A Blockchain Enhanced Framework for Social Networking
Social networking sites have given users unprecedented opportunities for the generation and dissemination of content. A variety of social networking sites exist for different purposes, to afford users a range of anonymous and non-anonymous options for self-expression, and the ability to be a part of a virtual community. These “affordances” enable users to create and share content; however, the ability to partially or wholly detach user identity from the content has resulted in unique challenges for content access and content attribution. This paper proposes a framework for secure, trustworthy social networking that also creates value for user-generated content by using a blockchain-enhanced framework for social networking. This work explains the application of such a framework for collocated spaces of robots and IoT devices and identifies key challenges that result as a consequence of merging social networking sites and blockchain technology.
Adikari, S., Dutta, K. “Identifying Fake Profiles in LinkedIn.” In PACIS 2014 Proceedings 278 (2014) https://aisel.aisnet.org/pacis2014/278.
Asano, E. “How Much Time Do People Spend on Social Media?” (accessed 16 November 2018) https://www.socialmediatoday.com/marketing/how-much-time-do-people-spend-social-media-infographic.
Balkin, J. M. “2016 Sidley Austin Distinguished Lecture on Big Data Law and Policy: The Three Laws of Robotics in the Age of Big Data.” Ohio St. LJ 78 http://hdl.handle.net/1811/85769
Calvaresi, D., Dubovitskaya, A., Calbimonte, J., Taveter, K., Schumacher, M. “Multi-Agent Systems and Blockchain: Results from a Systematic Literature Review.” In A. Demazeau, B. An, J. Bajo, A. Fernández-Caballero (Eds.), Proceedings of the International Conference on Practical Applications of Agents and Multi-Agent Systems Springer 110–126 (2018) https://doi.org/10.1007/978-3-319-94580-4_9.
Castelló Ferrer, E. “The Blockchain: A New Framework for Robotic Swarm Systems.” In Proceedings of the Future Technologies Conference (FTC) 2018 Cham: Springer 1037–1058 (2018) https://dx.doi.org/10.1007/978-3-030-02683-7_77.
Castelló Ferrer, E., Rudovic, O., Hardjono, T., Pentland, A. “RoboChain: A Secure Data-Sharing Framework for Human-Robot Interaction.” arXiv (2018) (accessed 9 March 2019) http://arxiv.org/abs/1802.04480.
Christofides, E., Muise, A., Desmarais, S. “Information Disclosure and Control on Facebook: Are They Two Sides of the Same Coin Or Two Different Processes?” Cyberpsychology and Behavior 12.3 341–345 (2009) https://doi.org/10.1089/cpb.2008.0226.
Clancy, T. “Blockchain Matching Platforms: An Innovative Way to Connect with Peers.” (accessed 16 November 2018) https://www.ccn.com/blockchain-matching-platforms-an-innovative-way-to-connect-with-peers/.
Conti, M., Poovendran, R., Secchiero, M. “Fakebook: Detecting Fake Profiles in Online Social Networks.” In Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM) 1071–1078 (2012) https://doi.org/10.1109/ASONAM.2012.185.
Daniel, J., Sargolzaei, A., Abdelghani, M., Sargolzaei, S., B., A. “Blockchain Technology, Cognitive Computing, and Healthcare Innovations.” Journal of Advances in Information Technology 8.3 194–198 (2017) https://doi.org/10.12720/jait.8.3.194-198.
De Cristofaro, E., Friedman, A., Jourjon, G., Kaafar, M., Shafiq, M. “Paying for Likes? Understanding Facebook-like Fraud Using Honeypots.” In Proceedings of the 2014 Conference on Internet Measurement Conference 129–136 (2014) http://dx.doi.org/10.1145/2663716.2663729.
deLaRosa, J., et al. “A Survey of Blockchain Technologies for Open Innovation.” In Proceedings of the 4th Annual World Open Innovation Conference 14–15 (2017) .
Fire, M., Katz, G., Elovici, Y. “Strangers Intrusion Detection-detecting Spammers and Fake Profiles in Social Networks Based on Topology Anomalies.” Human Journal 1.1 26–39 (2012).
Folstad, A., Brandtzaeg, P. “Chatbots and The New World of HCI.” Interactions 24 38–42 (2017) https://doi.org/10.1145/3085558.
Gleicher, N. “Removing Bad Actors from Facebook.” (accessed 16 November 2018) https://newsroom.fb.com/news/2018/06/removing-bad-actors-from-facebook/.
