The inter-city linkage heat data provided by Baidu Migration is employed as a characterization of inter-city linkages in order to facilitate the study of the network linkage characteristics and hierarchical structure ...The inter-city linkage heat data provided by Baidu Migration is employed as a characterization of inter-city linkages in order to facilitate the study of the network linkage characteristics and hierarchical structure of urban agglomeration in the Greater Bay Area through the use of social network analysis method.This is the inaugural application of big data based on location services in the study of urban agglomeration network structure,which represents a novel research perspective on this topic.The study reveals that the density of network linkages in the Greater Bay Area urban agglomeration has reached 100%,indicating a mature network-like spatial structure.This structure has given rise to three distinct communities:Shenzhen-Dongguan-Huizhou,Guangzhou-Foshan-Zhaoqing,and Zhuhai-Zhongshan-Jiangmen.Additionally,cities within the Greater Bay Area urban agglomeration play different roles,suggesting that varying development strategies may be necessary to achieve staggered development.The study demonstrates that large datasets represented by LBS can offer novel insights and methodologies for the examination of urban agglomeration network structures,contingent on the appropriate mining and processing of the data.展开更多
The public is increasingly using social media platforms such as Twitter and Facebook to express their views on a variety of topics.As a result,social media has emerged as the most effective and largest open source for...The public is increasingly using social media platforms such as Twitter and Facebook to express their views on a variety of topics.As a result,social media has emerged as the most effective and largest open source for obtaining public opinion.Single node computational methods are inefficient for sentiment analysis on such large datasets.Supercomputers or parallel or distributed proces-sing are two options for dealing with such large amounts of data.Most parallel programming frameworks,such as MPI(Message Processing Interface),are dif-ficult to use and scale in environments where supercomputers are expensive.Using the Apache Spark Parallel Model,this proposed work presents a scalable system for sentiment analysis on Twitter.A Spark-based Naive Bayes training technique is suggested for this purpose;unlike prior research,this algorithm does not need any disk access.Millions of tweets have been classified using the trained model.Experiments with various-sized clusters reveal that the suggested strategy is extremely scalable and cost-effective for larger data sets.It is nearly 12 times quicker than the Map Reduce-based model and nearly 21 times faster than the Naive Bayes Classifier in Apache Mahout.To evaluate the framework’s scalabil-ity,we gathered a large training corpus from Twitter.The accuracy of the classi-fier trained with this new dataset was more than 80%.展开更多
Social network analysis(SNA) has been introduced to China's Mainland since the end of last century. It is often stated that SNA research has experienced rapid growth in China over these years, but few studies have...Social network analysis(SNA) has been introduced to China's Mainland since the end of last century. It is often stated that SNA research has experienced rapid growth in China over these years, but few studies have been conducted to prove the statement. This paper aims at exploring the research status and development of SNA in China by a critical assessment of journal articles. Our findings show that SNA is an evolving and diversified research area which has rich themes and topics, and can be applied to those studies on different levels, context and disciplines, and attract researchers and scholars from various fields and domains. In addition, the information community(Library & Information Science and Information Systems) plays a leading role in the SNA related researches. The paper also points out the research on SNA in China has some limitations, so it proposes several implications for the future development of SNA research from perspectives of information science.展开更多
At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper pro...At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper proposes a feature fusion network model Bert-TextLevelGCN based on BERT pre-training and improved TextGCN. On the one hand, Bert is introduced to obtain the initial vector input of graph neural network containing rich semantic features. On the other hand, the global graph connection window of traditional TextGCN is reduced to the text level, and the message propagation mechanism of global sharing is applied. Finally, the output vector of BERT and TextLevelGCN is fused by interpolation update method, and a more robust mapping of positive and negative sentiment classification of public opinion text of “Tangshan Barbecue Restaurant beating people” is obtained. In the context of the national anti-gang campaign, it is of great significance to accurately and efficiently analyze the emotional characteristics of public opinion in sudden social violence events with bad social impact, which is of great significance to improve the government’s public opinion warning and response ability to public opinion in sudden social security events. .展开更多
The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related in...The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition.展开更多
