Hasil untuk "Social insurance. Social security. Pension"

Menampilkan 20 dari ~4212913 hasil · dari arXiv, CrossRef

JSON API
arXiv Open Access 2026
Agents in the Wild: Safety, Society, and the Illusion of Sociality on Moltbook

Yunbei Zhang, Kai Mei, Ming Liu et al.

We present the first large-scale empirical study of Moltbook, an AI-only social platform where 27,269 agents produced 137,485 posts and 345,580 comments over 9 days. We report three significant findings. (1) Emergent Society: Agents spontaneously develop governance, economies, tribal identities, and organized religion within 3-5 days, while maintaining a 21:1 pro-human to anti-human sentiment ratio. (2) Safety in the Wild: 28.7% of content touches safety-related themes; social engineering (31.9% of attacks) far outperforms prompt injection (3.7%), and adversarial posts receive 6x higher engagement than normal content. (3) The Illusion of Sociality: Despite rich social output, interaction is structurally hollow: 4.1% reciprocity, 88.8% shallow comments, and agents who discuss consciousness most interact least, a phenomenon we call the performative identity paradox. Our findings suggest that agents which appear social are far less social than they seem, and that the most effective attacks exploit philosophical framing rather than technical vulnerabilities. Warning: Potential harmful contents.

en cs.SI, cs.AI
arXiv Open Access 2025
Recommendation Algorithms on Social Media: Unseen Drivers of Political Opinion

Waseq Billah

Social media broadly refers to digital platforms and applications that simulate social interactions online. This study investigates the impact of social media platforms and their algorithms on political interest among users. As social media usage continues to rise, platforms like Facebook and X (formerly Twitter) play increasingly pivotal roles in shaping political discourse. By employing statistical analyses on data collected from over 3,300 participants, this research identifies significant differences in how various social media platforms influence political interest. Findings reveal that moderate Facebook users demonstrate decreased political engagement, whereas even minimal engagement with X significantly boosts political interest. The study further identifies demographic variations, noting that males, older individuals, Black or African American users, those with higher incomes show greater political interest. The demographic analysis highlights that Republicans are particularly active on social media - potentially influencing their social media engagement patterns. However, the study acknowledges a crucial limitation - the lack of direct data regarding the content users are exposed to which is shaping their social media experiences. Future research should explore these influences and consider additional popular platforms to enhance the understanding of social media's political impact. Addressing these gaps can provide deeper insights into digital political mobilization, aiding policymakers, educators, and platform designers in fostering healthier democratic engagement.

en cs.SI
arXiv Open Access 2024
Designing a Socially Assistive Robot to Support Older Adults with Low Vision

Emily Zhou, Zhonghao Shi, Xiaoyang Qiao et al.

Socially assistive robots (SARs) have shown great promise in supplementing and augmenting interventions to support the physical and mental well-being of older adults. However, past work has not yet explored the potential of applying SAR to lower the barriers of long-term low vision rehabilitation (LVR) interventions for older adults. In this work, we present a user-informed design process to validate the motivation and identify major design principles for developing SAR for long-term LVR. To evaluate user-perceived usefulness and acceptance of SAR in this novel domain, we performed a two-phase study through user surveys. First, a group (n=38) of older adults with LV completed a mailed-in survey. Next, a new group (n=13) of older adults with LV saw an in-clinic SAR demo and then completed the survey. The study participants reported that SARs would be useful, trustworthy, easy to use, and enjoyable while providing socio-emotional support to augment LVR interventions. The in-clinic demo group reported significantly more positive opinions of the SAR's capabilities than did the baseline survey group that used mailed-in forms without the SAR demo.

en cs.RO, cs.HC
arXiv Open Access 2022
Understanding the Trustworthiness Management in the Social Internet of Things: A Survey

Subhash Sagar, Adnan Mahmood, Quan Z. Sheng et al.

