Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael Fire is active.

Publication


Featured researches published by Michael Fire.


privacy security risk and trust | 2011

Link Prediction in Social Networks Using Computationally Efficient Topological Features

Michael Fire; Lena Tenenboim; Ofrit Lesser; Rami Puzis; Lior Rokach; Yuval Elovici

Online social networking sites have become increasingly popular over the last few years. As a result, new interdisciplinary research directions have emerged in which social network analysis methods are applied to networks containing hundreds millions of users. Unfortunately, links between individuals may be missing due to imperfect acquirement processes or because they are not yet reflected in the online network (i.e., friends in real world did not form a virtual connection.) Existing link prediction techniques lack the scalability required for full application on a continuously growing social network which may be adding everyday users with thousands of connections. The primary bottleneck in link prediction techniques is extracting structural features required for classifying links. In this paper we propose a set of simple, easy-to-compute structural features that can be analyzed to identify missing links. We show that a machine learning classifier trained using the proposed simple structural features can successfully identify missing links even when applied to a hard problem of classifying links between individuals who have at least one common friend. A new friends measure that we developed is shown to be a good predictor for missing links and an evaluation experiment was performed on five large social networks datasets: Face book, Flickr, You Tube, Academia and The Marker. Our methods can provide social network site operators with the capability of helping users to find known, offline contacts and to discover new friends online. They may also be used for exposing hidden links in an online social network.


IEEE Communications Surveys and Tutorials | 2014

Online Social Networks: Threats and Solutions

Michael Fire; Roy Goldschmidt; Yuval Elovici

Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name a few. According to recent studies, OSN users readily expose personal and private details about themselves, such as relationship status, date of birth, school name, email address, phone number, and even home address. This information, if put into the wrong hands, can be used to harm users both in the virtual world and in the real world. These risks become even more severe when the users are children. In this paper, we present a thorough review of the different security and privacy risks, which threaten the well-being of OSN users in general, and children in particular. In addition, we present an overview of existing solutions that can provide better protection, security, and privacy for OSN users. We also offer simple-to-implement recommendations for OSN users, which can improve their security and privacy when using these platforms. Furthermore, we suggest future research directions.


ACM Transactions on Intelligent Systems and Technology | 2013

Computationally efficient link prediction in a variety of social networks

Michael Fire; Lena Tenenboim-Chekina; Rami Puzis; Ofrit Lesser; Lior Rokach; Yuval Elovici

Online social networking sites have become increasingly popular over the last few years. As a result, new interdisciplinary research directions have emerged in which social network analysis methods are applied to networks containing hundreds of millions of users. Unfortunately, links between individuals may be missing either due to an imperfect acquirement process or because they are not yet reflected in the online network (i.e., friends in the real world did not form a virtual connection). The primary bottleneck in link prediction techniques is extracting the structural features required for classifying links. In this article, we propose a set of simple, easy-to-compute structural features that can be analyzed to identify missing links. We show that by using simple structural features, a machine learning classifier can successfully identify missing links, even when applied to a predicament of classifying links between individuals with at least one common friend. We also present a method for calculating the amount of data needed in order to build more accurate classifiers. The new Friends measure and Same community features we developed are shown to be good predictors for missing links. An evaluation experiment was performed on ten large social networks datasets: Academia.edu, DBLP, Facebook, Flickr, Flixster, Google+, Gowalla, TheMarker, Twitter, and YouTube. Our methods can provide social network site operators with the capability of helping users to find known, offline contacts and to discover new friends online. They may also be used for exposing hidden links in online social networks.