Objective:To explore and visualize the connectivity of suspected Ebola cases and surveillance callers who used cellphone technology in Moyamba District in Sierra Leone for Ebola surveillance,and to examine the demogra...Objective:To explore and visualize the connectivity of suspected Ebola cases and surveillance callers who used cellphone technology in Moyamba District in Sierra Leone for Ebola surveillance,and to examine the demographic differences and characteristics of Ebola surveillance callers who make more calls as well as those callers who are more likely to make at least one positive Ebola call.Methods:Surveillance data for 393 suspected Ebola cases(192 males,201 females) were collected from October 23,2014 to June 28,2015 using cellphone technology.UCINET and Net Draw software were used to explore and visualize the social connectivity between callers and suspected Ebola cases.Poisson and logistic regression analyses were used to do multivariable analysis.Results:The entire social network was comprised of 393 ties and 745 nodes.Women(AOR=0.33,95% CI [0.14,0.81]) were associated with decreased odds of making at least one positive Ebola surveillance call compared to men.Women(IR= 0.63,95% CI [0.49,0.82]) were also associated with making fewer Ebola surveillance calls compared to men.Conclusion:Social network visualization can analyze syndromic surveillance data for Ebola collected by cellphone technology with unique insights.展开更多
This paper presents our vision of large-scale, dynamic social network analysis in real environments, which we expect to be enabled by the introduction of large-scale heterogeneous sensors in the ambient environment. W...This paper presents our vision of large-scale, dynamic social network analysis in real environments, which we expect to be enabled by the introduction of large-scale heterogeneous sensors in the ambient environment. We address challenges in realizing large-scale dynamic social network analysis in real environments, and discuss several promising applications. Moreover, we present our design and implementation of a prototype system for quasi-realtime social network construction. We finally present preliminary experimental results of dynamic social network analysis for six-person social gatherings in a real environment, and discuss the feasibility of dynamic social network analysis and its effectiveness.展开更多
The advent of the age of Information shifts the environment we live in from off-line to on-line. The prospect of Collective Intelligence (CI) is promising. Based on this background, the aim of this paper is to discove...The advent of the age of Information shifts the environment we live in from off-line to on-line. The prospect of Collective Intelligence (CI) is promising. Based on this background, the aim of this paper is to discover the emergence mechanism and influence factors of CI in knowledge communities using the method of quantitative and qualitative analysis. On the basis of the previous research work, our model theorizes that the two dimensions of social network (i.e., interactive network structure and participant’s characteristics) affect two references of effectiveness (i.e. group knowledge production and participation of group decision). And this hypothetical model is validated with simulation data from “Zhihu” community. Our model has been useful since it offers some inspirations and directions to promote the level of CI in knowledge communities.展开更多
This paper provides a comprehensive overview of evolution and innovation in social network analysis to the paradigm of social networking. It explains how the development of sociological theory and the structural prope...This paper provides a comprehensive overview of evolution and innovation in social network analysis to the paradigm of social networking. It explains how the development of sociological theory and the structural properties of social groups matter to computer science and communications. Authors such as Moreno, John Barnes and Harrison C. White provide evidence of a growing body of literature addressing the networking of people, organizations and communities to explain the structure of society. This perspective has passed from sociology to other fields, changing understandings of social phenomena. Social networks remain a potent concept for analyzing computer science and communications. This paper shows how and why this has occurred and examines substantive areas in which social network analysis has been applied—mainly how the advantages of graphic visualization and computer software packages have influenced SNA in different audiences and publics leading to the unfolding of social networking to different audiences and publics.展开更多
In a social network analysis the output provided includes many measures and metrics. For each of these measures and metric, the output provides the ability to obtain a rank ordering of the nodes in terms of these meas...In a social network analysis the output provided includes many measures and metrics. For each of these measures and metric, the output provides the ability to obtain a rank ordering of the nodes in terms of these measures. We might use this information in decision making concerning disrupting or deceiving a given network. All is fine when all the measures indicate the same node as the key or influential node. What happens when the measures indicate different key nodes? Our goal in this paper is to explore two methodologies to identify the key players or nodes in a given network. We apply TOPSIS to analyze these outputs to find the most influential nodes as a function of the decision makers' inputs as a process to consider both subjective and objectives inputs through pairwise comparison matrices. We illustrate our results using two common networks from the literature: the Kite network and the Information flow network from Knoke and Wood. We discuss some basic sensitivity analysis can may be applied to the methods. We find the use of TOPSIS as a flexible method to weight the criterion based upon the decision makers' inputs or the topology of the network.展开更多