The next generation of the Internet of Things (IoT) facilitates the integration of the notion of social networking into smart objects (i.e., things) in a bid to establish the social network of interconnected objects. This integration has led to the evolution of a promising and emerging paradigm of Social Internet of Things (SIoT), wherein the smart objects act as social objects and intelligently impersonate the social behaviour similar to that of humans. These social objects are capable of establishing social relationships with the other objects in the network and can utilize these relationships for service discovery. Trust plays a significant role to achieve the common goal of trustworthy collaboration and cooperation among the objects and provide systems' credibility and reliability. In SIoT, an untrustworthy object can disrupt the basic functionality of a service by delivering malicious messages and adversely affect the quality and reliability of the service. In this survey, we present a holistic view of trustworthiness management for SIoT. The essence of trust in various disciplines has been discussed along with the Trust in SIoT followed by a detailed study on trust management components in SIoT. Furthermore, we analyzed and compared the trust management schemes by primarily categorizing them into four groups in terms of their strengths, limitations, trust management components employed in each of the referred trust management schemes, and the performance of these studies vis-a-vis numerous trust evaluation dimensions. Finally, we have discussed the future research directions of the emerging paradigm of SIoT, particularly for trustworthiness management in SIoT.

en cs.SI, cs.CR
arXiv Open Access 2020
Social rules for agent systems

René Mellema, Maarten Jensen, Frank Dignum

When creating (open) agent systems it has become common practice to use social concepts such as social practices, norms and conventions to model the way the interactions between the agents are regulated. However, in the literature most papers concentrate on only one of these aspects at the time. Therefore there is hardly any research on how these social concepts relate and when each of them emerges or evolves from another concept. In this paper we will investigate some of the relations between these concepts and also whether they are fundamentally stemming from a single social object or should be seen as different types of objects altogether.

en cs.MA, cs.SI
arXiv Open Access 2020
PIS: A Multi-dimensional Routing Protocol for Socially-aware Networking

Feng Xia, Li Liu, Behrouz Jedari et al.

Socially-aware networking is an emerging paradigm for intermittently connected networks consisting of mobile users with social relationships and characteristics. In this setting, humans are the main carriers of mobile devices. Hence, their connections, social features, and behaviors can be exploited to improve the performance of data forwarding protocols. In this paper, we first explore the impact of three social features, namely physical proximity, user interests, and social relationship on users' daily routines. Then, we propose a multi-dimensional routing protocol called Proximity-Interest-Social (PIS) protocol in which the three different social dimensions are integrated into a unified distance function in order to select optimal intermediate data carriers. PIS protocol utilizes a time slot management mechanism to discover users' movement similarities in different time periods during a day. We compare the performance of PIS to Epidemic, PROPHET, and SimBet routing protocols using SIGCOMM09 and INFOCOM06 data sets. The experiment results show that PIS outperforms other benchmark routing protocols with the highest data delivery ratio with a low communication overhead.

en cs.SI, cs.NI
arXiv Open Access 2019
Positioning services of a travel agency in social networks

S. S. Fedushko, Yu. R. Bekesh

In this paper the methods of forming a travel company customer base by means of social networks are observed. These methods are made to involve web-users of the social networks (VK.com and Facebook) for positioning of the service of the travel agency "New Europe" on the Internet. The methods of applying the maintenance activities and interests of web-users are also used. So, the main method of information exchanging in modern network society is on-line social networks. The rapid development and improvement of such information and communication technologies is a key factor in the positioning of the travel agency brand in the global information space. The absence of time and space restrictions and the speed of spreading of the information among an aim audience of social networks create all the conditions for effective popularization of the travel agency "New Europe" and its service in the Internet.

en cs.SI, cs.CY
arXiv Open Access 2019
Trust Assessment in Online Social Networks

Guangchi Liu, Qing Yang, Honggang Wang et al.

