Penetrating a Social Network: The Follow-back Problem

Penetrating a Social Network: The Follow-back Problem Fanyu Que, Krishnan Rajagopalan, Tauhid Zaman (Submitted on 8 Apr 2018) arXiv:1804.02608 [cs.SI] (or arXiv:1804.02608v1 [cs.SI] for this version) “Modern threats have emerged from the prevalence of social networks. Hostile actors, such as extremist groups or foreign governments, utilize these networks to run propaganda campaigns with different aims. For extremists, these campaigns are designed for recruiting new members or inciting violence. For foreign governments, the aim may be to create instability in rival nations. Proper social network counter-measures are needed to combat these threats. Here we present one important counter-measure: penetrating social networks. This means making target users connect with or follow agents deployed in the social network. Once such connections are established with the targets, the agents can influence them by sharing content which counters the influence campaign. In this work we…

Read more detail on Recent Law Librarian posts –

This entry was posted in Law Librarians and tagged , , , , . Bookmark the permalink.

Leave a Reply