63,298 research outputs found

    Identification & Role of Implicit Social Ties from Social Data

    Get PDF
    The concept of social ties was introduced by Granovetter through the seminal paper titled" Strength of weak ties". Across the past ïŹve decades, this topic has attracted much attention from both academics and practitioners. In the past two decades, the rapid increase in digitization and new modes of communication have led to collecting and analyzing data about people. One of the most popular sources for such large and granular data about people is social media platforms. The rise in the popularity of social media in the past 15 years has resulted in many research studies that have used social media data to understand a lot of different phenomena. Some of this research has focused on using social data, including social media data, on identifying different kinds of social ties online and the role these social ties play in various contexts. Over the past decade, many different approaches and models have been built to identify social ties using social media data. These methods have been built using private data and explicit social relationship data of users’ social media platforms. However, in the past few years, it has become nearly impossible to access this kind of social media data due to the changes in the business models of the social media platforms and the introduction of new privacy laws like GDPR. This thesis aims to identify the social ties from publicly available social data and study the role of the identiïŹed social ties in different contexts like business conferences and business phenomena. In order to achieve this research objective, three separate studies were conducted. The ïŹrst two studies were single-case case studies, while the third was an experiment where two different sets of hypotheses were tested using empirical data. All three studies used publicly available social media data related to a speciïŹc context. The ïŹrst study used a large dataset related to a game developer community on Facebook. The second study used social media data related to a business event from Twitter and Facebook. The third study used a large dataset associated with social media data about crowdfunding projects from Twitter. This study adds to the existing literature related to identifying social ties from social media data in multiple manners. The thesis illustrates a novel approach based on reciprocal interaction for ïŹltering relevant social ties from large publicly available social media data. The thesis also contributes to the understanding of the role multiple social media platforms play in an event. Thus, showing the impact this can have on identifying social ties from publicly available social media data in case of an event. The dissertation adds to the existing literature about the role social ties have towards crowdfunding success. The thesis shows that implicit social ties, in general, positively impact crowdfunding project success. In addition, the thesis has practical implications for designers of conference recommendation systems. The dissertation also has implications for the crowdfunding project owners and the crowdfunding project campaign designers

    Identifying Emotions in Social Media: Comparison of Word-emotion lexica

    Get PDF
    In recent years, emotions expressed in social media messages have become a vivid research topic due to their influence on the spread of misinformation and online radicalization over online social networks. Thus, it is important to correctly identify emotions in order to make inferences from social media messages. In this paper, we report on the performance of three publicly available word-emotion lexicons (NRC, DepecheMood, EmoSenticNet) over a set of Facebook and Twitter messages. To this end, we designed and implemented an algorithm that applies natural language processing (NLP) techniques along with a number of heuristics that reflect the way humans naturally assess emotions in written texts. In order to evaluate the appropriateness of the obtained emotion scores, we conducted a questionnaire-based survey with human raters. Our results show that there are noticeable differences between the performance of the lexicons as well as with respect to emotion scores the human raters provided in our surve

    State of the art 2015: a literature review of social media intelligence capabilities for counter-terrorism

    Get PDF
    Overview This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. These techniques are considered relevant and valuable in so far as they can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report also considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance. This is an updated version of a 2013 report paper on the same subject, State of the Art. Since 2013, there have been significant changes in social media, how it is used by terrorist groups, and the methods being developed to make sense of it.  The paper is structured as follows: Part 1 is an overview of social media use, focused on how it is used by groups of interest to those involved in counter-terrorism. This includes new sections on trends of social media platforms; and a new section on Islamic State (IS). Part 2 provides an introduction to the key approaches of social media intelligence (henceforth ‘SOCMINT’) for counter-terrorism. Part 3 sets out a series of SOCMINT techniques. For each technique a series of capabilities and insights are considered, the validity and reliability of the method is considered, and how they might be applied to counter-terrorism work explored. Part 4 outlines a number of important legal, ethical and practical considerations when undertaking SOCMINT work