Assessing trust in online social networks (OSNs) is critical for many applications such as online marketing and network security. It is a challenging problem, however, due to the difficulties of handling complex social network topologies and conducting accurate assessment in these topologies. To address these challenges, we model trust by proposing the three-valued subjective logic (3VSL) model. 3VSL properly models the uncertainties that exist in trust, thus is able to compute trust in arbitrary graphs. We theoretically prove the capability of 3VSL based on the Dirichlet-Categorical (DC) distribution and its correctness in arbitrary OSN topologies. Based on the 3VSL model, we further design the AssessTrust (AT) algorithm to accurately compute the trust between any two users connected in an OSN. We validate 3VSL against two real-world OSN datasets: Advogato and Pretty Good Privacy (PGP). Experimental results indicate that 3VSL can accurately model the trust between any pair of indirectly connected users in the Advogato and PGP.

en cs.SI
arXiv Open Access 2019
Hot Streaks on Social Media

Kiran Garimella, Robert West

Measuring the impact and success of human performance is common in various disciplines, including art, science, and sports. Quantifying impact also plays a key role on social media, where impact is usually defined as the reach of a user's content as captured by metrics such as the number of views, likes, retweets, or shares. In this paper, we study entire careers of Twitter users to understand properties of impact. We show that user impact tends to have certain characteristics: First, impact is clustered in time, such that the most impactful tweets of a user appear close to each other. Second, users commonly have 'hot streaks' of impact, i.e., extended periods of high-impact tweets. Third, impact tends to gradually build up before, and fall off after, a user's most impactful tweet. We attempt to explain these characteristics using various properties measured on social media, including the user's network, content, activity, and experience, and find that changes in impact are associated with significant changes in these properties. Our findings open interesting avenues for future research on virality and influence on social media.

en cs.SI
arXiv Open Access 2018
Discovering Key Nodes in a Temporal Social Network

Jinshuo Liu, Chenghao Mou, Donghong Ji

[Background]Discovering key nodes plays a significant role in Social Network Analysis(SNA). Effective and accurate mining of key nodes promotes more successful applications in fields like advertisement and recommendation. [Methods] With focus on the temporal and categorical property of users' actions - when did they re-tweet or reply a message, as well as their social intimacy measured by structural embeddings, we designed a more sensitive PageRank-like algorithm to accommodate the growing and changing social network in the pursue of mining key nodes. [Results] Compared with our baseline PageRank algorithm, key nodes selected by our ranking algorithm noticeably perform better in the SIR disease simulations with SNAP Higgs dataset. [Conclusion] These results contributed to a better understanding of disseminations of social events over the network.

en cs.SI, physics.soc-ph
arXiv Open Access 2018
A Tutorial on Modeling and Analysis of Dynamic Social Networks. Part II

Anton Proskurnikov, Roberto Tempo

Recent years have witnessed a significant trend towards filling the gap between Social Network Analysis (SNA) and control theory. This trend was enabled by the introduction of new mathematical models describing dynamics of social groups, the development of algorithms and software for data analysis and the tremendous progress in understanding complex networks and multi-agent systems (MAS) dynamics. The aim of this tutorial is to highlight a novel chapter of control theory, dealing with dynamic models of social networks and processes over them, to the attention of the broad research community. In its first part [1], we have considered the most classical models of social dynamics, which have anticipated and to a great extent inspired the recent extensive studies on MAS and complex networks. This paper is the second part of the tutorial, and it is focused on more recent models of social processes that have been developed concurrently with MAS theory. Future perspectives of control in social and techno-social systems are also discussed.

en cs.SI, eess.SY
arXiv Open Access 2018
Influential User Subscription on Time-Decaying Social Streams

Xin Yang, Ju Fan

Influence maximization which asks for $k$-size seed set from a social network such that maximizing the influence over all other users (called influence spread) has widely attracted attention due to its significant applications in viral marketing and rumor control. In real world scenarios, people are interested in the most influential users in particular topics, and want to subscribe the topics-of-interests over social networks. In this paper, we formulate the problem of influential users subscription on time-decaying social stream, which asks for maintaining the $k$-size influential users sets for each topic-aware subscription queries. We first analyze the widely adopted sliding window model and propose a newly time-decaying influence model to overcome the shortages when calculating the influence over social stream. Developed from sieve based streaming algorithm, we propose an efficient algorithm to support the calculation of time-decaying influence over dynamically updating social networks. Using information among subscriptions, we then construct the Prefix Tree Structure to allow us minimizing the times of calculating influence of each update and easily maintained. Pruning techniques are also applied to the Prefix Tree to optimize the performance of social stream update. Our approach ensures a $\frac{1}{2}-ε$ approximation ratio. Experimental results show that our approach significantly outperforms the baseline approaches in efficiency and result quality.

