129 research outputs found

    Content Dissemination in Mobile Social Networks

    Get PDF
    Mobile social networking(MSN) has emerged as an effective platform for social network users to pervasively disseminate the contents such as news, tips, book information, music, video and so on. In content dissemination, mobile social network users receive content or information from their friends, acquaintances or neighbors, and selectively forward the content or information to others. The content generators and receivers have different motivation and requirements to disseminate the contents according to the properties of the contents, which makes it a challenging and meaningful problem to effectively disseminate the content to the appropriate users. In this dissertation, the typical content dissemination scenarios in MSNs are investigated. According to the content properties, the corresponding user requirements are analyzed. First, a Bayesian framework is formulated to model the factors that influence users behavior on streaming video dissemination. An effective dissemination path detection algorithm is derived to detect the reliable and efficient video transmission paths. Second, the authorized content is investigated. We analyze the characteristics of the authorized content, and model the dissemination problem as a new graph problem, namely, Maximum Weighted Connected subgraph with node Quota (MWCQ), and propose two effective algorithms to solve it. Third, the authorized content dissemination problem in Opportunistic Social Networks(OSNs) is studied, based on the prediction of social connection pattern. We then analyze the influence of social connections on the content acquirement, and propose a novel approach, User Set Selection(USS) algorithm, to help social users to achieve fast and accurate content acquirement through social connections

    Effectiveness of Corporate Social Media Activities to Increase Relational Outcomes

    Get PDF
    This study applies social media analytics to investigate the impact of different corporate social media activities on user word of mouth and attitudinal loyalty. We conduct a multilevel analysis of approximately 5 million tweets regarding the main Twitter accounts of 28 large global companies. We empirically identify different social media activities in terms of social media management strategies (using social media management tools or the web-frontend client), account types (broadcasting or receiving information), and communicative approaches (conversational or disseminative). We find positive effects of social media management tools, broadcasting accounts, and conversational communication on public perception

    Examining the Impact of Emojis on Disaster Communication: A Perspective from the Uncertainty Reduction Theory

    Get PDF
    Communication is a purposeful process, especially during disasters, when emergency management officials and citizen journalists attempt to disseminate relevant information to as many affected people as possible. X (previously Twitter), a popular computer-mediated communication (CMC) platform, has become an essential resource for disaster information given its ability to facilitate real-time communication. Past studies on disasters have mainly concentrated on the verbal-linguistic conventions of words and hashtags as the means to convey disaster-related information. Little attention has been given to non-verbal linguistic cues, such as emojis. In this study, we investigate the use of emojis in disaster communication on X by using uncertainty reduction theory as the theoretical framework. We measured information uncertainty in individual tweets and assessed whether information conveyed in external URLs mitigated such uncertainty. We also examined how emojis affect information uncertainty and information dissemination. The statistical results from analyzing tweets related to the 2018 California Camp Fire disaster show that information uncertainty has a negative impact on information dissemination, and the negative impact was amplified when emojis depicted items and objects instead of facial expressions. Conversely, external URLs reduced the negative impact. This study sheds light on the influence of emojis on the dissemination of disaster information on X and provides insights for both academia and emergency management practitioners in using CMC platforms

    Combating Misinformation on Social Media by Exploiting Post and User-level Information

    Get PDF
    Misinformation on social media has far-reaching negative impact on the public and society. Given the large number of real-time posts on social media, traditional manual-based methods of misinformation detection are not viable. Therefore, computational approaches (i.e., data-driven) have been proposed to combat online misinformation. Previous work on computational misinformation analysis has mainly focused on employing natural language processing (NLP) techniques to develop misinformation detection systems at the post level (e.g., using text and propagation network). However, it is also important to exploit information at the user level in social media, as users play a significant role (e.g., post, diffuse, refute, etc.) in spreading misinformation. The main aim of this thesis is to: (i) develop novel methods for analysing the behaviour of users who are likely to share or refute misinformation in social media; and (ii) predict and characterise unreliable stories with high popularity in social media. To this end, we first highlight the limitations in the evaluation protocol in popular rumour detection benchmarks on the post level and propose to evaluate such systems using chronological splits (i.e., considering temporal concept drift). On the user level, we introduce two novel tasks on (i) early detecting Twitter users that are likely to share misinformation before they actually do it; and (ii) identifying and characterising active citizens who refute misinformation in social media. Finally, we develop a new dataset to enable the study on predicting the future popularity (e.g. number of likes, replies, retweets) of false rumour on Weibo

    It’s more about the Content than the Users! The Influence of Social Broadcasting on Stock Markets

