As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain ...As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis.展开更多
The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related in...The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition.展开更多
User-analysis techniques are mainly used to recommend friends and information. This paper discusses the data characteristics of microblog users and describes a multidimensional user rec- ommendation algorithm that tak...User-analysis techniques are mainly used to recommend friends and information. This paper discusses the data characteristics of microblog users and describes a multidimensional user rec- ommendation algorithm that takes into account microblog length, relativity between microblog and users, and familiarity between users. The experimental results show that this multidi- mensional algorithm is more accurate than a traditional recom- mendation algorithm.展开更多
Information networks where users join a network, publish their own content, and create links to other users are called Online Social Networks (OSNs). Nowadays, OSNs have become one of the major platforms to promote bo...Information networks where users join a network, publish their own content, and create links to other users are called Online Social Networks (OSNs). Nowadays, OSNs have become one of the major platforms to promote both new and viral applications as well as disseminate information. Social network analysis is the study of these information networks that leads to uncovering patterns of interaction among the entities. In this regard, finding influential users in OSNs is very important as they play a key role in the success above phenomena. Various approaches exist to detect influential users in OSNs, starting from simply counting the immediate neighbors to more complex machine-learning and message-passing techniques. In this paper, we review the recent existing research works that focused on identifying influential users in OSNs.展开更多
Purpose: Taking Zhihu as the object for a case study, we intend to analyze the key factors that have affected users on adopting answers in social Q&A(SQA) websites.Design/methodology/approach: With information ado...Purpose: Taking Zhihu as the object for a case study, we intend to analyze the key factors that have affected users on adopting answers in social Q&A(SQA) websites.Design/methodology/approach: With information adoption model(IAM) as the theoretical foundation and widely accepted evaluation criteria for answer quality in SQA sites as variables, we constructed a factor model that has influenced SQA community users to adopt offered answers. With the partial least squares(PLS) technique, our model was then empirically tested through a sample of 311 Zhihu users.Findings: Our results showed that answer usefulness is the most effective variable, and answer interactivity and answer entertainment both have positive and significant impacts on users’ attitude to adopt answers in an SQA community. Except for novelty, other three components of answer quality, i.e. knowledge, reliability, and solution to the problem have all significant effect on answer usefulness.Research limitations: First, due to the limited sample size, it is still questionable if our research results based on Zhihu could be applied to other SQA communities. Second, our questionnaires were mainly designed to investigate how users felt about the answers in an SQA site, but did not differentiate the content of the answer itself.Practical implications: As a three-year-old SQA platform, Zhihu has developed very quickly with its high-quality answers and public intellectual users, and has been regarded as one of the representatives of fast emerging Chinese SQA communities in recent years. Our studycould help shed light on users’ information sharing and knowledge adoption behaviors in a Chinese SQA site, such as Zhihu. Originality/value: Compared with previous studies on answer quality assessments in SQA sites and on information adoption model, to the best of our knowledge, this is one of the pioneer studies which combined answer qualities with users’ intention of adopting SQA answers. Our study on user answer adoption in Zhihu community could further develop the theory of IAM. This study showed that answer usefulness is the most important motivation of Zhihu users in the process of adopting answers.展开更多
Purpose: In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence. This research aims to investigate the factors which inf...Purpose: In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence. This research aims to investigate the factors which influence knowledge contribution behavior of social networking sites(SNS) users.Design/methodology/approach: The data were obtained from an online survey of 251 social networking sites users. Structural equation modeling analysis was used to validate the proposed model.Findings: Our survey shows that the individuals' motivation for knowledge contribution,their capability of contributing knowledge,interpersonal trust and their own habits positively influence their knowledge contribution behavior,but reward does not significantly influence knowledge contribution in the online virtual community.Research limitations: Respondents of our online survey are mainly undergraduate and graduate students. A limited sample group cannot represent all of the population. A larger survey involving more SNS users may be useful.Practical implications: The results have provided some theoretical basis for promoting knowledge contribution and user viscosity.Originality/value: Few studies have investigated the impact of social influence and user habits on knowledge contribution behavior of SNS users. This study can make a theoretical contribution by examining how the social influence processes and habits affect one's knowledge contribution behavior using online communities.展开更多
