangle layouts. Then, these rectangular footprints are regularized by improving the connection between the neighborin...

متن کامل

Modeling Structural Relationships of Meta-Cognitive Situations with Tendency to Virtual Networks through Mediating of Emotional Processing in Gifted Students

Background: Cyberspace covers many aspects of human life and tendency to cyberspace can be influenced by cognitive and emotional dimensions. Thus, the aim of this study was modeling structural relationships of meta-cognitive situations with tendency for virtual networks through mediating emotional processing in gifted students. Methods: The research method was descriptive-correlation and in pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJATS

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2011