    Get PDF
    Social broadcasting networks facilitate the public exchange of information and contain a large amount of stock-related information. This data is increasingly analyzed by research and practice to predict stock market developments. Insights from social broadcasting networks are used to support the decision-making process of investors and are integrated into automatic trading algorithms to react quickly to broadcasted information. However, a comprehensive understanding about the influence of social broadcasting networks on stock markets is missing. In this study, we address this gap by conceptualizing and empirically testing a model incorporating three dimensions of social broadcasting networks: users, messages, and discussion. We analyze 1.84 million stock-related Twitter messages concerning the S&P 100 companies between January and April 2014 and corresponding intraday stock market data from NYSE and NASDAQ. Our research model is constructed applying factor analyses and tested using a fixed effects panel analysis. The results show that the influence of social broadcasting on stock markets is driven by the message and discussion dimensions whereas the user dimension has no significant influence. Specifically, the influence of user mentions, financial sentiment, discussion reach, and discussion volume has the largest impact and should carefully be considered by investors making trading decisions

    Government 2.5: The Impact of Social Media on Public Sector Accessibility

    Get PDF
    Innovative approaches to communicating with the masses continue to evolve in the private sector, while accessibility of goods, services, and public information within federal, state, and local government organizations has been declining for decades. This situation has resulted in a lack of trust and sense of isolation from communities. At the same time, the implementation and use of social media have increased exponentially. Despite the simultaneous occurrence of these events, limited research has explored the connection between them. Specifically, the purpose of this case study was to address the central research question of whether the adoption of social media platforms results in increased accessibility of goods and services within the public sector. Rogers\u27s diffusion of innovations theory founded the framework for this study. Data were collected within a local government organization through semistructured interviews with 15 employees and 15 clients, observations of daily operations, and analyses of postings made on selected social media platforms. Inductive coding and a comparative method of analysis generated emerging themes and patterns. Key findings of this study indicated significant increases in public accessibility of goods and services as the result of the implementation and use of social media. Relative to diffusion of innovations theory, findings illustrated the spread of new technology through certain channels among employees and clients. Recommendations focus on establishing strategies to ensure widespread diffusion of social media and to address socioeconomic disparities. Government agencies can use this research as a means to advance social change through open communication, an engaged workforce, and increased transparency

    Three Essays on Individuals’ Vulnerability to Security Attacks in Online Social Networks: Factors and Behaviors

    Get PDF
    With increasing reliance on the Internet, the use of online social networks (OSNs) for communication has grown rapidly. OSN platforms are used to share information and communicate with friends and family. However, these platforms can pose serious security threats to users. In spite of the extent of such security threats and resulting damages, little is known about factors associated with individuals’ vulnerability to online security attacks. We address this gap in the following three essays. Essay 1 draws on a synthesis of the epidemic theory in infectious disease epidemiology with the social capital theory to conceptualize factors that contribute to an individual’s role in security threat propagation in OSN. To test the model, we collected data and created a network of hacked individuals over three months from Twitter. The final hacked network consists of over 8000 individual users. Using this data set, we derived individual’s factors measuring threat propagation efficacy and threat vulnerability. The dependent variables were defined based on the concept of epidemic theory in disease propagation. The independent variables are measured based on the social capital theory. We use the regression method for data analysis. The results of this study uncover factors that have significant impact on threat propagation efficacy and threat vulnerability. We discuss the novel theoretical and managerial contributions of this work. Essay 2 explores the role of individuals’ interests in their threat vulnerability in OSNs. In OSNs, individuals follow social pages and post contents that can easily reveal their topics of interest. Prior studies show high exposure of individuals to topics of interest can decrease individuals’ ability to evaluate the risks associated with their interests. This gives attackers a chance to target people based on what they are interested in. However, interest-based vulnerability is not just a risk factor for individuals themselves. Research has reported that similar interests lead to friendship and individuals share similar interests with their friends. This similarity can increase trust among friends and makes individuals more vulnerable to security threat coming from their friends’ behaviors. Despite the potential importance of interest in the propagation of online security attacks online, the literature on this topic is scarce. To address this gap, we capture individuals’ interests in OSN and identify the association between individuals’ interests and their vulnerability to online security threats. The theoretical foundation of this work is a synthesis of dual-system theory and the theory of homophily. Communities of interest in OSN were detected using a known algorithm. We test our model using the data set and social network of hacked individuals from Essay 1. We used this network to collect additional data about individuals’ interests in OSN. The results determine communities of interests which were associated with individuals’ online threat vulnerability. Moreover, our findings reveal that similarities of interest among individuals and their friends play a role in individuals’ threat vulnerability in OSN. We discuss the novel theoretical and empirical contributions of this work. Essay 3 examines the role addiction to OSNs plays in individuals’ security perceptions and behaviors. Despite the prevalence of problematic use of OSNs and the possibility of addiction to these platforms, little is known about the functionalities of brain systems of users who suffer from OSN addiction and their online security perception and behaviors. In addressing these gaps, we have developed the Online addiction & security behaviors (OASB) theory by synthesizing dual-system theory and extended protection motivation theory (PMT). We collected data through an online survey. The results indicate that OSN addiction is rooted in the individual’s brain systems. For the OSN addicted, there is a strong cognitive-emotional preoccupation with using OSN. Our findings also reveal the positive and significant impact of OSN addiction on perceived susceptibility to and severity of online security threats. Moreover, our results show the negative association between OSN addiction and perceived self-efficacy. We discuss the theoretical and practical implications of this work
    • …
    corecore