This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and...This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and followed phenomenon of microblog users. Informed by the microblog user behavior analysis, the paper also addresses a model for calculating weights of users’ influence. It proposes a U-R model, using which we can evaluate users’ influence based on PageRank algorithms and analyzes user behaviors. In the U-R model, the effect of user behaviors is explored and PageRank is applied to evaluate the importance and the influence of every user in a microblog network by repeatedly iterating their own U-R value. The users’ influences in a microblog network can be ranked by the U-R value. Finally, the validity of U-R model is proved with a real-life numerical example.展开更多
Among mobile users, ad-hoc social network (ASN) is becoming a popular platform to connect and share their interests anytime anywhere. Many researchers and computer scientists investigated ASN architecture, implementat...Among mobile users, ad-hoc social network (ASN) is becoming a popular platform to connect and share their interests anytime anywhere. Many researchers and computer scientists investigated ASN architecture, implementation, user experience, and different profile matching algorithms to provide better user experience in ad-hoc social network. We emphasize that strength of an ad-hoc social network depends on a good profile-matching algorithm that provides meaningful friend suggestions in proximity. Keeping browsing history is a good way to determine user’s interest, however, interests change with location. This paper presents a novel profile-matching algorithm for automatically building a user profile based on dynamic GPS (Global Positing System) location and browsing history of users. Building user profile based on GPS location of a user provides benefits to ASN users as this profile represents user’s dynamic interests that keep changing with location e.g. office, home, or some other location. Proposed profile-matching algorithm maintains multiple local profiles based on location of mobile device.展开更多
Designing technologies is a process that relies on multiple interactions between design and use contexts. These interactions are essential to the development and establishment of technologies. This article seeks to un...Designing technologies is a process that relies on multiple interactions between design and use contexts. These interactions are essential to the development and establishment of technologies. This article seeks to understand the attempts of healthcare organisations to integrate use contexts into the design of healthcare technologies following insights of the theoretical approaches of social learning and user representations. We present a multiple case study of three healthcare technologies involved in improving elderly care practice. These cases were part of a Dutch quality improvement collaborative program, which urged that development of these technologies was not “just” development, but should occur in close collaboration with other parts of the collaborative program, which were more focused on implementation. These cases illustrate different ways to develop technologies in interaction with use contexts and users. Despite the infrastructure of the collaborative program, interactions were not without problems. We conclude by arguing that interactions between design and use are not naturally occurring phenomena, but must be actively organised in order to create effects.展开更多
In Web 2.0 era,the content on a web page is increasingly generated by end users,rather than limited number of administrators.Hence,large number of User Generated Content(UGC) has driven the explosion of content in the...In Web 2.0 era,the content on a web page is increasingly generated by end users,rather than limited number of administrators.Hence,large number of User Generated Content(UGC) has driven the explosion of content in the web.Thanks to UGC,the pattern of web usage has evolved from download dominated way to a hybrid one with both information download and upload.Large number of UGC has unveiled great capacity of information that is unavailable for researchers before,such as individual preferences,social connections,and etc.In this paper,we propose a novel model which studies the UGC in micro-blogging web sites,the largest and fastest information diffusion media online,and evaluate the social influence for an arbitrary individual.Experimental results show that our model outperforms state-of-the-art techniques in social influence evaluation in both the running time and accuracy.展开更多
