𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

From Sociology to Computing in Social Networks: Theory, Foundations and Applications (Lecture Notes in Social Networks)

✍ Scribed by Nasrullah Memon (editor), Reda Alhajj (editor)


Publisher
Springer
Year
2010
Tongue
English
Leaves
437
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Important aspects of social networking analysis are covered in this work by combining experimental and theoretical research. A specific focus is devoted to emerging trends and the industry needs associated with utilizing data mining techniques. Some of the techniques covered include data mining advances in the discovery and analysis of communities, in the personalization of solitary activities (like searches) and social activities (like discovering potential friends), in the analysis of user behavior in open fora (like conventional sites, blogs and fora) and in commercial platforms (like e-auctions), and in the associated security and privacy-preservation challenges; as well as social network modeling, scalable, customizable social network infrastructure construction, and the identification and discovery of dynamic growth and evolution patterns using machine learning approaches or multi-agent based simulation. These topics will be of interest to practitioners and researchers alike in this dynamic and growing field.

✦ Table of Contents


Title Page
Copyright Page
Table of Contents
List of Contributors
Social Networks: A Powerful Model for Serving a Wide Range of Domains
1 General Overview
2 The need for the Lecture Notes in Social Network Series
3 Organization of the Volume
Section 1: Mining-based Social Network Methods
Section 2: Dynamics in Soial Network Models
Section 3: Discovering Structures in Social Networks
Section 4: Social Media
Section 5: Software Applications
Acknowledgements
References
Part 1 Mining-based Social Network Methods
Employing Social Network Construction and Analysis in Web Structure Optimization
1 Introduction
2 Related Work
3 The Proposed Website Analysis Approach
3.1 Web Structure Mining
3.1.1 Weighted PageRank Based Ranking
3.1.2 HITS Based Ranking
3.1.3 Social Network Based Ranking
3.2 Ranking Pages Based on Web Log Mining
3.2.1 Preprocessing:
3.2.2 Computing Log Rank Values
3.3 Analyzing the Outcome from the First Phase
3.3.1 Preprocessing
3.3.2 Guideline to Recommendations
3.4 Ranking Pages by Employing Web Content Mining
3.5 The Relinking Process
4 Evaluation of the Proposed Approach
5 Summary and Conlusion
References
Mining Heterogeneous Social Networks for Egocentric Information Abstraction
1 Introduction
2 Related Works
3 Methodology
3.1 Ego-based Feature Extraction
3.2 Nodes and Paths Sampling
3.3 Information Distilling
3.4 Abstracted Graph Construction
4 Evaluations
4.1 Case Study for a Movie Network
4.2 Human Study for Crime Identification
5 Discussions
6 Conclusions
References
PROG: A Complementary Model to the Social Networks for Mining Forums
1 Introduction
2 Background
3 Post-reply Opinion Graph
3.1 Properties
3.2 Components
4 Measures
4.1 Structure-oriented Measures
4.2 Opinion-oriented Measures
4.3 Time-oriented Measures
4.4 Topic-oriented Measures
5 Application
6 Conclusion and Future Work
References
Socio-contextual Network Mining for User Assistance in Web-based Knowledge Gathering Tasks
1 Introduction
2 Related Work
3 A Socio-contextual Approach to Contextual User Assistance in WKG
3.1 Challenges in WKG
3.2 Observing a WKG Task
3.3 Semantic Link Network
3.4 Types of SLN
3.5 Construction of SLN
3.6 Restructuring Master SLN
3.7 Socio-contextual Mining of Master SLN for Discovering Similar Structures
4 Experiments and Evaluation
4.1 Experiment
4.2 Analysis
5 Conclusion
Acknowledgements
References
Integrating Entropy and Closed Freqent Pattern Mining for Social Netword Modelling and Analysis
1 Introduction
2 Related Works
3 Problem Staement
4 The Proposed Framework
4.1 Feature Extraction Model
4.2 Social Network Creation Model
4.3 Statistical Analysis Model
4.4 Visualization Model
5 Dynamic Behavior Analysis
6 Experimental Results
