{"id":"https://openalex.org/W1988867148","doi":"https://doi.org/10.1145/1998441.1998458","title":"Modeling data flow in socio-information networks","display_name":"Modeling data flow in socio-information networks","publication_year":2011,"publication_date":"2011-06-15","ids":{"openalex":"https://openalex.org/W1988867148","doi":"https://doi.org/10.1145/1998441.1998458","mag":"1988867148"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1998441.1998458","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100686453","display_name":"Ting Wang","orcid":"https://orcid.org/0000-0001-7414-5390"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"funder","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ting Wang","raw_affiliation_strings":["Georgia Institute of Technology Atlanta, GA, USA."],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA, USA.","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072108555","display_name":"Mudhakar Srivatsa","orcid":"https://orcid.org/0000-0002-5874-3750"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"funder","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mudhakar Srivatsa","raw_affiliation_strings":["IBM Research, Hawthorne, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM Research, Hawthorne, NY, USA","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111918968","display_name":"Dakshi Agrawal","orcid":"https://orcid.org/0000-0002-1641-4705"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"funder","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dakshi Agrawal","raw_affiliation_strings":["IBM Research, Hawthorne, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM Research, Hawthorne, NY, USA","institution_ids":["https://openalex.org/I1341412227"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100343991","display_name":"Ling Liu","orcid":"https://orcid.org/0000-0002-4138-3082"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"funder","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ling Liu","raw_affiliation_strings":["Georgia Institute of Technology Atlanta, GA, USA."],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology Atlanta, GA, USA.","institution_ids":["https://openalex.org/I130701444"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":11,"citation_normalized_percentile":{"value":0.752104,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":85,"max":86},"biblio":{"volume":null,"issue":null,"first_page":"113","last_page":"122"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9986,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.6317829},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.42955533},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.42937446},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.42579246},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.41669002}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.79746103},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.6317829},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5096407},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.48149502},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.42955533},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.42937446},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.42579246},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42441478},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.421413},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.41669002},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.40325564},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.39476773},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25457466},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.22274339},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17152688},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1282562},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1998441.1998458","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":23,"referenced_works":["https://openalex.org/W1495495588","https://openalex.org/W1592822201","https://openalex.org/W19838944","https://openalex.org/W1991895580","https://openalex.org/W2058347046","https://openalex.org/W2076004681","https://openalex.org/W2077943220","https://openalex.org/W2100583157","https://openalex.org/W2103317919","https://openalex.org/W2108104925","https://openalex.org/W2130789338","https://openalex.org/W2133299088","https://openalex.org/W2141885065","https://openalex.org/W2144860246","https://openalex.org/W2144992712","https://openalex.org/W2149342630","https://openalex.org/W2151078464","https://openalex.org/W2154103336","https://openalex.org/W2159055115","https://openalex.org/W2162171351","https://openalex.org/W2162195695","https://openalex.org/W2171022360","https://openalex.org/W2530521096"],"related_works":["https://openalex.org/W2477375555","https://openalex.org/W2389881553","https://openalex.org/W2360781613","https://openalex.org/W2157160400","https://openalex.org/W2143793665","https://openalex.org/W2138926267","https://openalex.org/W2106969392","https://openalex.org/W1646148796","https://openalex.org/W1595551935","https://openalex.org/W1556502211"],"abstract_inverted_index":{"Information":[0],"leakage":[1],"via":[2,104],"the":[3,80,88,105,188],"networks":[4,66],"formed":[5],"by":[6,22],"subjects":[7],"(e.g.,":[8,13,46],"Facebook,":[9],"Twitter)":[10],"and":[11,127,142,192],"objects":[12],"blogosphere)":[14],"-":[15,25,93,109,132],"some":[16],"of":[17,82,162,177],"whom":[18],"may":[19,35],"be":[20,36],"controlled":[21],"malicious":[23],"insiders":[24],"often":[26],"leads":[27],"to":[28,38,67,101,115,152,171],"unpredicted":[29],"access":[30,100,114],"control":[31],"risks.":[32],"While":[33],"it":[34],"impossible":[37],"precisely":[39],"quantify":[40],"information":[41,122],"flows":[42,123],"between":[43,124,140],"two":[44,47],"entities":[45],"friends":[48],"in":[49,63],"a":[50,56,69,95,135,154,160],"social":[51,138],"network),":[52],"this":[53],"paper":[54],"presents":[55],"first":[57],"attempt":[58],"towards":[59],"leveraging":[60],"recent":[61],"advances":[62],"modeling":[64],"socio-information":[65,83,173],"develop":[68,159],"statistical":[70],"risk":[71,146,165],"estimation":[72,166],"paradigm":[73],"for":[74],"quantifying":[75],"such":[76],"insider":[77],"threats.":[78],"In":[79],"context":[81],"networks,":[84],"our":[85,178],"models":[86],"estimate":[87],"following":[89],"likelihoods:":[90],"prior":[91],"flow":[92,108],"has":[94],"subject":[96,125],"$s$":[97],"acquired":[98],"covert":[99],"object":[102,128],"o":[103],"networks?":[106],"posterior":[107],"if":[110],"s":[111,141],"is":[112,118,150,180],"granted":[113],"o,":[116],"what":[117],"its":[119],"impact":[120],"on":[121],"s'":[126,143],"o'?":[129],"network":[130],"evolution":[131],"how":[133],"will":[134],"newly":[136],"created":[137],"relationship":[139],"influence":[144],"current":[145],"estimates?":[147],"Our":[148],"goal":[149],"not":[151],"prescribe":[153],"one-size-fits-all":[155],"solution;":[156],"instead":[157],"we":[158],"set":[161],"composable":[163],"network-centric":[164],"operators,":[167],"with":[168],"implementations":[169],"configurable":[170],"concrete":[172],"networks.":[174],"The":[175],"efficacy":[176],"solutions":[179],"empirically":[181],"evaluated":[182],"using":[183],"real-life":[184],"datasets":[185],"collected":[186],"from":[187],"IBM":[189],"SmallBlue":[190],"project":[191],"Twitter.":[193]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1988867148","counts_by_year":[{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":2}],"updated_date":"2025-03-24T08:33:08.965037","created_date":"2016-06-24"}