12,724 research outputs found

    Leveraging Citation Networks to Visualize Scholarly Influence Over Time

    Full text link
    Assessing the influence of a scholar's work is an important task for funding organizations, academic departments, and researchers. Common methods, such as measures of citation counts, can ignore much of the nuance and multidimensionality of scholarly influence. We present an approach for generating dynamic visualizations of scholars' careers. This approach uses an animated node-link diagram showing the citation network accumulated around the researcher over the course of the career in concert with key indicators, highlighting influence both within and across fields. We developed our design in collaboration with one funding organization---the Pew Biomedical Scholars program---but the methods are generalizable to visualizations of scholarly influence. We applied the design method to the Microsoft Academic Graph, which includes more than 120 million publications. We validate our abstractions throughout the process through collaboration with the Pew Biomedical Scholars program officers and summative evaluations with their scholars

    Event detection, tracking, and visualization in Twitter: a mention-anomaly-based approach

    Full text link
    The ever-growing number of people using Twitter makes it a valuable source of timely information. However, detecting events in Twitter is a difficult task, because tweets that report interesting events are overwhelmed by a large volume of tweets on unrelated topics. Existing methods focus on the textual content of tweets and ignore the social aspect of Twitter. In this paper we propose MABED (i.e. mention-anomaly-based event detection), a novel statistical method that relies solely on tweets and leverages the creation frequency of dynamic links (i.e. mentions) that users insert in tweets to detect significant events and estimate the magnitude of their impact over the crowd. MABED also differs from the literature in that it dynamically estimates the period of time during which each event is discussed, rather than assuming a predefined fixed duration for all events. The experiments we conducted on both English and French Twitter data show that the mention-anomaly-based approach leads to more accurate event detection and improved robustness in presence of noisy Twitter content. Qualitatively speaking, we find that MABED helps with the interpretation of detected events by providing clear textual descriptions and precise temporal descriptions. We also show how MABED can help understanding users' interest. Furthermore, we describe three visualizations designed to favor an efficient exploration of the detected events.Comment: 17 page

    Community tracking in a cMOOC and nomadic learner behavior identification on a connectivist rhizomatic learning network

    Get PDF
    This article contributes to the literature on connectivism, connectivist MOOCs (cMOOCs) and rhizomatic learning by examining participant interactions, community formation and nomadic learner behavior in a particular cMOOC, #rhizo15, facilitated for 6 weeks by Dave Cormier. It further focuses on what we can learn by observing Twitter interactions particularly. As an explanatory mixed research design, Social Network Analysis and content analysis were employed for the purposes of the research. SNA is used at the macro, meso and micro levels, and content analysis of one week of the MOOC was conducted using the Community of Inquiry framework. The macro level analysis demonstrates that communities in a rhizomatic connectivist networks have chaotic relationships with other communities in different dimensions (clarified by use of hashtags of concurrent, past and future events). A key finding at the meso level was that as #rhizo15 progressed and number of active participants decreased, interaction increased in overall network. The micro level analysis further reveals that, though completely online, the nature of open online ecosystems are very convenient to facilitate the formation of community. The content analysis of week 3 tweets demonstrated that cognitive presence was the most frequently observed, while teaching presence (teaching behaviors of both facilitator and participants) was the lowest. This research recognizes the limitations of looking only at Twitter when #rhizo15 conversations occurred over multiple platforms frequented by overlapping but not identical groups of people. However, it provides a valuable partial perspective at the macro meso and micro levels that contribute to our understanding of community-building in cMOOCs

    Analyzing covert social network foundation behind terrorism disaster

    Full text link
    This paper addresses a method to analyze the covert social network foundation hidden behind the terrorism disaster. It is to solve a node discovery problem, which means to discover a node, which functions relevantly in a social network, but escaped from monitoring on the presence and mutual relationship of nodes. The method aims at integrating the expert investigator's prior understanding, insight on the terrorists' social network nature derived from the complex graph theory, and computational data processing. The social network responsible for the 9/11 attack in 2001 is used to execute simulation experiment to evaluate the performance of the method.Comment: 17pages, 10 figures, submitted to Int. J. Services Science
    corecore