6.1 Synthetic Dataset
6.2 Enron E-mail Dataset
6.2.1 Data Processing and Network Extraction
6.2.2 Dynamic User Behavior
7 Conclusion and Future Work
References
Part 2 Dynamics in Social Network Models
Visualisation of the Dynamics for Computer-mediated Social Networks-concept and Exemplary Cases
1 Introduction
2 Data Collection and Processing
3 Visualisation Approaches - Towards a Representation of Network Dynamics
4 Implementation
5 Example Cases for the Visualisation Method
5.1 CSCL Citation Network
5.2 OpenSimulator Network
6 Conclusion and Perspectives
References
EWAS: Modeling Application for Early Detection of Terrorist Threats
1 Introduction
2 State-of-the-Art
3 Problems with Existing Systems
4 Functional Requirements
5 The Proposed System
6 Data Processing Phases
6.1 Acquisition Phase
6.2 Extration Phase
6.3 Information Generation Phase
6.4 Investigating Phase
6.5 Warining Generation Phase
7 EWAS System Architecture
7.1 Acquisition Cluster
7.2 Extraction Cluster
7.3 Investigation System
7.4 Warning Generation System
7.5 Warning Generation Rule Anatomy
8 Testing and Implementation Strategy for EWAS
9 Compliance with Requirements
10 Experimental Results
11 Conclusion and Future Extensions
References
Complex Dynamics in Information Sharing Networks
1 Introduction
2 Literature
3 Methods and Data
4 Results
4.1 Usage Trends
4.2 Fourier Analysis
4.3 Usage Distribution Analysis
4.4 Social Network Analysis
4.5 Regession Analysis
5 Discussion and Conclusion
References
Harnessing Wisdom of the Crowds Dynamics for Time-dependent Reputation and Ranking
1 Introduction
2 Social and Term Ranking Based on Reputation
2.1 User Reputation
2.2 Document Reputation
2.3 Time Dynamics
2.4 Reputation Ranking: Combining Document and User Reputation
2.5 Term-reputation Ranking: Combining Reputation Ranking and Term Ranking
3 Experiment Results
3.1 Expermental Setup
3.2 Documents
Ranking
3.3 Ranking Popular Documents
3.4 Ranking Less Popular Documents
3.5 Ranking Popular Documents Using Term-reputation
4 Related Work
5 Conclusion
References
Part 3 Discovering Structures in Social Networks
Detecting Communities in Social Networks Using Local Information
1 Introduction
2 Related Work
3 Preliminaries
3.1 Problem Definition
3.2 Previous Approaches
4 Our Approach
4.1 The Local Community Metric L
4.2 Local Community Struture Discovery
4.3 Iterative Local Expansion
5 Experiment Results
5.1 Comparing Metric Accuracy
5.1.1 The NCAA Football Network
5.1.2 The Amazon Co-purchase Network
5.2 Interatively Finding Overlapping Communities
6 Conclusion and Future Work
7 Acknowledgments
References
Why Do Diffusion Data Not Fit the Logistic Model? A Note on Network Discreteness, Heterogeneity and Anisotropy
1 A Brief Historical Sketch
2 The Logistic Function
3 Empirical Data
4 Accounting for Anomalies
5 Net Discreteness
6 Net Heterogeneity
7 Net Anisotropy
8 A Test of DHA Indices
9 Conclusion
References
Interlocking Communication Measuring Collaborative Intensity in Social Networks
1 Introduction
2 Research on Collaboration Networks
3 From Communication to Collaboration
4 Collaborative Intensity
5 Case Studies
6 Evaluating Collaborative Intensity
7 Filtering
8 Centrality in Weighted Networks
9 Conclusion
References
The Strucural Underpinnings of Policy Learning: A Classroom Policy Simulation
1 Learning Mechanisms
2 Hypothese
3 Research Design
4 Findings
5 Diffusion versus Interaction
6 Tie Intensity and Learning
7 Discussion
8 Conclusion
References
Part 4 Social Media
A Journey to the Core of the Blogosphere
1 Introduction
1.1 The Blogosphere
1.2 Rationale
2 Data Set Acquisition
2.1 Blog Seeds
Untitled
2.2 Using the Blogroll
2.3 Crawling Blogroll Links
2.4 Crawling the Data Sets
3 Core Model
3.1 Notations
3.2 Existing Core Models
3.3 Core Models for Directed Graphs
3.4 The In-core Algorithm
4 Core Analysis
4.1 Comparison to Random Networks
4.2 Comparing the Data Sets
4.3 Comparison with the Core/Periphery Model
5 Identifying A-List Blogs
5.1 Constraints
5.2 Structural Analysis
5.3 Core Independency
6 Conclusion
References
