<p><p>This collection of contributed chapters demonstrates a wide range of applications within two overlapping research domains: social media analysis and social network analysis. Various methodologies were utilized in the twelve individual chapters including static, dynamic and real-time approaches
Influence and Behavior Analysis in Social Networks and Social Media
β Scribed by Mehmet Kaya, Reda Alhajj
- Publisher
- Springer International Publishing
- Year
- 2019
- Tongue
- English
- Leaves
- 238
- Series
- Lecture Notes in Social Networks
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This timely book focuses on influence and behavior analysis in the broader context of social network applications and social media. Twitter accounts of telecommunications companies are analyzed. Rumor sources in finite graphs with boundary effects by message-passing algorithms are identified.
The coherent, state-of-the-art collection of chapters was initially selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. Original chapters coming from outside of the meeting round out the coverage. The result will appeal to researchers and students working in social network and social media analysis.
β¦ Table of Contents
Front Matter ....Pages i-vi
Social Network to Improve the Educational Experience with the Deployment of Different Learning Models (PaΓΊl Esteban Vintimilla-Tapia, Jack Fernando Bravo-Torres, Pablo Leonidas Gallegos-Segovia, Esteban Fernando OrdΓ³Γ±ez-Morales, MartΓn LΓ³pez-Nores, Yolanda Blanco-FernΓ‘ndez)....Pages 1-25
Temporal Model of the Online Customer Review Helpfulness Prediction with Regression Methods (Shih-Hung Wu, Yi-Hsiang Hsieh, Liang-Pu Chen, Ping-Che Yang, Liu Fanghuizhu)....Pages 27-38
Traits of Leaders in Movement Initiation: Classification and Identification (Chainarong Amornbunchornvej, Margaret C. Crofoot, Tanya Y. Berger-Wolf)....Pages 39-62
Emotional Valence Shifts and User Behavior on Twitter, Facebook, and YouTube (Ema KuΕ‘en, Mark Strembeck, Mauro Conti)....Pages 63-83
Diffusion Algorithms in Multimedia Social Networks: A Novel Model (Flora Amato, Vincenzo Moscato, Antonio Picariello, Giancarlo SperlΓ)....Pages 85-103
Detecting Canadian Internet Satisfaction by Analyzing Twitter Accounts of Shaw Communications (Satara Cressy, Brenda Pham, Hannah Wright, Reda Alhajj)....Pages 105-126
Editing Behavior Analysis for Predicting Active and Inactive Users in Wikipedia (Harish Arelli, Francesca Spezzano, Anu Shrestha)....Pages 127-147
Incentivized Social Sharing: Characteristics and Optimization (Joseph J. Pfeiffer III, Elena Zheleva)....Pages 149-174
Rumor Source Detection in Finite Graphs with Boundary Effects by Message-Passing Algorithms (Pei-Duo Yu, Chee Wei Tan, Hung-Lin Fu)....Pages 175-192
Robustness of Influence Maximization Against Non-adversarial Perturbations (Sho Tsugawa, Hiroyuki Ohsaki)....Pages 193-210
Analyzing Social Book Reading Behavior on Goodreads and How It Predicts Amazon Best Sellers (Suman Kalyan Maity, Abhishek Panigrahi, Animesh Mukherjee)....Pages 211-235
β¦ Subjects
Social Sciences; Computational Social Sciences; Computer Appl. in Social and Behavioral Sciences; Consumer Behavior; Social Media
π SIMILAR VOLUMES
<p><span>This two-volume set LNCS 12774 and 12775 constitutes the refereed proceedings of the 13th International Conference on Social Computing and Social Media, SCSM 2021, held as part of the 23rd International Conference, HCI International 2021, which took place in July 2021. Due to COVID-19 pande
In large-scale media-sharing social networks, where millions of users create, share, link and reuse media content, there are clear challenges in protecting content security and intellectual property, and in designing scalable and reliable networks capable of handling high levels of traffic. This com
In large-scale media-sharing social networks, where millions of users create, share, link and reuse media content, there are clear challenges in protecting content security and intellectual property, and in designing scalable and reliable networks capable of handling high levels of traffic. This com