Because of everyone's involvement in social networks, social networks are full of massive multimedia data, and events are got released and disseminated through social networks in the form of multi-modal and multi-att...Because of everyone's involvement in social networks, social networks are full of massive multimedia data, and events are got released and disseminated through social networks in the form of multi-modal and multi-attribute heterogeneous data. There have been numerous researches on social network search. Considering the spatio-temporal feature of messages and social relationships among users, we summarized an overall social network search framework from the perspective of semantics based on existing researches. For social network search, the acquisition and representation of spatio-temporal data is the basis, the semantic analysis and modeling of social network cross-media big data is an important component, deep semantic learning of social networks is the key research field, and the indexing and ranking mechanism is the indispensable part. This paper reviews the current studies in these fields, and then main challenges of social network search are given. Finally, we give an outlook to the prospect and further work of social network search.展开更多
The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications.The existing researches on user privacy protection in mobile social network mainly focus on pr...The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications.The existing researches on user privacy protection in mobile social network mainly focus on privacy preserving data publishing and access control.There is little research on the association of user privacy information,so it is not easy to design personalized privacy protection strategy,but also increase the complexity of user privacy settings.Therefore,this paper concentrates on the association of user privacy information taking big data analysis tools,so as to provide data support for personalized privacy protection strategy design.展开更多
Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods...Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach: Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings: Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect. Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks. Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism. Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations: The sample size needs to be increased so that samples are more representative. Errors may exist during the data collection. Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications: This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social media. In addition,it provides insight into the characteristics of information diffusion in weblogs and microblogs and the possible reasons of these differences.Originality/value: We have analyzed the characteristics of information diffusion in weblogs and microblogs by using the social network analysis methods. This research will be useful for a quantitative analysis of the underlying mechanisms of information flow through social media in the network environment.展开更多
Fractal and self similarity of complex networks have attracted much attention in recent years. The fractal dimension is a useful method to describe the fractal property of networks. However, the fractal features of mo...Fractal and self similarity of complex networks have attracted much attention in recent years. The fractal dimension is a useful method to describe the fractal property of networks. However, the fractal features of mobile social networks (MSNs) are inadequately investigated. In this work, a box-covering method based on the ratio of excluded mass to closeness centrality is presented to investigate the fractal feature of MSNs. Using this method, we find that some MSNs are fractal at different time intervals. Our simulation results indicate that the proposed method is available for analyzing the fractal property of MSNs.展开更多
Using social network analysis method,this paper made an empirical study on growth of evil forces in land requisition and relocation in City G of Hubei Province. It obtained following results:(i) lawless developers and...Using social network analysis method,this paper made an empirical study on growth of evil forces in land requisition and relocation in City G of Hubei Province. It obtained following results:(i) lawless developers and inefficient public security organs form interested parties of evil forces. Besides,the inward closeness centrality of evil forces is high,manifesting that evil forces independently possess decentralized power of network and have unscrupulous behavior in land requisition and relocation to a certain extent.(ii) Activities of evil forces have complicated spatial correlation and their geographical distribution is uneven,taking on irregular characteristics. In the field of land requisition and relocation,some evil forces are expandi Xng and spreading,while other forces are relatively weak. In conclusion,growth of evil forces comes from premeditation and collaboration of lawless developers,lack of functions and weak attack of public security organs; growth of evil forces has periodic changes,when in power,they will take opportunity to expand,while losing power,they will hide or even disappear.展开更多