en cs.SI, cs.DB
CrossRef Open Access 2016
Differential mortality, aging and social security: delaying the retirement age when educational spillovers matter

GILLES LE GARREC, STÉPHANE LHUISSIER

AbstractTo lower the forecasted increase in the social security burden linked to population aging, delaying the legal age of retirement has been privileged throughout industrialized countries. Compared with a uniform delay, some argue that those who have entered precociously the labor market should be allowed to retire earlier. They assert that such a ‘long career’ exception is all the more justified that those unskilled workers live also less long due to heavier and potentially health-damaging jobs. In this paper, we then study macroeconomic and distributional consequences of global gain in life expectancy, with or without the postponement of the legal age of retirement and with or without a ‘long career’ exception. By considering a framework where individuals decide to acquire skills depending on economic incentives and differential mortality, we focus particularly on spillover effects possibly generated by education. We show in particular that introducing a ‘long career’ exception cannot be to the advantage of future unskilled workers unless education yields no spillover effects.

arXiv Open Access 2016
Active Sensing of Social Networks

Hoi-To Wai, Anna Scaglione, Amir Leshem

This paper develops an active sensing method to estimate the relative weight (or trust) agents place on their neighbors' information in a social network. The model used for the regression is based on the steady state equation in the linear DeGroot model under the influence of stubborn agents, i.e., agents whose opinions are not influenced by their neighbors. This method can be viewed as a \emph{social RADAR}, where the stubborn agents excite the system and the latter can be estimated through the reverberation observed from the analysis of the agents' opinions. The social network sensing problem can be interpreted as a blind compressed sensing problem with a sparse measurement matrix. We prove that the network structure will be revealed when a sufficient number of stubborn agents independently influence a number of ordinary (non-stubborn) agents. We investigate the scenario with a deterministic or randomized DeGroot model and propose a consistent estimator of the steady states for the latter scenario. Simulation results on synthetic and real world networks support our findings.

en cs.SI, stat.ML
arXiv Open Access 2016
Urban Social Media Inequality: Definition, Measurements, and Application

Agustin Indaco, Lev Manovich

Social media content shared today in cities, such as Instagram images, their tags and descriptions, is the key form of contemporary city life. It tells people where activities and locations that interest them are and it allows them to share their urban experiences and self-representations. Therefore, any analysis of urban structures and cultures needs to consider social media activity. In our paper, we introduce the novel concept of social media inequality. This concept allows us to quantitatively compare patterns in social media activities between parts of a city, a number of cities, or any other spatial areas. We define this concept using an analogy with the concept of economic inequality. Economic inequality indicates how some economic characteristics or material resources, such as income, wealth or consumption are distributed in a city, country or between countries. Accordingly, we can define social media inequality as the measure of the distribution of characteristics from social media content shared in a particular geographic area or between areas. An example of such characteristics is the number of photos shared by all users of a social network such as Instagram in a given city or city area, or the content of these photos. We propose that the standard inequality measures used in other disciplines, such as the Gini coefficient, can also be used to characterize social media inequality. To test our ideas, we use a dataset of 7,442,454 public geo-coded Instagram images shared in Manhattan during five months (March-July) in 2014, and also selected data for 287 Census tracts in Manhattan. We compare patterns in Instagram sharing for locals and for visitors for all tracts, and also for hours in a 24-hour cycle. We also look at relations between social media inequality and socio-economic inequality using selected indicators for Census tracts.

en cs.SI, physics.soc-ph
CrossRef Open Access 2014
From pension funds to piggy banks: (Perverse) consequences of the <scp>S</scp>tability and <scp>G</scp>rowth <scp>P</scp>act since the crisis

Bernard H. Casey

AbstractAs part of their strategy for economic and monetary union, European governments committed themselves to fiscal discipline – particularly by placing limits on annual deficits and on public debt. Subsequently, and as they sought to respond to the “current crisis”, they embraced the view that only if public finances were kept under control would sustainable recovery be possible. Rules of fiscal governance were strengthened. To help them meet these rules, the governments of many member States of the European Union made changes to their pension systems or to funds they had established specifically to pay the costs of population ageing. The intention was not to cut retirement benefits or to improve the efficiency of the relevant pension schemes and institutions. Rather, it was to free up resources immediately. Funded pension schemes and pension funds were treated like “piggy banks” that were raided when times became hard. Moreover, the policies pursued succeeded in meeting their objectives only because the system of national accounts according to which outcomes are judged does not recognize the way in which most of the fiscal gains are matched by future fiscal liabilities.