The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third partie...The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third parties. While numerous causes of poor behaviour have been suggested by re- search the role of the User Interface (UI) and the system itself is underexplored. The field of Per- suasive Technology would suggest that Social Network Systems persuade users to deviate from their normal or habitual behaviour. This paper makes the case that the UI can be used as the basis for user empowerment by informing them of their privacy at the point of interaction and remind- ing them of their privacy needs. The Theory of Planned Behaviour is introduced as a potential theoretical foundation for exploring the psychology behind privacy behaviour as it describes the salient factors that influence intention and action. Based on these factors of personal attitude, subjective norms and perceived control, a series of UIs are presented and implemented in con- trolled experiments examining their effect on personal information disclosure. This is combined with observations and interviews with the participants. Results from this initial, pilot experiment suggest groups with privacy salient information embedded exhibit less disclosure than the control group. This work reviews this approach as a method for exploring privacy behaviour and propos- es further work required.展开更多
The Internet of Things (IoT) assumes that things interact and exchange information thus defining the future of pervasive computing environments. The integration between people and interconnected objects realizes a new...The Internet of Things (IoT) assumes that things interact and exchange information thus defining the future of pervasive computing environments. The integration between people and interconnected objects realizes a new physical and social space and opens new frontiers in context awareness and objects adaptation. In this paper we investigate the possibility of creating socially aware objects able to interact not only among themselves but also with human beings sharing the same environment. The main contribution of this work is to provide a knowledge model for social context-awareness and reasoning using an ontology-based context modeling, a user model and exploiting of social networks. This model is part of a larger framework called So Smart that aims at empowering networks of interconnected objects with social context awareness in order to improve their social interaction with people.展开更多
Recent interest by physicists in social networks and disease transmission factors has prompted debate over the topology of degree distributions in sexual networks. Social network researchers have been critical of “sc...Recent interest by physicists in social networks and disease transmission factors has prompted debate over the topology of degree distributions in sexual networks. Social network researchers have been critical of “scale-free” Barabasi-Albert approaches, and largely rejected the preferential attachment, “rich-get-richer” assumptions that underlie that model. Instead, research on sexual networks has pointed to the importance of homophily and local sexual norms in dictating degree distributions, and thus disease transmission thresholds. Injecting Drug User (IDU) network topologies may differ from the emerging models of sexual networks, however. Degree distribution analysis of a Brooklyn, NY, IDU network indicates a different topology than the spanning tree configurations discussed for sexual networks, instead featuring comparatively short cycles and high concurrency. Our findings suggest that IDU networks do in some ways conform to a “scale-free” topology, and thus may represent “reservoirs” of potential infection despite seemingly low transmission thresholds.展开更多
文摘As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis.
基金sponsored by the National Natural Science Foundation of China under grant number No.61100008,61201084the China Postdoctoral Science Foundation under Grant No.2013M541346+3 种基金Heilongiiang Postdoctoral Special Fund(Postdoctoral Youth Talent Program)under Grant No.LBH-TZ0504Heilongjiang Postdoctoral Fund under Grant No.LBH-Z13058the Natural Science Foundation of Heilongjiang Province of China under Grant No.QC2015076The Fundamental Research Funds for the Central Universities of China under grant number HEUCF100602
文摘The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition.
文摘User-analysis techniques are mainly used to recommend friends and information. This paper discusses the data characteristics of microblog users and describes a multidimensional user rec- ommendation algorithm that takes into account microblog length, relativity between microblog and users, and familiarity between users. The experimental results show that this multidi- mensional algorithm is more accurate than a traditional recom- mendation algorithm.
文摘Information networks where users join a network, publish their own content, and create links to other users are called Online Social Networks (OSNs). Nowadays, OSNs have become one of the major platforms to promote both new and viral applications as well as disseminate information. Social network analysis is the study of these information networks that leads to uncovering patterns of interaction among the entities. In this regard, finding influential users in OSNs is very important as they play a key role in the success above phenomena. Various approaches exist to detect influential users in OSNs, starting from simply counting the immediate neighbors to more complex machine-learning and message-passing techniques. In this paper, we review the recent existing research works that focused on identifying influential users in OSNs.