In this paper we deal with Twitter and the presence of the keyword “Macedonia” in tweets over a period of time. We searched for the same term in three different languages, i.e. “Μακεδονíα”, “Macedoni...In this paper we deal with Twitter and the presence of the keyword “Macedonia” in tweets over a period of time. We searched for the same term in three different languages, i.e. “Μακεδονíα”, “Macedonia” and “Македонска - Македониjа”, since we are primarily interested in views from Greece and FYROM without excluding views from other regions. We use methods from Social Network Analysis (SNA) in order to create networks of users, calculate some main network metrics, measure user importance and investigate the presence of possible fragmentations—communities among them. We furthermore proceed to a form of content analysis, using pairs of words within tweets, in order to obtain main ideas, trends and public views that circulated over the network.展开更多
Using Kripke semantics, we have identified and reduced an epistemic incompleteness in the metaphor commonly employed in Social Networks Analysis (SNA), which basically compares information flows with current flows in ...Using Kripke semantics, we have identified and reduced an epistemic incompleteness in the metaphor commonly employed in Social Networks Analysis (SNA), which basically compares information flows with current flows in advanced centrality measures. Our theoretical approach defines a new paradigm for the semantic and dynamic analysis of social networks including shared content. Based on our theoretical findings, we define a semantic and predictive model of dynamic SNA for Enterprises Social Networks (ESN), and experiment it on a real dataset.展开更多
Aim of this research is to reveal social structures, typologies and determinants of verbal aggressiveness and bullying. Five students’ networks from various Higher Education departments in Thessaly, Greece (Physical ...Aim of this research is to reveal social structures, typologies and determinants of verbal aggressiveness and bullying. Five students’ networks from various Higher Education departments in Thessaly, Greece (Physical Education, Veterinary, Business Administration) (total nodes N = 245) have been examined by Social Network Analysis and conventional statistics in 2017. Main results: Rudeness relations are denser at the Physical Education department due to the intensity and pressure of corporal exercise. Social exclusion seems to be much more common practice. Hurting necessitates particularly intensive conditions while deriding, rudeness and threatening are compatible with any action of bullying. The offenders tend to practice simultaneously bullying and verbal aggressiveness but often against different targets. Various levels of victimization are diagnosed through selectiveness in strategies of offense. Obesity often constitutes a reason of depreciation. Education values stimulate respectfulness rather than aggressive jealousness. Ambitiousness, travelling experience, social selectiveness based on criteria of intellectual, encyclopedic qualifications or politeness also prevent verbal aggressiveness. Female students seem to be more invulnerable. Bullying seems to be reciprocal and diachronic. Verbal aggressiveness seems to conceal a presumption of corporal aggressiveness. Especially, ambitiousness in the scientific arena or the high education level of father seems to encourage practicing verbal aggressiveness.展开更多
Aim of this paper is to detect determinants and to suggest a typology bullying. Four network samples of 218 students in total (male = 92, female = 126) at the Physical Education and Sport Sciences Dept. and the Veteri...Aim of this paper is to detect determinants and to suggest a typology bullying. Four network samples of 218 students in total (male = 92, female = 126) at the Physical Education and Sport Sciences Dept. and the Veterinary Dept. of the University of Thessaly have been collected in 2017. Standardized questionnaire composed of network and non-network part was answered. Social network analysis and cross-sectional statistics (Spearman test and Principal Component Analysis) were implemented. Basic results: Female gender and traveling abroad for sport, the desire of distinction in science and the social selectiveness tend to protect against bullying. High semester, tallness, high educational influence of family and cyber-bullying increase the susceptibility to victimization. These who have experienced bullying as children still tend to experience exclusion. Libeling may even be a reason for not attending lectures. High grade seems not only to protect but also to discourage someone from practicing bullying. Science ambitions seem to be related with elitist ideology, unlike professional ambitions which seem to be related with humanism or sociability. Social selectiveness based on politeness and friendliness also retains the practicing of bullying. Five types of bullying targets have been depicted: “full victim”, “apprenticed”, “libeled scapegoat”, “ridiculed scapegoat” and “gladiator”. Three types of practicing bullying are formulated: “stimulating victimizer”, “provocateur” and “egoist inspirator”.展开更多
As the exertion development (PUAP) develop in Rejang Lebong Regency in Bengkulu province which had been started since 2008 by giving a kind of fund aid called Bantuan Langsung Masyarakat (BLM PUAP), to Gapoktan (Gabun...As the exertion development (PUAP) develop in Rejang Lebong Regency in Bengkulu province which had been started since 2008 by giving a kind of fund aid called Bantuan Langsung Masyarakat (BLM PUAP), to Gapoktan (Gabungan Kelompok Tani) or an organization of farmers such by giving some money as the capital used for 1) food plant cultiva-tion, horticulture, animal husbandry, plantation, and2) non-cultivation exertion such as;home industry of agriculture, small marketing scale and another agriculture exertion. By the approach which had been done is hoped to get the important result, on the other way the role of analysis factor (Social Network Analysis) from all undertaking stakeholders programs PUAP to be relevance steps aimed to understand the relation or connectivity from all factors in the network and also the role of factor inside the network itself be the relevance steps in arranging the strategy and work intention from the realization stage of PUAP program for the continuity of the realization program in the future (finding the good strategy) which aimed to develop the program of PUAP in Rejang Lebong Regency in Bengkulu Province, and to be a reference from doing the program as a national program in Indonesia.展开更多
文摘The inter-city linkage heat data provided by Baidu Migration is employed as a characterization of inter-city linkages in order to facilitate the study of the network linkage characteristics and hierarchical structure of urban agglomeration in the Greater Bay Area through the use of social network analysis method.This is the inaugural application of big data based on location services in the study of urban agglomeration network structure,which represents a novel research perspective on this topic.The study reveals that the density of network linkages in the Greater Bay Area urban agglomeration has reached 100%,indicating a mature network-like spatial structure.This structure has given rise to three distinct communities:Shenzhen-Dongguan-Huizhou,Guangzhou-Foshan-Zhaoqing,and Zhuhai-Zhongshan-Jiangmen.Additionally,cities within the Greater Bay Area urban agglomeration play different roles,suggesting that varying development strategies may be necessary to achieve staggered development.The study demonstrates that large datasets represented by LBS can offer novel insights and methodologies for the examination of urban agglomeration network structures,contingent on the appropriate mining and processing of the data.
文摘The public is increasingly using social media platforms such as Twitter and Facebook to express their views on a variety of topics.As a result,social media has emerged as the most effective and largest open source for obtaining public opinion.Single node computational methods are inefficient for sentiment analysis on such large datasets.Supercomputers or parallel or distributed proces-sing are two options for dealing with such large amounts of data.Most parallel programming frameworks,such as MPI(Message Processing Interface),are dif-ficult to use and scale in environments where supercomputers are expensive.Using the Apache Spark Parallel Model,this proposed work presents a scalable system for sentiment analysis on Twitter.A Spark-based Naive Bayes training technique is suggested for this purpose;unlike prior research,this algorithm does not need any disk access.Millions of tweets have been classified using the trained model.Experiments with various-sized clusters reveal that the suggested strategy is extremely scalable and cost-effective for larger data sets.It is nearly 12 times quicker than the Map Reduce-based model and nearly 21 times faster than the Naive Bayes Classifier in Apache Mahout.To evaluate the framework’s scalabil-ity,we gathered a large training corpus from Twitter.The accuracy of the classi-fier trained with this new dataset was more than 80%.
基金jointly supported by the National Social Science Foundation in China(Grand No.10ATQ004)Ministry of Education,Humanities and Social Sciences Council in China(Grand No.09YJA870014)
文摘Social network analysis(SNA) has been introduced to China's Mainland since the end of last century. It is often stated that SNA research has experienced rapid growth in China over these years, but few studies have been conducted to prove the statement. This paper aims at exploring the research status and development of SNA in China by a critical assessment of journal articles. Our findings show that SNA is an evolving and diversified research area which has rich themes and topics, and can be applied to those studies on different levels, context and disciplines, and attract researchers and scholars from various fields and domains. In addition, the information community(Library & Information Science and Information Systems) plays a leading role in the SNA related researches. The paper also points out the research on SNA in China has some limitations, so it proposes several implications for the future development of SNA research from perspectives of information science.
文摘At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper proposes a feature fusion network model Bert-TextLevelGCN based on BERT pre-training and improved TextGCN. On the one hand, Bert is introduced to obtain the initial vector input of graph neural network containing rich semantic features. On the other hand, the global graph connection window of traditional TextGCN is reduced to the text level, and the message propagation mechanism of global sharing is applied. Finally, the output vector of BERT and TextLevelGCN is fused by interpolation update method, and a more robust mapping of positive and negative sentiment classification of public opinion text of “Tangshan Barbecue Restaurant beating people” is obtained. In the context of the national anti-gang campaign, it is of great significance to accurately and efficiently analyze the emotional characteristics of public opinion in sudden social violence events with bad social impact, which is of great significance to improve the government’s public opinion warning and response ability to public opinion in sudden social security events. .
基金sponsored by the National Natural Science Foundation of China under grant number No.61100008,61201084the China Postdoctoral Science Foundation under Grant No.2013M541346+3 种基金Heilongiiang Postdoctoral Special Fund(Postdoctoral Youth Talent Program)under Grant No.LBH-TZ0504Heilongjiang Postdoctoral Fund under Grant No.LBH-Z13058the Natural Science Foundation of Heilongjiang Province of China under Grant No.QC2015076The Fundamental Research Funds for the Central Universities of China under grant number HEUCF100602
文摘The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition.
文摘Objective:To explore and visualize the connectivity of suspected Ebola cases and surveillance callers who used cellphone technology in Moyamba District in Sierra Leone for Ebola surveillance,and to examine the demographic differences and characteristics of Ebola surveillance callers who make more calls as well as those callers who are more likely to make at least one positive Ebola call.Methods:Surveillance data for 393 suspected Ebola cases(192 males,201 females) were collected from October 23,2014 to June 28,2015 using cellphone technology.UCINET and Net Draw software were used to explore and visualize the social connectivity between callers and suspected Ebola cases.Poisson and logistic regression analyses were used to do multivariable analysis.Results:The entire social network was comprised of 393 ties and 745 nodes.Women(AOR=0.33,95% CI [0.14,0.81]) were associated with decreased odds of making at least one positive Ebola surveillance call compared to men.Women(IR= 0.63,95% CI [0.49,0.82]) were also associated with making fewer Ebola surveillance calls compared to men.Conclusion:Social network visualization can analyze syndromic surveillance data for Ebola collected by cellphone technology with unique insights.
文摘This paper presents our vision of large-scale, dynamic social network analysis in real environments, which we expect to be enabled by the introduction of large-scale heterogeneous sensors in the ambient environment. We address challenges in realizing large-scale dynamic social network analysis in real environments, and discuss several promising applications. Moreover, we present our design and implementation of a prototype system for quasi-realtime social network construction. We finally present preliminary experimental results of dynamic social network analysis for six-person social gatherings in a real environment, and discuss the feasibility of dynamic social network analysis and its effectiveness.
文摘The advent of the age of Information shifts the environment we live in from off-line to on-line. The prospect of Collective Intelligence (CI) is promising. Based on this background, the aim of this paper is to discover the emergence mechanism and influence factors of CI in knowledge communities using the method of quantitative and qualitative analysis. On the basis of the previous research work, our model theorizes that the two dimensions of social network (i.e., interactive network structure and participant’s characteristics) affect two references of effectiveness (i.e. group knowledge production and participation of group decision). And this hypothetical model is validated with simulation data from “Zhihu” community. Our model has been useful since it offers some inspirations and directions to promote the level of CI in knowledge communities.
文摘This paper provides a comprehensive overview of evolution and innovation in social network analysis to the paradigm of social networking. It explains how the development of sociological theory and the structural properties of social groups matter to computer science and communications. Authors such as Moreno, John Barnes and Harrison C. White provide evidence of a growing body of literature addressing the networking of people, organizations and communities to explain the structure of society. This perspective has passed from sociology to other fields, changing understandings of social phenomena. Social networks remain a potent concept for analyzing computer science and communications. This paper shows how and why this has occurred and examines substantive areas in which social network analysis has been applied—mainly how the advantages of graphic visualization and computer software packages have influenced SNA in different audiences and publics leading to the unfolding of social networking to different audiences and publics.
文摘In a social network analysis the output provided includes many measures and metrics. For each of these measures and metric, the output provides the ability to obtain a rank ordering of the nodes in terms of these measures. We might use this information in decision making concerning disrupting or deceiving a given network. All is fine when all the measures indicate the same node as the key or influential node. What happens when the measures indicate different key nodes? Our goal in this paper is to explore two methodologies to identify the key players or nodes in a given network. We apply TOPSIS to analyze these outputs to find the most influential nodes as a function of the decision makers' inputs as a process to consider both subjective and objectives inputs through pairwise comparison matrices. We illustrate our results using two common networks from the literature: the Kite network and the Information flow network from Knoke and Wood. We discuss some basic sensitivity analysis can may be applied to the methods. We find the use of TOPSIS as a flexible method to weight the criterion based upon the decision makers' inputs or the topology of the network.