Social Physics of the Blogosphere Capturing, Analyzing and Presenting Interdependencies within a Single Framework
1 Introduction
1.1 The Bigger Picture
1.2 Research Rationale
1.3 Research Overview and Chapter Arrangement
2 Related Work
3 Framework
4 Extraction: Data Elements and Crawler Implementation
4.1 Information Elements
4.2 Crawler Action-Sequence
4.3 Recognizing Weblogs
4.4 Recognizing Feeds
4.5 Storing Crawled Data
4.6 Refreshing Period of Crawled Data
5 Analysis: Integration of Proprietary and Existing Research Efforts
5.1 Network Analysis
5.2 Content Analysis
6 Visualization
7 Conclusion
References
Twitmographics: Learning the Emergent Properties of the Twitter Community
1 Introduction
2 Prior Work
3 Proposed Framework
3.1 Features of MessageStats
3.2 Features of UserDemographics
3.3 Message Harvesting Process
4 Validation Results on Synthesized Attributes
5 Case Studies
5.1 Case 1: "Iran Election"
5.2 Case 2: "iPhone"
5.3 Case 3: "Obama"
6 Conclusion
References
Dissecting Twitter: A Review on Current Microblogging Research and Lessons from Related Fields
1 Introduction
2 Exploratory Studies on Twitter
2.1 Twitter's Properties and Emergent Features
2.2 Message Addressivety and Forwarding on Twitter
3 Information Spread and Self-organization on Twitter and Related Disciplines
3.1 Twitter in Crisis and Convergence
3.2 Pattern Detection and User/Message Clustering Twitter
3.3 Related Literature: On Viral InFormation Spread and Memetics
3.4 Related Literature: Approaches to Trend Analysis from Existing Blogs and Social Media
4 Twitter for Sentiment and Opinion Analysis
4.1 Twitter to Gauge User Interest
4.2 Twitter for Opinion Analysis: Case Study in Political Debates
4.3 Twitter for Marketing and Brand Setiment Analysis
5 Human Factors on Twitter
5.1 User Intention for Participating in Twitter
5.2 Best Practices and Typical Usage Scenarios
5.3 Social Information Needs and Wants
6 Twitter in Computer-based Visualizations
6.1 Twitter: Visualization and CHI studies
6.2 Twitter Web-based Visualization Tools
7 Comparison
8 Conclusion
References
Part 5 Software Applications
Unleash the CSS-Factor A Social Capital Approach to the Benefits and Challenges of Corporate Social Software
1 Introduction
2 The intranet (R)Evolution
3 E=MC2
4 Corporate Social Software - A secret Weapon?
5 Benefits versus Challenges of CSS-Evidence from Inside the Firewall
6 Conclusion
References
Extending SQL to Support Privacy Policies
1 Introduction
1.1 Requirements for Extension
1.2 User Privacy Requirements
1.3 Organization
2 Extending SQL to Support Privacy Policies
2.1 Overview of CREATE TABLE
2.2 Extended CREATE TABLE
2.3 Overview of GRANT
2.4 Modified GRANT
2.5 Overview of REVOKE
2.6 Modified REVOKE
3 Model Semantics
3.1 Privacy Catalogues
3.2 Extended Data Manipulation Language
4 Complexity Analysis
4.1 Implenentation
5 Related Work
6 Conclusion
References
nCompass Service Oriented Architecture for Tacit Collaboration Services
1 Introduction
2 Objectives
3 Technical Foundations
3.1 Oculus nSpace
3.2 Service Oriented Archiecture (SOA)
3.3 Tacit Collaboration Approach
4 Scenario Illustrating Use and Impact
5 nCompass
6 nCompass Core Services
6.1 Analysis Log Service (ALS)
6.1.1 Analysis Log Events (ALEs)
6.2 Content Management Service (CMS)
6.3 Authention Management Service (AMS)
6.4 Group Management Service (GMS)
7 Experiments and Results
7.1 Ease of Integration
7.2 Impact on Experiment Design
7.3 Tacit Collaboration Through Context-sharing
8 Related Work
9 Conclusion and Future Work
Acknowledgments
References
SOA Security Aspects in Web-based Architectural Design
1 Introduction
1.1 CRUD Operations
1.2 Security Using SOA
1.3 Security Problems
2 WS-Security in CRUD operations
3 Proposed Architecture
3.1 Interface between Nurse and Application
3.2 Interface betwrrn Doctor and Application
3.3 Swcurity Measures for an Intruder
3.4 Security Implementation at Nurse's End
3.5 Security Implementation at the Doctor's End
3.6 Prevention from Replay Attack
4 Experiments and Results
4.1 Security Scenariors
5 Related Work
6 Conclusion and Future Work
References


πŸ“œ SIMILAR VOLUMES


From Sociology to Computing in Social Ne
✍ Nasrullah Memon, Reda Alhajj πŸ“‚ Library πŸ“… 2010 🌐 English

Important aspects of social networking analysis are covered in this work by combining experimental and theoretical research. A specific focus is devoted to emerging trends and the industry needs associated with utilizing data mining techniques. Some of the techniques covered include data mining adva

Cyber Security and Social Media Applicat
✍ Sibel TarΔ±yan Γ–zyer (editor), Buket Kaya (editor) πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<p><span>This book offers an excellent source of knowledge for readers who are interested in keeping up with the developments in the field of cyber security and social media analysis. It covers the possibility of using augmented reality to monitor cyber security feeds in a multitasking environment.

Social Computing and Social Media: Exper
✍ Gabriele Meiselwitz (editor) πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p><span>This two-volume set LNCS 12774 and 12775 constitutes the refereed proceedings of the 13th International Conference on Social Computing and Social Media, SCSM 2021, held as part of the 23rd International Conference, HCI International 2021, which took place in July 2021. Due to COVID-19 pande

Pervasive Computing and Social Networkin
✍ G. Ranganathan (editor), Robert Bestak (editor), Xavier Fernando (editor) πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<span>The book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2022), organized by NSIT, Salem, India during 3 – 4 March 2022. It covers research works on conceptual, constructive, empirical, theoretical and practical implementations of per

Pervasive Computing and Social Networkin
✍ G. Ranganathan (editor), Robert Bestak (editor), Ram Palanisamy (editor), Álvaro πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span>The book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2021), organized by NSIT, Salem, India during 19 – 20 march 2021. It covers research works on conceptual, constructive, empirical, theoretical and practical implementations of p

Pervasive Computing and Social Networkin
✍ G. Ranganathan (editor), Robert Bestak (editor), Xavier Fernando (editor) πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<span>The book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2022), organized by NSIT, Salem, India during 3 – 4 March 2022. It covers research works on conceptual, constructive, empirical, theoretical and practical implementations of per