首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The number of people and organizations using online social networks as a new way of communication is continually increasing. Messages that users write in networks and their interactions with other users leave a digital trace that is recorded. In order to understand what is going on in these virtual environments, it is necessary systems that collect, process, and analyze the information generated. The majority of existing tools analyze information related to an online event once it has finished or in a specific point of time (i.e., without considering an in-depth analysis of the evolution of users’ activity during the event). They focus on an analysis based on statistics about the quantity of information generated in an event. In this article, we present a multi-agent system that automates the process of gathering data from users’ activity in social networks and performs an in-depth analysis of the evolution of social behavior at different levels of granularity in online events based on network theory metrics. We evaluated its functionality analyzing users’ activity in events on Twitter.  相似文献   

2.
This study explores users’ continuance intention in online social networks by synthesizing Bhattacherjee’s IS continuance theory with flow theory, social capital theory, and the unified theory of acceptance and use of technology (UTAUT) to consider the special hedonic, social and utilitarian factors in the online social network environment. The integrated model was empirically tested with 320 online social network users in China. The results indicated that continuance intention was explained substantially by all hypothesized antecedents including perceived enjoyment, perceived usefulness, usage satisfaction, effort expectancy, social influence, tie strength, shared norms and trust. Based on the research findings, we offer discussions of both theoretical and practical implications.  相似文献   

3.
Many social network websites have been aggressively exploring innovative electronic word-of-mouth (eWOM) advertising strategies using information shared by users, such as posts and product reviews. For example, Facebook offers a service allowing marketers to utilize users’ posts to automatically generate advertisements. The effectiveness of this practice depends on the ability to accurately predict a post’s influence on its readers. For an advertising strategy of this nature, the influence of a post is determined jointly by the features of the post, such as contents and time of creation, and the features of the author of the post. We propose two models for predicting the influence of a post using both sources of influence, post- and author-related features, as predictors. An empirical evaluation shows that the proposed predictive features improve prediction accuracy, and the models are effective in predicting the influence score.  相似文献   

4.
The Internet is one of the most important sources of knowledge in the present time. It offers a huge volume of information which grows dramatically every day. Web search engines (e.g. Google, Yahoo…) are widely used to find specific data among that information. However, these useful tools also represent a privacy threat for the users: the web search engines profile them by storing and analyzing all the searches that they have previously submitted. To address this privacy threat, current solutions propose new mechanisms that introduce a high cost in terms of computation and communication. In this paper, we propose a new scheme designed to protect the privacy of the users from a web search engine that tries to profile them. Our system uses social networks to provide a distorted user profile to the web search engine. The proposed protocol submits standard queries to the web search engine; thus it does not require any change in the server side. In addition to that, this scheme does not require the server to collaborate with the users. Our protocol improves the existing solutions in terms of query delay. Besides, the distorted profiles still allow the users to get a proper service from the web search engines.  相似文献   

5.
Opportunistic networks, in which nodes opportunistically exploit any pair-wise contact to identify next hops towards the destination, are one of the most interesting technologies to support the pervasive networking vision. Opportunistic networks allow content sharing between mobile users without requiring any pre-existing Internet infrastructure, and tolerate partitions, long disconnections, and topology instability in general. In this paper we propose a context-aware framework for routing and forwarding in opportunistic networks. The framework is general, and able to host various flavors of context-aware routing. In this work we also present a particular protocol, HiBOp, which, by exploiting the framework, learns and represents through context information, the users’ behavior and their social relations, and uses this knowledge to drive the forwarding process. The comparison of HiBOp with reference to alternative solutions shows that a context-aware approach based on users’ social relations turns out to be a very efficient solution for forwarding in opportunistic networks. We show performance improvements over the reference solutions both in terms of resource utilization and in terms of user perceived QoS.  相似文献   

6.
As a media and communication platform, microblog becomes more popular around the world. Most users follow a large number of celebrities and public medias on microblog; however, these celebrities do not necessarily follow all their fans. Such one-way relationship abounds in ego network and is displayed by the forms of users’ followees and followers, which make it difficult to identify users’ real friends who are contained in merged lists of followees and followers. The aim of this paper is to propose a general algorithm for detecting users’ real friends in social media and dividing them into different social circles automatically according to the closeness of their relationships. Then we analyze these social circles and detect social attributes of these social circles. To verify the effectiveness of the proposed algorithm, we build a microblog application which displays algorithm results of social circles for users and enables users to adjust proposed results according to her/his real social circles. We demonstrate that our algorithm is superior to the traditional clustering method in terms of F value and mean average precision. Furthermore, our method of tagging social attributes of social circles gets high performance by NDCG (normalized discounted cumulative gain).  相似文献   

7.
The prediction of the imbibition into two-dimensional geometries is extremely important to develop new paper-based microfluidics design principles. In this regard, a two-dimensional model using Richard’s equation, which has been extensively applied in soil mechanics, is applied in this work to model the imbibition into paper-based networks. Compared to capillary-based models, the developed model is capable of predicting the imbibition into two-dimensional domains. The numerical solution of the proposed model shows a good agreement with the experimental measurements of water imbibition into different chromatography paper-based designs. It is expected that this framework can be applied to develop new design rules for controlling the flow in paper-based microfluidics devices.  相似文献   

