Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Marialisa Scatà is active.

Publication


Featured researches published by Marialisa Scatà.


PLOS ONE | 2015

Quantifying the Role of Homophily in Human Cooperation Using Multiplex Evolutionary Game Theory

Alessandro Di Stefano; Marialisa Scatà; Aurelio La Corte; Pietro Liò; Emanuele Catania; Ermanno Guardo; Salvatore Pagano

Nature shows as human beings live and grow inside social structures. This assumption allows us to explain and explore how it may shape most of our behaviours and choices, and why we are not just blindly driven by instincts: our decisions are based on more complex cognitive reasons, based on our connectedness on different spaces. Thus, human cooperation emerges from this complex nature of social network. Our paper, focusing on the evolutionary dynamics, is intended to explore how and why it happens, and what kind of impact is caused by homophily among people. We investigate the evolution of human cooperation using evolutionary game theory on multiplex. Multiplexity, as an extra dimension of analysis, allows us to unveil the hidden dynamics and observe non-trivial patterns within a population across network layers. More importantly, we find a striking role of homophily, as the higher the homophily between individuals, the quicker is the convergence towards cooperation in the social dilemma. The simulation results, conducted both macroscopically and microscopically across the network layers in the multiplex, show quantitatively the role of homophily in human cooperation.


Scientific Reports | 2016

The Impact of Heterogeneity and Awareness in Modeling Epidemic Spreading on Multiplex Networks

Marialisa Scatà; Alessandro Di Stefano; Pietro Liò; Aurelio La Corte

In the real world, dynamic processes involving human beings are not disjoint. To capture the real complexity of such dynamics, we propose a novel model of the coevolution of epidemic and awareness spreading processes on a multiplex network, also introducing a preventive isolation strategy. Our aim is to evaluate and quantify the joint impact of heterogeneity and awareness, under different socioeconomic conditions. Considering, as case study, an emerging public health threat, Zika virus, we introduce a data-driven analysis by exploiting multiple sources and different types of data, ranging from Big Five personality traits to Google Trends, related to different world countries where there is an ongoing epidemic outbreak. Our findings demonstrate how the proposed model allows delaying the epidemic outbreak and increasing the resilience of nodes, especially under critical economic conditions. Simulation results, using data-driven approach on Zika virus, which has a growing scientific research interest, are coherent with the proposed analytic model.


international conference on systems and networks communications | 2010

A Process Approach to Manage the Security of the Communication Systems with Risk Analysis Based on Epidemiological Model

Aurelio La Corte; Marialisa Scatà

Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction, to assure confidentiality, availability and integrity. The new trends of telecommunications of the last year is the move towards the trasmission of voice over traditional packet switched IP network, voice over IP, that has become a valid alternative to traditional public circuit-switched telephone network and then the convergence of the communication systems, through the next generation networks definition. This environment presents many security problems and significant security challenges. The voice over IP system increase these with those normally tie to IP network. Along with a several benefits of voice over IP, there are new security threats for exchanged informations. This paper analyzes the security issues of the communication systems, starting from the traditional public switched telephone network toward the new next generation network. Then, with this paper, we want to introduce a process approach to manage the security, based on epidemiological model. This model is characterized by three steps, Analysis, Assessment and Management, and it can be applied to a general information security system, to identify, assess and classify the information assets, the processes concerning it, vulnerabilities of each level and common threats. Finally we evaluate the risk and the probability of damage that can crash the system or part of this and propose a model of failure time analysis. The target of this analysis is to calculate the extent of the risk function in order to understand the state and the degree of security of our system, by studying the statistics of failure and to ensure highest degree of security optimizing the business strategic decisions and information and communication technology security economic investments. The methodology is designed to be applied in the future to communication systems, more specifically. This does not exclude the application of this methodology in other areas of interest (biomedical or economical areas) to understand, formalize and solve problems of similar nature.


Scientific Reports | 2018

Quantifying the propagation of distress and mental disorders in social networks.

Marialisa Scatà; Alessandro Di Stefano; Aurelio La Corte; Pietro Liò

Heterogeneity of human beings leads to think and react differently to social phenomena. Awareness and homophily drive people to weigh interactions in social multiplex networks, influencing a potential contagion effect. To quantify the impact of heterogeneity on spreading dynamics, we propose a model of coevolution of social contagion and awareness, through the introduction of statistical estimators, in a weighted multiplex network. Multiplexity of networked individuals may trigger propagation enough to produce effects among vulnerable subjects experiencing distress, mental disorder, which represent some of the strongest predictors of suicidal behaviours. The exposure to suicide is emotionally harmful, since talking about it may give support or inadvertently promote it. To disclose the complex effect of the overlapping awareness on suicidal ideation spreading among disordered people, we also introduce a data-driven approach by integrating different types of data. Our modelling approach unveils the relationship between distress and mental disorders propagation and suicidal ideation spreading, shedding light on the role of awareness in a social network for suicide prevention. The proposed model is able to quantify the impact of overlapping awareness on suicidal ideation spreading and our findings demonstrate that it plays a dual role on contagion, either reinforcing or delaying the contagion outbreak.


international conference on data communication networking | 2014

The bio-inspired and social evolution of node and data in a multilayer network

Marialisa Scatà; Alessandro Di Stefano; Evelina Giacchi; Aurelio La Corte; Pietro Liò