Gujarala, S., White, J., Hudson, B., Matthews, J. “Fake Twitter Accounts: Profile Characteristics Obtained Using an Activity-based Pattern Detection Approach.” In Proceedings of the 2015 International Conference on Social Media and Society (2015) https://doi.org/10.1145/2789187.2789206.
Heinzelman, W., Chandrakasan, A., Balakrishnan, H. “Energy-efficient Communication Protocol for Wireless Microsensor Networks.” In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (2000) https://doi.org/10.1109/HICSS.2000.926982.
Horton, H. “Microsoft Deletes ‘Teen Girl’ AI After it Became a Hitler-loving Sex Robot Within 24 Hours.” The Telegraph 24 https://www.telegraph.co.uk/technology/2016/03/24/microsofts-teen-girl-ai-turns-into-a-hitler-loving-sex-robot-wit/.
Huckle, S., Bhattacharya, R., White, M., Beloff, N. “Internet of Things, Blockchain and Shared Economy Applications.” Procedia Computer Science 98 461–466 (2016) https://doi.org/10.1016/j.procs.2016.09.074.
Hughes, E., Graham, L., Rowley, L., Lowe, R. “Unlocking Blockchain: Embracing New Technologies to Drive Efficiency and Empower the Citizen.” The Journal of the British Banking Association 5 http://dx.doi.org/10.31585/jbba-1-2-(1)2018.
Kang, J., Yu, R., Huang, X., Maharjan, S., Zhang, Y., Hossain, E. “Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains.” IEEE Transactions on Industrial Informatics 13 3154–64 (2017) https://doi.org/10.1109/TII.2017.2709784.
Kapitonov, A., Lonshakov, S., Krupenkin, A., Berman, I. “Blockchain-Based Protocol of Autonomous Business Activity for Multi-Agent Systems Consisting of UAVs.” In 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS) 84–89 (2017) https://doi.org/10.1109/RED-UAS.2017.8101648.
Kashevnik, A., Teslya, N. “Blockchain-oriented Coalition Formation by CPS Resources: Ontological Approach and Case Study.” Electronics 7.5 https://doi.org/10.3390/electronics7050066.
Leskovec, J., Huttenlocher, D., Kleinberg, J. “Signed Networks in Social Media.” In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 1361–1370 (2010) https://doi.org/10.1145/1753326.1753532.
Maupin, J. “The G20 Countries Should Engage with Blockchain Technologies to Build An Inclusive, Transparent, and Accountable Digital Economy For All.” Economics Discussion Papers https://www.g20-insights.org/policy_briefs/g20-countries-engage-blockchain-technologies-build-inclusive-transparent-accountable-digital-economy/.
McAdams, D. P. “The Psychology of Life Stories.” Review of General Psychology 5.2 100–122 (2001) https://doi.org/10.1037//1089-2622.214.171.124.
McEvily, N., et al. “An Incentivized Blockchain Enabled Multimedia Ecosystem.” (2018) Whitepaper (accessed 9 March 2019) https://cdn.current.us/whitepaper.pdf.
Morris, M. R., Teevan, J., Panovich, K. “What Do People Ask Their Social Networks, And Why? A Survey Study of Status Message Q&A Behavior.” In Proceedings of the SIGCHI Conference on Human factors in Computing Systems 39–48 (2010) https://doi.org/10.1145/1753326.1753587.
Murimi, R. “On Sharing Preferences in Social Networks.” In Proceedings of the 49th Annual Meeting of the Decision Sciences Institute 1121–1131 (2018) https://decisionsciences.org/wp-content/uploads/2019/02/dsi-2018-proceedings.pdf.
Murimi, R. “Online Social Networks for Meaningful Social Reform.” In 2018 World Engineering Education Forum - Global Engineering Deans Council (WEEF-GEDC) (2018) https://doi.org/10.1109/WEEF-GEDC.2018.8629713.
Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton: Princeton University Press (2016).
Pasquale, F. “Toward a Fourth Law of Robotics: Preserving Attribution, Responsibility, and Explainability in an Algorithmic Society.” Ohio St. LJ 58 http://hdl.handle.net/1811/85768.
Pentland, A., Shrier, D., Hardjono, T., Wladawsky-Berger, I. “Towards an Internet of Trusted Data: Input to the Whitehouse Commission on Enhancing National Cybersecurity.” In T. Hardjono, A. Pentland, D. Shrier (Eds.), Trust::Data - A New Framework for Identity and Data Sharing Visionary Future 21–49 (2016) https://www.nist.gov/sites/default/files/documents/2016/09/16/mit_rfi_response.pdf.