文摘Because of everyone's involvement in social networks, social networks are full of massive multimedia data, and events are got released and disseminated through social networks in the form of multi-modal and multi-attribute heterogeneous data. There have been numerous researches on social network search. Considering the spatio-temporal feature of messages and social relationships among users, we summarized an overall social network search framework from the perspective of semantics based on existing researches. For social network search, the acquisition and representation of spatio-temporal data is the basis, the semantic analysis and modeling of social network cross-media big data is an important component, deep semantic learning of social networks is the key research field, and the indexing and ranking mechanism is the indispensable part. This paper reviews the current studies in these fields, and then main challenges of social network search are given. Finally, we give an outlook to the prospect and further work of social network search.
基金We thank the anonymous reviewers and editors for their very constructive comments.the National Social Science Foundation Project of China under Grant 16BTQ085.
文摘The issue of privacy protection for mobile social networks is a frontier topic in the field of social network applications.The existing researches on user privacy protection in mobile social network mainly focus on privacy preserving data publishing and access control.There is little research on the association of user privacy information,so it is not easy to design personalized privacy protection strategy,but also increase the complexity of user privacy settings.Therefore,this paper concentrates on the association of user privacy information taking big data analysis tools,so as to provide data support for personalized privacy protection strategy design.
基金supported by Sun Yat-sen University Cultivation Fund for Young Teachers(Grant No.:20000-3161102)the National Social Science Fundation of China(Grant No.:08CTQ015)
文摘Purpose: This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach: Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings: Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect. Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks. Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism. Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations: The sample size needs to be increased so that samples are more representative. Errors may exist during the data collection. Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications: This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social media. In addition,it provides insight into the characteristics of information diffusion in weblogs and microblogs and the possible reasons of these differences.Originality/value: We have analyzed the characteristics of information diffusion in weblogs and microblogs by using the social network analysis methods. This research will be useful for a quantitative analysis of the underlying mechanisms of information flow through social media in the network environment.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61501217,61363015,61501218 and 61262020the Natural Science Foundation of Jiangxi Province under Grant No 20142BAB206026
文摘Fractal and self similarity of complex networks have attracted much attention in recent years. The fractal dimension is a useful method to describe the fractal property of networks. However, the fractal features of mobile social networks (MSNs) are inadequately investigated. In this work, a box-covering method based on the ratio of excluded mass to closeness centrality is presented to investigate the fractal feature of MSNs. Using this method, we find that some MSNs are fractal at different time intervals. Our simulation results indicate that the proposed method is available for analyzing the fractal property of MSNs.
基金Supported by National Social Science Foundation of China"Empirical Study of Corruption Governance in Real Estate"(14BGL106)
文摘Using social network analysis method,this paper made an empirical study on growth of evil forces in land requisition and relocation in City G of Hubei Province. It obtained following results:(i) lawless developers and inefficient public security organs form interested parties of evil forces. Besides,the inward closeness centrality of evil forces is high,manifesting that evil forces independently possess decentralized power of network and have unscrupulous behavior in land requisition and relocation to a certain extent.(ii) Activities of evil forces have complicated spatial correlation and their geographical distribution is uneven,taking on irregular characteristics. In the field of land requisition and relocation,some evil forces are expandi Xng and spreading,while other forces are relatively weak. In conclusion,growth of evil forces comes from premeditation and collaboration of lawless developers,lack of functions and weak attack of public security organs; growth of evil forces has periodic changes,when in power,they will take opportunity to expand,while losing power,they will hide or even disappear.
文摘In this paper we deal with Twitter and the presence of the keyword “Macedonia” in tweets over a period of time. We searched for the same term in three different languages, i.e. “Μακεδονíα”, “Macedonia” and “Македонска - Македониjа”, since we are primarily interested in views from Greece and FYROM without excluding views from other regions. We use methods from Social Network Analysis (SNA) in order to create networks of users, calculate some main network metrics, measure user importance and investigate the presence of possible fragmentations—communities among them. We furthermore proceed to a form of content analysis, using pairs of words within tweets, in order to obtain main ideas, trends and public views that circulated over the network.