Following a bio-inspired approach, applied to multilayer social networks, the idea is to build a novel paradigm aimed to improve methodologies and analysis in the Information and Communication Technologies. The social network and the multilayer structure allow to carry out an analysis of the complex patterns, in terms of the dynamics involving the main entities, nodes and data. The nodes represent the basic kernel from which generating ties, interactions, flow of information, influences and action strategies that affect the communities. The data, gathered from multiple sources, after their integration, will become complex objects, enclosing different kinds of information. The proposed approach introduces a level of abstraction that originates from the evolution of nodes and data transformed in “social objects”. This new paradigm consists of a multilayer social network, divided into three layers, generating an increasing awareness, from “things” to “knowledge”, extracting as much “knowledge” as possible. This paradigm allows to redesign the ICT in a bio-networks driven approach.


international conference on computational science and its applications | 2011

A bio-inspired approach for risk analysis of ICT systems

Aurelio La Corte; Marialisa Scatà; Evelina Giacchi

In recent years, information and communication technology (ICT) has been characterised by several evolving trends and new challenges. The process towards the convergence has been developed to take into account new realities and new perspectives. Along with many positive benefits, there are several security concerns and ensuring privacy is extremely difficult. New security issues make it necessary to rewrite the safety requirements and to know what the risks are and what can be lost. With this paper we want to propose a bio-inspired approach as a result of a comparison between biological models and information security. The risk analysis proposed aims to address technical, human and economical aspects of the security to strategically guide security investments. This analysis requires knowledge of the failure time distribution to assess the degree of system security and analyse the existing countermeasures to decrease the risk, minimise the losses, and successfully manage the security.


Archive | 2018

A Dynamic and Context-Aware Social Network Approach for Multiple Criteria Decision Making Through a Graph-Based Knowledge Learning

Alessandro Di Stefano; Marialisa Scatà; Aurelio La Corte; Evelina Giacchi

Complexity and dynamics characterize a social network and its processes. Social network analysis and graph theory could be used to describe and explore the connectedness among the different entities. Network dynamics further increases the complexity, as each entity with its personal knowledge, cognitive and reasoning capabilities, thinks, decides and acts in a social network, characterized by the heterogeneity of nodes and ties among them. Social network analysis becomes critical to the decision-making process, where a network node will consider both its personal knowledge and the influences received from its neighbors. Network dynamics and the node’s context-awareness affect the relationships among criteria, modifying their ranking in a multiple criteria decision-making process, and hence the decision itself. Thus, the main aim has been to model the decision-making process within a social network, considering both context-awareness and network dynamics. Moreover, we have introduced a process of knowledgetransfer, where the criteria are represented by the knowledge-related values. A Dynamic and Context-Aware Social Network Approach for Multiple Criteria Decision Making Through a GraphBased Knowledge Learning


Archive | 2016

Bio-Inspired ICT for Big Data Management in Healthcare

Alessandro Di Stefano; Aurelio La Corte; Pietro Liò; Marialisa Scatà

In the future, life and death decisions will depend on having more data and more organized knowledge. These data will overcome traditional scale and dimensions, thus we will need to think about new kind of strategies which involve Information and Communication Technologies. Collect, organize and compute every aspect will be crucial for survival of patients and for healthcare management. Following a bio-inspired approach to ICT, we can relate Big Data and the data intensive computing issues in the future vision of a smart healthcare. The multidimensional approach to comorbidity and the introduction of a social dimension of analysis allow to find out correlations and causality relations between diseases and patients also considering the connectedness and social contagion processes. In this way, we obtain an evolution from data to multiagents through the introduction of personalized medicine in a multilayer architecture.


systems, man and cybernetics | 2013

A Energy-Preserving Model for Wireless Sensors Networks Based on Heuristic Self-Organized Routing

Aurelio La Corte; Alessandro Di Stefano; Marialisa Scatà; Marco Leotta

One of the main targets related to Wireless Sensor Networks (WSNs) is to reduce power consumption of nodes and of the whole network. An ideal WSN should be networked, scalable, fault-tolerant, energy-aware, and also smart and efficient. Unfortunately, however, this is not always true. The basic idea of the proposal is that senders use a heuristic approach to select the sub-optimal next hop in order to reach just one sink, considering some key requirements such as general performance (QoS and security), efficiency, trust ability, high computational power and energy-aware behaviour. Our model tries to satisfy the need for reaching the nearest sink node, considering a trade-off between the shortest path and heuristic decisions, in a top-level strategy based on a heuristic approach in order to reduce the overall power consumption of nodes of the network.


International Journal of Internet Technology and Secured Transactions | 2012

Convergence, security and quality in the NGN

Aurelio La Corte; Marialisa Scatà

In recent years, information and communication technology ICT has been characterised by several evolving trends and new challenges. The design and management of each information system must address issues related to planning an ICT infrastructure. Communication technologies are evolving very fast, following the current trend of the time when everything is becoming digitised and the demand for new ubiquitous services is growing. This process has enabled the advent of the next generation network NGN. With the development of the next generation network, considering the proposed infrastructure, speed, services and amount of connections will increase exponentially. At the same time vulnerability, threats, risk and quality of service QoS, should be adequately assessed for the continuous evolution of the converged network, which will define roles and relationship in the future information and communication environment. In this paper, we propose an overview of the next generation network addressing the new challenges of the converged infrastructure and we propose a framework to assess quality of service and security features, giving an appropriate analysis method regarding certain parameters and requirements, evaluating factors of influence and general incidence of certain features of the network, to make a comparison between converged and not-converged solutions.

Collaboration


Dive into the Marialisa Scatà's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Pietro Liò

University of Cambridge

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge