37 research outputs found

    Understanding Factors Influencing Users’ Retweeting Behavior---A Theoretical Perspective

    Get PDF
    Currently, a large percentage of tweets in micro-blogging platform are retweets. In this study, we propose to examine the factors that motivate users’ retweeting behavior, leading users to prefer to transform others’ tweets than posting their own. We suggest that Information Sharing Self-Efficacy, Attachment Motivation and Critical Mass are the three antecedents contributing to the users’ retweeting behavior. Both theoretical and practical implications of this study are also discussed

    Postmortem Analysis of Decayed Online Social Communities: Cascade Pattern Analysis and Prediction

    Full text link
    Recently, many online social networks, such as MySpace, Orkut, and Friendster, have faced inactivity decay of their members, which contributed to the collapse of these networks. The reasons, mechanics, and prevention mechanisms of such inactivity decay are not fully understood. In this work, we analyze decayed and alive sub-websites from the StackExchange platform. The analysis mainly focuses on the inactivity cascades that occur among the members of these communities. We provide measures to understand the decay process and statistical analysis to extract the patterns that accompany the inactivity decay. Additionally, we predict cascade size and cascade virality using machine learning. The results of this work include a statistically significant difference of the decay patterns between the decayed and the alive sub-websites. These patterns are mainly: cascade size, cascade virality, cascade duration, and cascade similarity. Additionally, the contributed prediction framework showed satisfactory prediction results compared to a baseline predictor. Supported by empirical evidence, the main findings of this work are: (1) the decay process is not governed by only one network measure; it is better described using multiple measures; (2) the expert members of the StackExchange sub-websites were mainly responsible for the activity or inactivity of the StackExchange sub-websites; (3) the Statistics sub-website is going through decay dynamics that may lead to it becoming fully-decayed; and (4) decayed sub-websites were originally less resilient to inactivity decay, unlike the alive sub-websites

    Twitter financial community sentiment and its predictive relationship to stock market movement

    Get PDF
    Twitter, one of the several major social media platforms, has been identified as an influential factor for financial markets by multiple academic and professional publications in recent years. The motivation of this study hinges on the growing popularity of the use of Twitter and the increasing prevalence of its influence among the financial investment community. This paper presents empirical evidence of the existence of a financial community on Twitter in which users’ interests align with financial market-related topics. We establish a methodology to identify relevant Twitter users who form the financial community, and we also present the empirical findings of network characteristics of the financial community. We observe that this financial community behaves similarly to a small-world network, and we further identify groups of critical nodes and analyse their influence within the financial community based on several network centrality measures. Using a novel sentiment analysis algorithm, we construct a weighted sentiment measure using tweet messages from these critical nodes, and we discover that it is significantly correlated with the returns of the major financial market indices. By forming a financial community within the Twitter universe, we argue that the influential Twitter users within the financial community provide a proxy for the relationship between social sentiment and financial market movement. Hence, we conclude that the weighted sentiment constructed from these critical nodes within the financial community provides a more robust predictor of financial markets than the general social sentiment

    Predicting Community Evolution in Social Networks

    Full text link
    Nowadays, sustained development of different social media can be observed worldwide. One of the relevant research domains intensively explored recently is analysis of social communities existing in social media as well as prediction of their future evolution taking into account collected historical evolution chains. These evolution chains proposed in the paper contain group states in the previous time frames and its historical transitions that were identified using one out of two methods: Stable Group Changes Identification (SGCI) and Group Evolution Discovery (GED). Based on the observed evolution chains of various length, structural network features are extracted, validated and selected as well as used to learn classification models. The experimental studies were performed on three real datasets with different profile: DBLP, Facebook and Polish blogosphere. The process of group prediction was analysed with respect to different classifiers as well as various descriptive feature sets extracted from evolution chains of different length. The results revealed that, in general, the longer evolution chains the better predictive abilities of the classification models. However, chains of length 3 to 7 enabled the GED-based method to almost reach its maximum possible prediction quality. For SGCI, this value was at the level of 3 to 5 last periods.Comment: Entropy 2015, 17, 1-x manuscripts; doi:10.3390/e170x000x 46 page

    A Connectivity-Sensitive Approach to Consensus Dynamics

    Get PDF
    The paper resolves a long-standing open question in network dynamics. Averaging-based consensus has long been known to exhibit an exponential gap in relaxation time between the connected and disconnected cases, but a satisfactory explanation has remained elusive. We provide one by deriving nearly tight bounds on the s-energy of disconnected systems. This in turn allows us to relate the convergence rate of consensus dynamics to the number of connected components. We apply our results to opinion formation in social networks and provide a theoretical validation of the concept of an Overton window as an attracting manifold of "viable" opinions

    Collateral damage of Facebook third-party applications: a comprehensive study

    Get PDF
    Third-party applications on Facebook can collect personal data of the users who install them, but also of their friends. This raises serious privacy issues as these friends are not notified by the applications nor by Facebook and they have not given consent. This paper presents a detailed multi-faceted study on the collateral information collection of the applications on Facebook. To investigate the views of the users, we designed a questionnaire and collected the responses of 114 participants. The results show that participants are concerned about the collateral information collection and in particular about the lack of notification and of mechanisms to control the data collection. Based on real data, we compute the likelihood of collateral information collection affecting users: we show that the probability is significant and greater than 80% for popular applications such as TripAdvisor. We also demonstrate that a substantial amount of profile data can be collected by applications, which enables application providers to profile users. To investigate whether collateral information collection is an issue to users’ privacy we analysed the legal framework in light of the General Data Protection Regulation. We provide a detailed analysis of the entities involved and investigate which entity is accountable for the collateral information collection. To provide countermeasures, we propose a privacy dashboard extension that implements privacy scoring computations to enhance transparency toward collateral information collection. Furthermore, we discuss alternative solutions highlighting other countermeasures such as notification and access control mechanisms, cryptographic solutions and application auditing. To the best of our knowledge this is the first work that provides a detailed multi-faceted study of this problem and that analyses the threat of user profiling by application providers

    From Conventional to State-of-the-Art IoT Access Control Models

    Get PDF
    open access articleThe advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applications. Similarly, more than a billion people are connected through social networking sites to collaborate and share their knowledge. The applications of IoT such as smart health, smart city, social networking, video surveillance and vehicular communication are quickly evolving people’s daily lives. These applications provide accurate, information-rich and personalized services to the users. However, providing personalized information comes at the cost of accessing private information of users such as their location, social relationship details, health information and daily activities. When the information is accessible online, there is always a chance that it can be used maliciously by unauthorized entities. Therefore, an effective access control mechanism must be employed to ensure the security and privacy of entities using OSN and IoT services. Access control refers to a process which can restrict user’s access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. This survey examines the increasing literature on access control for traditional models in general, and for OSN and IoT in specific. Challenges and problems related to access control mechanisms are explored to facilitate the adoption of access control solutions in OSN and IoT scenarios. The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access control models. We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the sam

    Event detection in social networks

    Get PDF
    corecore