Social Network Analysis and Mining | 2014

Friend or foe? Fake profile identification in online social networks

Michael Fire; Dima Kagan; Aviad Elyashar; Yuval Elovici

Abstract The amount of personal information involuntarily exposed by users on online social networks is staggering, as shown in recent research. Moreover, recent reports indicate that these networks are inundated with tens of millions of fake user profiles, which may jeopardize the user’s security and privacy. To identify fake users in such networks and to improve users’ security and privacy, we developed the Social Privacy Protector (SPP) software for Facebook. This software contains three protection layers that improve user privacy by implementing different methods to identify fake profiles. The first layer identifies a user’s friends who might pose a threat and then restricts the access these “friends” have to the user’s personal information. The second layer is an expansion of Facebook’s basic privacy settings based on different types of social network usage profiles. The third layer alerts users about the number of installed applications on their Facebook profile that has access to their private information. An initial version of the SPP software received positive media coverage, and more than 3,000 users from more than 20 countries have installed the software, out of which 527 have used the software to restrict more than 9,000 friends. In addition, we estimate that more than 100 users have accepted the software’s recommendations and removed nearly 1,800 Facebook applications from their profiles. By analyzing the unique dataset obtained by the software in combination with machine learning techniques, we developed classifiers that are able to predict Facebook profiles with a high probability of being fake and consequently threaten the user’s security and privacy. Moreover, in this study, we present statistics generated by the SPP software on both user privacy settings and the number of applications installed on Facebook profiles. These statistics alarmingly demonstrate how vulnerable Facebook users’ information is to both fake profile attacks and third-party Facebook applications.


privacy security risk and trust | 2012

Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data

Yaniv Altshuler; Nadav Aharony; Michael Fire; Yuval Elovici; Alex Pentland

As truly ubiquitous wearable computers, mobile phones are quickly becoming the primary source for social, behavioral, and environmental sensing and data collection. Todays smart phones are equipped with increasingly more sensors and accessible data types that enable the collection of literally dozens of signals regarding the phone, its user, and their environment. A great deal of research effort in academia and industry is put into mining this data for higher level sense-making, such as understanding user context, inferring social networks, learning individual features, and so on. In many cases this analysis work is the result of exploratory forays and trial-and-error. Adding to the challenge, the devices themselves are limited platforms, hence data collection campaign must be carefully designed in order to collect the signals in the appropriate frequency, avoiding the exhausting the the devices limited battery and processing power. Currently however, there is no structured methodology for the design of mobile data collection and analysis initiatives. In this work we investigate the properties of learning and inference of real world data collected via mobile phones over time. In particular, we analyze how the ability to predict individual parameters and social links is incrementally enhanced with the accumulation of additional data. To do so we use the Friends and Family dataset, containing rich data signals gathered from the smart phones of 140 adult members of an MIT based young-family residential community for over a year, and is one of the most comprehensive mobile phone datasets gathered in academia to date. We develop several models for predicting social and individual properties from sensed mobile phone data over time, including detection of life-partners, ethnicity, and whether a person is a student or not. Finally, we propose a method for predicting the maximal learning accuracy possible for the learning task at hand, based on an initial set of measurements. This has various practical implications, such as better design of mobile data collection campaigns, or evaluating of planned analysis strategies.


international conference on social computing | 2012

How many makes a crowd? on the evolution of learning as a factor of community coverage

Yaniv Altshuler; Michael Fire; Nadav Aharony; Yuval Elovici; Alex Pentland

As truly ubiquitous wearable computers, mobile phones are quickly becoming the primary source for social, behavioral and environmental sensing and data collection. Todays smartphones are equipped with increasingly more sensors and accessible data types that enable the collection of literally dozens of signals related to the phone, its user, and its environment. A great deal of research effort in academia and industry is put into mining this raw data for higher level sense-making, such as understanding user context, inferring social networks, learning individual features, and so on. In many cases, this analysis work is the result of exploratory forays and trial-and-error. In this work we investigate the properties of learning and inferences of real world data collected via mobile phones for different sizes of analyzed networks. In particular, we examine how the ability to predict individual features and social links is incrementally enhanced with the accumulation of additional data. To accomplish this, we use the Friends and Family dataset, which contains rich data signals gathered from the smartphones of 130 adult members of a young-family residential community over the course of a year and consequently has become one of the most comprehensive mobile phone datasets gathered in academia to date. Our results show that features such as ethnicity, age and marital status can be detected by analyzing social and behavioral signals. We then investigate how the prediction accuracy is increased when the users sample set grows. Finally, we propose a method for advanced prediction of the maximal learning accuracy possible for the learning task at hand, based on an initial set of measurements. These predictions have practical implications, such as influencing the design of mobile data collection campaigns or evaluating analysis strategies.


Archive | 2013

Link Prediction in Highly Fractional Data Sets

Michael Fire; Rami Puzis; Yuval Elovici

In recent years, online social networks have grown in scale and variability and offer individuals with similar interests the possibility of exchanging ideas and networking. On the one hand, social networks create new opportunities to develop friendships, share ideas, and conduct business. On the other hand, they are also an effective media tool for plotting crime and organizing extremists groups around the world. Online social networks, such as Facebook, Google+, and Twitter are hard to track due to their massive scale and increased awareness of privacy. Criminals and terrorists strive to hide their relationships, especially those that can associate them with a executed terror act.


social informatics | 2012

Organizational Intrusion: Organization Mining Using Socialbots

Aviad Elishar; Michael Fire; Dima Kagan; Yuval Elovici

In the recent years we have seen a significant growth in the usage of online social networks. Common networks like Facebook, Twitter, Pinterest, and Linked In have become popular all over the world. In these networks users write, share, and publish personal information about themselves, their friends, and their workplace. In this study we present a method for the mining of information of an organization through the use of social networks and social bots. Our social bots sent friend requests to Facebook users who work in a targeted organization. Upon accepting a socialbots friend request, users unknowingly expose information about themselves and about their workplace. We tested the proposed method on two real organizations and successfully infiltrated both. Compared to our previous study, our method was able to discover up to 13.55% more employees and up to 18.29% more informal organizational links. Our results demonstrate once again that organizations which are interested in protecting themselves should instruct their employees not to disclose information in social networks and to be cautious of accepting friendship requests from unknown persons.


ieee convention of electrical and electronics engineers in israel | 2012

Data mining opportunities in geosocial networks for improving road safety

Michael Fire; Dima Kagan; Rami Puzis; Lior Rokach; Yuval Elovici

Traffic measurements, road safety studies, and surveys are required for efficient road planning and ensuring the safety of transportation. Unfortunately, these methods can be cumbersome and very expensive. In this paper we point out a source of transportation information that is based on collaborative community-based navigation applications, such as Waze. Partial and anonimized information publicly exposed by Waze through their application provides valuable information that can significantly ease the future of transportation studies. Moreover, we show that Waze user reports may expose locations plagued with accidents but in lacking police coverage. This knowledge may help police departments to improve road safety by relocating the police units to these locations. Lastly, the data discussed in this paper connects transportation and road safety research to location based services and social network platforms.


Science and Engineering Ethics | 2014

Ethical considerations when employing fake identities in online social networks for research.

Yuval Elovici; Michael Fire; Amir Herzberg; Haya Shulman

Online social networks (OSNs) have rapidly become a prominent and widely used service, offering a wealth of personal and sensitive information with significant security and privacy implications. Hence, OSNs are also an important—and popular—subject for research. To perform research based on real-life evidence, however, researchers may need to access OSN data, such as texts and files uploaded by users and connections among users. This raises significant ethical problems. Currently, there are no clear ethical guidelines, and researchers may end up (unintentionally) performing ethically questionable research, sometimes even when more ethical research alternatives exist. For example, several studies have employed “fake identities” to collect data from OSNs, but fake identities may be used for attacks and are considered a security issue. Is it legitimate to use fake identities for studying OSNs or for collecting OSN data for research? We present a taxonomy of the ethical challenges facing researchers of OSNs and compare different approaches. We demonstrate how ethical considerations have been taken into account in previous studies that used fake identities. In addition, several possible approaches are offered to reduce or avoid ethical misconducts. We hope this work will stimulate the development and use of ethical practices and methods in the research of online social networks.

Collaboration


Dive into the Michael Fire's collaboration.

Top Co-Authors

Avatar

Yuval Elovici

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Dima Kagan

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Lior Rokach

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Alex Pentland

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Yaniv Altshuler

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Aviad Elyashar

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Gilad Katz

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Rami Puzis

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Aviad Elishar

Ben-Gurion University of the Negev

View shared research outputs
Researchain Logo
Decentralizing Knowledge