基金jointly supported by National Social Science Foundation of China(Grant No.14BTQ044)Wuhan University Academic Development Plan for Scholars after 1970s
文摘Purpose: Taking Zhihu as the object for a case study, we intend to analyze the key factors that have affected users on adopting answers in social Q&A(SQA) websites.Design/methodology/approach: With information adoption model(IAM) as the theoretical foundation and widely accepted evaluation criteria for answer quality in SQA sites as variables, we constructed a factor model that has influenced SQA community users to adopt offered answers. With the partial least squares(PLS) technique, our model was then empirically tested through a sample of 311 Zhihu users.Findings: Our results showed that answer usefulness is the most effective variable, and answer interactivity and answer entertainment both have positive and significant impacts on users’ attitude to adopt answers in an SQA community. Except for novelty, other three components of answer quality, i.e. knowledge, reliability, and solution to the problem have all significant effect on answer usefulness.Research limitations: First, due to the limited sample size, it is still questionable if our research results based on Zhihu could be applied to other SQA communities. Second, our questionnaires were mainly designed to investigate how users felt about the answers in an SQA site, but did not differentiate the content of the answer itself.Practical implications: As a three-year-old SQA platform, Zhihu has developed very quickly with its high-quality answers and public intellectual users, and has been regarded as one of the representatives of fast emerging Chinese SQA communities in recent years. Our studycould help shed light on users’ information sharing and knowledge adoption behaviors in a Chinese SQA site, such as Zhihu. Originality/value: Compared with previous studies on answer quality assessments in SQA sites and on information adoption model, to the best of our knowledge, this is one of the pioneer studies which combined answer qualities with users’ intention of adopting SQA answers. Our study on user answer adoption in Zhihu community could further develop the theory of IAM. This study showed that answer usefulness is the most important motivation of Zhihu users in the process of adopting answers.
基金supported by the National Social Science Foundation of China(Grant Nos.:10CTQ010 and 11CTQ038)Wuhan University Development Program for Researchers Born after the 1970s
文摘Purpose: In the Web 2.0 era,leveraging the collective power of user knowledge contributions has become an important part of the study of collective intelligence. This research aims to investigate the factors which influence knowledge contribution behavior of social networking sites(SNS) users.Design/methodology/approach: The data were obtained from an online survey of 251 social networking sites users. Structural equation modeling analysis was used to validate the proposed model.Findings: Our survey shows that the individuals' motivation for knowledge contribution,their capability of contributing knowledge,interpersonal trust and their own habits positively influence their knowledge contribution behavior,but reward does not significantly influence knowledge contribution in the online virtual community.Research limitations: Respondents of our online survey are mainly undergraduate and graduate students. A limited sample group cannot represent all of the population. A larger survey involving more SNS users may be useful.Practical implications: The results have provided some theoretical basis for promoting knowledge contribution and user viscosity.Originality/value: Few studies have investigated the impact of social influence and user habits on knowledge contribution behavior of SNS users. This study can make a theoretical contribution by examining how the social influence processes and habits affect one's knowledge contribution behavior using online communities.
文摘This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and followed phenomenon of microblog users. Informed by the microblog user behavior analysis, the paper also addresses a model for calculating weights of users’ influence. It proposes a U-R model, using which we can evaluate users’ influence based on PageRank algorithms and analyzes user behaviors. In the U-R model, the effect of user behaviors is explored and PageRank is applied to evaluate the importance and the influence of every user in a microblog network by repeatedly iterating their own U-R value. The users’ influences in a microblog network can be ranked by the U-R value. Finally, the validity of U-R model is proved with a real-life numerical example.
文摘Among mobile users, ad-hoc social network (ASN) is becoming a popular platform to connect and share their interests anytime anywhere. Many researchers and computer scientists investigated ASN architecture, implementation, user experience, and different profile matching algorithms to provide better user experience in ad-hoc social network. We emphasize that strength of an ad-hoc social network depends on a good profile-matching algorithm that provides meaningful friend suggestions in proximity. Keeping browsing history is a good way to determine user’s interest, however, interests change with location. This paper presents a novel profile-matching algorithm for automatically building a user profile based on dynamic GPS (Global Positing System) location and browsing history of users. Building user profile based on GPS location of a user provides benefits to ASN users as this profile represents user’s dynamic interests that keep changing with location e.g. office, home, or some other location. Proposed profile-matching algorithm maintains multiple local profiles based on location of mobile device.