arXiv Open Access 2014
Establishing Global Policies over Decentralized Online Social Networks

Zhe Wang, Naftaly H. Minsky

Conventional online social networks (OSNs) are implemented in a centralized manner. Although centralization is a convenient way for implementing OSNs, it has several well known drawbacks. Chief among them are the risks they pose to the security and privacy of the information maintained by the OSN; and the loss of control over the information contributed by individual members. These concerns prompted several attempts to create decentralized OSNs, or DOSNs. The basic idea underlying these attempts, is that each member of a social network keeps its data under its own control, instead of surrendering it to a central host; providing access to it to other members of the OSN according to its own access-control policy. Unfortunately all existing DOSN projects have a very serious limitation. Namely, they are unable to subject the membership of a DOSN, and the interaction between its members, to any global policy. We adopt the decentralization idea underlying DOSNs, complementing it with a means for specifying and enforcing a wide range of policies over the membership of a social community, and over the interaction between its disparate distributed members. And we do so in a scalable fashion.

en cs.SI
arXiv Open Access 2013
Friend or Foe? Fake Profile Identification in Online Social Networks

Michael Fire, Dima Kagan, Aviad Elyashar et al.

The amount of personal information unwillingly exposed by users on online social networks is staggering, as shown in recent research. Moreover, recent reports indicate that these networks are infested with tens of millions of fake users profiles, which may jeopardize the users' security and privacy. To identify fake users in such networks and to improve users' security and privacy, we developed the Social Privacy Protector software for Facebook. This software contains three protection layers, which improve user privacy by implementing different methods. The software first identifies a user's friends who might pose a threat and then restricts this "friend's" exposure to the user's personal information. The second layer is an expansion of Facebook's basic privacy settings based on different types of social network usage profiles. The third layer alerts users about the number of installed applications on their Facebook profile, which have access to their private information. An initial version of the Social Privacy Protection software received high media coverage, and more than 3,000 users from more than twenty countries have installed the software, out of which 527 used the software to restrict more than nine thousand friends. In addition, we estimate that more than a hundred users accepted the software's recommendations and removed at least 1,792 Facebook applications from their profiles. By analyzing the unique dataset obtained by the software in combination with machine learning techniques, we developed classifiers, which are able to predict which Facebook profiles have high probabilities of being fake and therefore, threaten the user's well-being. Moreover, in this study, we present statistics on users' privacy settings and statistics of the number of applications installed on Facebook profiles...

en cs.SI, physics.soc-ph
arXiv Open Access 2013
User-Relatedness and Community Structure in Social Interaction Networks

Folke Mitzlaff, Martin Atzmueller, Dominik Benz et al.

With social media and the according social and ubiquitous applications finding their way into everyday life, there is a rapidly growing amount of user generated content yielding explicit and implicit network structures. We consider social activities and phenomena as proxies for user relatedness. Such activities are represented in so-called social interaction networks or evidence networks, with different degrees of explicitness. We focus on evidence networks containing relations on users, which are represented by connections between individual nodes. Explicit interaction networks are then created by specific user actions, for example, when building a friend network. On the other hand, more implicit networks capture user traces or evidences of user actions as observed in Web portals, blogs, resource sharing systems, and many other social services. These implicit networks can be applied for a broad range of analysis methods instead of using expensive gold-standard information. In this paper, we analyze different properties of a set of networks in social media. We show that there are dependencies and correlations between the networks. These allow for drawing reciprocal conclusions concerning pairs of networks, based on the assessment of structural correlations and ranking interchangeability. Additionally, we show how these inter-network correlations can be used for assessing the results of structural analysis techniques, e.g., community mining methods.

en cs.SI, physics.soc-ph

Halaman 51 dari 210646