文摘Using Kripke semantics, we have identified and reduced an epistemic incompleteness in the metaphor commonly employed in Social Networks Analysis (SNA), which basically compares information flows with current flows in advanced centrality measures. Our theoretical approach defines a new paradigm for the semantic and dynamic analysis of social networks including shared content. Based on our theoretical findings, we define a semantic and predictive model of dynamic SNA for Enterprises Social Networks (ESN), and experiment it on a real dataset.
文摘Aim of this research is to reveal social structures, typologies and determinants of verbal aggressiveness and bullying. Five students’ networks from various Higher Education departments in Thessaly, Greece (Physical Education, Veterinary, Business Administration) (total nodes N = 245) have been examined by Social Network Analysis and conventional statistics in 2017. Main results: Rudeness relations are denser at the Physical Education department due to the intensity and pressure of corporal exercise. Social exclusion seems to be much more common practice. Hurting necessitates particularly intensive conditions while deriding, rudeness and threatening are compatible with any action of bullying. The offenders tend to practice simultaneously bullying and verbal aggressiveness but often against different targets. Various levels of victimization are diagnosed through selectiveness in strategies of offense. Obesity often constitutes a reason of depreciation. Education values stimulate respectfulness rather than aggressive jealousness. Ambitiousness, travelling experience, social selectiveness based on criteria of intellectual, encyclopedic qualifications or politeness also prevent verbal aggressiveness. Female students seem to be more invulnerable. Bullying seems to be reciprocal and diachronic. Verbal aggressiveness seems to conceal a presumption of corporal aggressiveness. Especially, ambitiousness in the scientific arena or the high education level of father seems to encourage practicing verbal aggressiveness.
文摘Aim of this paper is to detect determinants and to suggest a typology bullying. Four network samples of 218 students in total (male = 92, female = 126) at the Physical Education and Sport Sciences Dept. and the Veterinary Dept. of the University of Thessaly have been collected in 2017. Standardized questionnaire composed of network and non-network part was answered. Social network analysis and cross-sectional statistics (Spearman test and Principal Component Analysis) were implemented. Basic results: Female gender and traveling abroad for sport, the desire of distinction in science and the social selectiveness tend to protect against bullying. High semester, tallness, high educational influence of family and cyber-bullying increase the susceptibility to victimization. These who have experienced bullying as children still tend to experience exclusion. Libeling may even be a reason for not attending lectures. High grade seems not only to protect but also to discourage someone from practicing bullying. Science ambitions seem to be related with elitist ideology, unlike professional ambitions which seem to be related with humanism or sociability. Social selectiveness based on politeness and friendliness also retains the practicing of bullying. Five types of bullying targets have been depicted: “full victim”, “apprenticed”, “libeled scapegoat”, “ridiculed scapegoat” and “gladiator”. Three types of practicing bullying are formulated: “stimulating victimizer”, “provocateur” and “egoist inspirator”.
文摘As the exertion development (PUAP) develop in Rejang Lebong Regency in Bengkulu province which had been started since 2008 by giving a kind of fund aid called Bantuan Langsung Masyarakat (BLM PUAP), to Gapoktan (Gabungan Kelompok Tani) or an organization of farmers such by giving some money as the capital used for 1) food plant cultiva-tion, horticulture, animal husbandry, plantation, and2) non-cultivation exertion such as;home industry of agriculture, small marketing scale and another agriculture exertion. By the approach which had been done is hoped to get the important result, on the other way the role of analysis factor (Social Network Analysis) from all undertaking stakeholders programs PUAP to be relevance steps aimed to understand the relation or connectivity from all factors in the network and also the role of factor inside the network itself be the relevance steps in arranging the strategy and work intention from the realization stage of PUAP program for the continuity of the realization program in the future (finding the good strategy) which aimed to develop the program of PUAP in Rejang Lebong Regency in Bengkulu Province, and to be a reference from doing the program as a national program in Indonesia.