Skinner, C. VALUEWEB: How Fintech Firms are Using Bitcoin, Blockchain and Mobile Technologies to Create the Internet of Value. Singapore: Marshall Cavendish International (2016).
Strobel, V., Castelló Ferrer, E., Dorigo, M. “Managing Byzantine Robots via Blockchain Technology in a Swarm Robotics Collective Decision Making Scenario.” In AAMAS ’18 Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems Richland: International Foundation for Autonomous Agents and Multiagent Systems 541–549 (2018) https://dl.acm.org/citation.cfm?id=3237464.
Strobel, V., Dorigo, M. “Blockchain Technology for Robot Swarms: A Shared Knowledge and Reputation Management System for Collective Estimation.” IRIDIA Technical Report Series TR/IRIDIA/2018-009 (2018) (accessed 9 March 2019) http://iridia.ulb.ac.be/IridiaTrSeries/link/IridiaTr2018-009.pdf.
Suler, J. “The Online Disinhibition Effect.” Cyberpsychology and Behavior 7.3 321–326 (2004) https://doi.org/10.1089/1094931041291295.
Swan, M. “Blockchain Thinking: The Brain as a Decentralized Autonomous Corporation.” IEEE Technology and Society Magazine 34 41–52 (2015) https://doi.org/10.1109/MTS.2015.2494358.
Teslya, N., Ryabchikov, I. “Blockchain-Based Platform Architecture for Industrial IoT.” In Proceedings of the 21st Conference of Open Innovations Association (FRUCT) 321–329 (2017) https://doi.org/10.23919/FRUCT.2017.8250199.
Weinmann, M., Schneider, C., vom Brocke, J. “Digital Nudging.” Business and Information Systems Engineering 58 433–436 (2016) https://doi.org/10.1007/s12599-016-0453-1.
Zhang, K., Kizilcec, R. F. “Anonymity in Social Media: Effects of Content Controversiality and Social Endorsement on Sharing Behavior.” In Proceedings of the International Conference on Weblogs and Social Media 0–1 (2014) https://www.aaai.org/ocs/index.php/ICWSM/ICWSM14/paper/view/8077.
Copyright (c) 2019 Renita M Murimi
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- The Author retains copyright in the Work, where the term “Work” shall include all digital objects that may result in subsequent electronic publication or distribution.
- Upon acceptance of the Work, the author shall grant to the Publisher the right of first publication of the Work.
- The Author shall grant to the Publisher and its agents the nonexclusive perpetual right and license to publish, archive, and make accessible the Work in whole or in part in all forms of media now or hereafter known under a Creative Commons Attribution 4.0 International License or its equivalent, which, for the avoidance of doubt, allows others to copy, distribute, and transmit the Work under the following conditions:
- Attribution—other users must attribute the Work in the manner specified by the author as indicated on the journal Web site;
- The Author is able to enter into separate, additional contractual arrangements for the nonexclusive distribution of the journal's published version of the Work (e.g., post it to an institutional repository or publish it in a book), as long as there is provided in the document an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post online a prepublication manuscript (but not the Publisher’s final formatted PDF version of the Work) in institutional repositories or on their Websites prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work. Any such posting made before acceptance and publication of the Work shall be updated upon publication to include a reference to the Publisher-assigned DOI (Digital Object Identifier) and a link to the online abstract for the final published Work in the Journal.
- Upon Publisher’s request, the Author agrees to furnish promptly to Publisher, at the Author’s own expense, written evidence of the permissions, licenses, and consents for use of third-party material included within the Work, except as determined by Publisher to be covered by the principles of Fair Use.
- The Author represents and warrants that:
- the Work is the Author’s original work;
- the Author has not transferred, and will not transfer, exclusive rights in the Work to any third party;
- the Work is not pending review or under consideration by another publisher;
- the Work has not previously been published;
- the Work contains no misrepresentation or infringement of the Work or property of other authors or third parties; and
- the Work contains no libel, invasion of privacy, or other unlawful matter.
- The Author agrees to indemnify and hold Publisher harmless from Author’s breach of the representations and warranties contained in Paragraph 6 above, as well as any claim or proceeding relating to Publisher’s use and publication of any content contained in the Work, including third-party content.
- The Author agrees to digitally sign the Publisher’s final formatted PDF version of the Work.
Revised 7/16/2018. Revision Description: Removed outdated link.