7Gill,John.Students and tutors ready to embrace the Twitter bug[J].Times Higher Education,2009,26(3).
8Akshay Java,Xiaodan Song,Tim Finin,Belle Tseng.Why We Twitter:Understanding Microblogging Usage and Communities[A].In Procedings of the Joint 9th WEBKDD and 1st SNA-KDD Workshop[C].2007.
3Rui H X, Whinston A. Information or Attention? An Empirical Study of User Contribution on Twitter [ J ]. Information System E-Business Management, 20]2 (10) : 309 -324.
4Cheong M, Lee V C S. A Microblogging-Based Approach to Terrorism Informatics: Exploration and Chronicling Civilian Sentiment and Response to Terrorism Events via Twitter [ J]. Information System Front, 20]! (13) ; 45 -59.
5Sonnenbichler A C, Bazant C. Application of a Community Membership Life Cycle Model on Tag-Based Communities in -witter [C]. Proceedings of the 34th Annual Conference of the Gesellschaft fur Klassifikation e. V. , Karlsruhe, 2010:30 - 309.
6Wang A H, Machine Learning for the Detection of Spam in Twitter Networks [A]// Obaidat M S, Tsihrintzis G A, Filipe J (eds). E-Business and Telecommunications-Tth International Joint Conference, ICETE 2010, Athens, Greece, July 26- 28, 2010, Revised Selected Papers [ C] . CCIS 222. Springer Berlin Heidelberg, 2012:319 -333.
7Vosecky J, Leung K W, Ng W. Searching for Quality Microblog Posts: Filtering and Ranking Based on Content Analysis and Implicit Links [A]// Lee S - g, Peng Z, Zhou X, et al (Eds.) . Database System for Advanced Applications - 17th International Conference, DASFAA 2012, Busan, South Korea, April 15- 19, 2012, Proceedings, Part I [C]. LNCS 7238. Springer Berlin Heidelberg, 2012:397 - 413.