文摘Designing technologies is a process that relies on multiple interactions between design and use contexts. These interactions are essential to the development and establishment of technologies. This article seeks to understand the attempts of healthcare organisations to integrate use contexts into the design of healthcare technologies following insights of the theoretical approaches of social learning and user representations. We present a multiple case study of three healthcare technologies involved in improving elderly care practice. These cases were part of a Dutch quality improvement collaborative program, which urged that development of these technologies was not “just” development, but should occur in close collaboration with other parts of the collaborative program, which were more focused on implementation. These cases illustrate different ways to develop technologies in interaction with use contexts and users. Despite the infrastructure of the collaborative program, interactions were not without problems. We conclude by arguing that interactions between design and use are not naturally occurring phenomena, but must be actively organised in order to create effects.
基金ACKNOWLEDGEMENT This work was partially supported by the National Natural Science Foundation of China under Grants No. 61202179, No. 61173089 SRF for ROCS, SEM and the Fundamental Research Funds for the Central Universities.
文摘In Web 2.0 era,the content on a web page is increasingly generated by end users,rather than limited number of administrators.Hence,large number of User Generated Content(UGC) has driven the explosion of content in the web.Thanks to UGC,the pattern of web usage has evolved from download dominated way to a hybrid one with both information download and upload.Large number of UGC has unveiled great capacity of information that is unavailable for researchers before,such as individual preferences,social connections,and etc.In this paper,we propose a novel model which studies the UGC in micro-blogging web sites,the largest and fastest information diffusion media online,and evaluate the social influence for an arbitrary individual.Experimental results show that our model outperforms state-of-the-art techniques in social influence evaluation in both the running time and accuracy.
文摘The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third parties. While numerous causes of poor behaviour have been suggested by re- search the role of the User Interface (UI) and the system itself is underexplored. The field of Per- suasive Technology would suggest that Social Network Systems persuade users to deviate from their normal or habitual behaviour. This paper makes the case that the UI can be used as the basis for user empowerment by informing them of their privacy at the point of interaction and remind- ing them of their privacy needs. The Theory of Planned Behaviour is introduced as a potential theoretical foundation for exploring the psychology behind privacy behaviour as it describes the salient factors that influence intention and action. Based on these factors of personal attitude, subjective norms and perceived control, a series of UIs are presented and implemented in con- trolled experiments examining their effect on personal information disclosure. This is combined with observations and interviews with the participants. Results from this initial, pilot experiment suggest groups with privacy salient information embedded exhibit less disclosure than the control group. This work reviews this approach as a method for exploring privacy behaviour and propos- es further work required.
文摘The Internet of Things (IoT) assumes that things interact and exchange information thus defining the future of pervasive computing environments. The integration between people and interconnected objects realizes a new physical and social space and opens new frontiers in context awareness and objects adaptation. In this paper we investigate the possibility of creating socially aware objects able to interact not only among themselves but also with human beings sharing the same environment. The main contribution of this work is to provide a knowledge model for social context-awareness and reasoning using an ontology-based context modeling, a user model and exploiting of social networks. This model is part of a larger framework called So Smart that aims at empowering networks of interconnected objects with social context awareness in order to improve their social interaction with people.
文摘Recent interest by physicists in social networks and disease transmission factors has prompted debate over the topology of degree distributions in sexual networks. Social network researchers have been critical of “scale-free” Barabasi-Albert approaches, and largely rejected the preferential attachment, “rich-get-richer” assumptions that underlie that model. Instead, research on sexual networks has pointed to the importance of homophily and local sexual norms in dictating degree distributions, and thus disease transmission thresholds. Injecting Drug User (IDU) network topologies may differ from the emerging models of sexual networks, however. Degree distribution analysis of a Brooklyn, NY, IDU network indicates a different topology than the spanning tree configurations discussed for sexual networks, instead featuring comparatively short cycles and high concurrency. Our findings suggest that IDU networks do in some ways conform to a “scale-free” topology, and thus may represent “reservoirs” of potential infection despite seemingly low transmission thresholds.