    Comparative Advantage in Disaster Response

    Get PDF
    This paper introduces a framework for a systematic analysis of the comparative advantages of various types of emergency responders. Our hypothesis is that one can define and then test comparative advantages across categories of actors and that a policy-making framework can help prepare better disaster responses in the future. We present an analytic framework that categorizes NGOs, governments, militaries and private responders at various levels. This initial theoretical framework provides a structure to begin to analyze comparative advantage. It suggests that there might be better combinations and sequences of responders in given situations. With the basic theory set forth, the framework is tested against data from two cases: 1) the disaster response following the 2004 Tsunami in Sri Lanka and 2) the response in Honduras after Hurricane Mitch in 1998. Ultimately, this work is intended to inspire other researchers interested in questions of disaster response to employ this methodology to develop and publish cases as well, creating a body of analysis that could then be further refined into policy recommendations to improve humanitarian emergency efforts.This publication is Hauser Center Working Paper No. 38. The Hauser Center Working Paper Series was launched during the summer of 2000. The Series enables the Hauser Center to share with a broad audience important works-in-progress written by Hauser Center scholars and researchers

    On the Role of Social Identity and Cohesion in Characterizing Online Social Communities

    Get PDF
    Two prevailing theories for explaining social group or community structure are cohesion and identity. The social cohesion approach posits that social groups arise out of an aggregation of individuals that have mutual interpersonal attraction as they share common characteristics. These characteristics can range from common interests to kinship ties and from social values to ethnic backgrounds. In contrast, the social identity approach posits that an individual is likely to join a group based on an intrinsic self-evaluation at a cognitive or perceptual level. In other words group members typically share an awareness of a common category membership. In this work we seek to understand the role of these two contrasting theories in explaining the behavior and stability of social communities in Twitter. A specific focal point of our work is to understand the role of these theories in disparate contexts ranging from disaster response to socio-political activism. We extract social identity and social cohesion features-of-interest for large scale datasets of five real-world events and examine the effectiveness of such features in capturing behavioral characteristics and the stability of groups. We also propose a novel measure of social group sustainability based on the divergence in group discussion. Our main findings are: 1) Sharing of social identities (especially physical location) among group members has a positive impact on group sustainability, 2) Structural cohesion (represented by high group density and low average shortest path length) is a strong indicator of group sustainability, and 3) Event characteristics play a role in shaping group sustainability, as social groups in transient events behave differently from groups in events that last longer

    Social media mining for identification and exploration of health-related information from pregnant women

    Get PDF
    Widespread use of social media has led to the generation of substantial amounts of information about individuals, including health-related information. Social media provides the opportunity to study health-related information about selected population groups who may be of interest for a particular study. In this paper, we explore the possibility of utilizing social media to perform targeted data collection and analysis from a particular population group -- pregnant women. We hypothesize that we can use social media to identify cohorts of pregnant women and follow them over time to analyze crucial health-related information. To identify potentially pregnant women, we employ simple rule-based searches that attempt to detect pregnancy announcements with moderate precision. To further filter out false positives and noise, we employ a supervised classifier using a small number of hand-annotated data. We then collect their posts over time to create longitudinal health timelines and attempt to divide the timelines into different pregnancy trimesters. Finally, we assess the usefulness of the timelines by performing a preliminary analysis to estimate drug intake patterns of our cohort at different trimesters. Our rule-based cohort identification technique collected 53,820 users over thirty months from Twitter. Our pregnancy announcement classification technique achieved an F-measure of 0.81 for the pregnancy class, resulting in 34,895 user timelines. Analysis of the timelines revealed that pertinent health-related information, such as drug-intake and adverse reactions can be mined from the data. Our approach to using user timelines in this fashion has produced very encouraging results and can be employed for other important tasks where cohorts, for which health-related information may not be available from other sources, are required to be followed over time to derive population-based estimates.Comment: 9 page
    • 

    corecore