8.
Wireless networks and mobile applications have grown very rapidly and have made a significant impact on computer systems. Especially, the usage of mobile phones and PDA is increased very rapidly. Added functions and values with these devices are thus greatly developed. If some regularity can be known from the user mobility behavior, then these functions and values can be further expanded and used intelligently. This paper thus attempts to discover personal mobility patterns for helping systems provide personalized service in a wireless network. The classification and the duration of each location area visited by a mobile user are used as important attributes in representing the results. A data mining algorithm has then been proposed, which is based on the AprioriAll algorithm, but different from it in several ways. Experiments are also made to show the effect of the proposed algorithm.  相似文献   

9.
Social commerce has emerged as a new platform that enables users to conduct shopping assisted by inputs from other members and to publicly comment on transactions or products. It therefore adds a social aspect to traditional online commerce environments. Nevertheless, the role of the social facet embedded in such transactions in influencing user behaviors is not fully understood. In this study, we rely on theories of risk deterrence in decision-making and the “risky/choice shift” logic to suggest that the social identification of users regarding their community members skews the way they consider risks in decision-making on these sites. Using data from 175 users of etsy.com, we show that perceived commerce risk reduces intentions to buy from the website and that perceived participation risk curtails intentions to post comments on social commerce forums. The findings further show that the influence of these risk assessments is reduced when the degree of social identification with the website community increases; these risk considerations become negligible in decision-making processes when ’social identification is one standard deviation above the mean. Hence, users’ social identification with the social commerce website community skews their rational decision-making.  相似文献   

10.
In order to understand the factors affecting users’ well-being perception derived from social networking sites usage, this study integrates the perspectives of social presence theory and social capital theory to develop a research model. Data were collected from 305 users of Facebook in Taiwan to test the model. The findings reveal that structural capital, relational capital, and cognitive capital exert significant influences on subjective well-being. The results also reveal that structural capital and cognitive capital have positive influence on relational capital, while structural capital influences cognitive capital significantly. The results, on the other hand, show that awareness and affective social presence are the antecedents of structural capital, whereas cognitive social presence and affective social presence influence cognitive capital significantly. Finally, affective social presence is associated with relational capital positively. Theoretical and practical implications are discussed.  相似文献   

11.
Online innovation contests (OIC) provide companies, via a dedicated community, an important means to access remote knowledge and ideas of users and thereby a creative playground for fueling innovation. Our literature review shows that our understanding of the impact of diverse types of feedback on user participation, especially continued participation, and success in OIC is at a nascent stage. The present study therefore seeks to examine why and how different types of feedback influence users’ behavior in OIC, and the detailed mechanisms underlying such influences. While our results do not show a significant relationship between receiving peer dynamic feedback and user success, we find that receiving sponsor static feedback in users’ first submission is positively associated with their continued participation in OIC. Also, when compared to peer dynamic feedback, sponsor static feedback has a stronger effect on users’ continued participation. Our goal is to confer a holistic picture of how the timing, source, and form of feedback shape user continuous participation and success in OIC.  相似文献   

12.
The aim of this research was to investigate age differences and similarities in the use of the social networking website MySpace, to explore potential differences in social capital among older people (users over 60 years of age) compared to teenagers (users between 13 and 19 years of age). We used locally developed web crawlers to collect data from MySpace’s user profile pages, and to quantify any differences that exist in the networks of friends of older people and teenagers. Content analysis was applied to investigate differences in social activities between the two age groups on MySpace, and the way they represent themselves on their profile pages. Our findings show a social capital divide: teenagers have larger networks of friends compared to older users of MySpace. On the other hand, we found that the majority of teenage users’ friends are in their own age range (age ± 2 years), whilst older people’s networks of friends tend to have a more diverse age distribution. In addition, our results show that teenagers tend to make more use of different media (e.g. video, music) within MySpace and use more self-references and negative emotions when describing themselves on their profile compared to older people.  相似文献   

13.
In this work human factor is explored by means of agent based simulation and analyzed in the framework of a reputation management system (RMS), within a peer-to-peer (P2P) network. Reputation is about evaluating an agent’s actions and other agents’ opinions about those actions, reporting on those actions and opinions, and reacting to that report, thus creating a feedback loop. This social mechanism has been successfully used to classify agents within normative systems. The systems rely on the feedbacks given by the members of the social network in which the RMS operates. Reputation can thus be seen as an endogenous and self produced indicator, created by the users for the users’ benefit. This implies that users’ participation and collaboration is a key factor for the effectiveness a RMS.  相似文献   

14.
This study investigated the association between trust in individuals, social institutions and online trust on the disclosure of personal identifiable information online. Using the Internet attributes approach that argues that some structural characteristics of the Internet such as lack of social cues and controllability are conducive to a disinhibitive behavior it was expected that face to face trust and online trust will not be associated. In addition, it was expected that from the three components of trust, online trust only will be associated with the disclosure of identifiable personal information online. A secondary analysis of the 2009 Pew and American Life of Internet users (n = 1698) survey was conducted. In contrast with the Internet attribute approach the effect of trust in individuals and institutions was indirectly associated with the disclosure of identifiable information online. Trust in individuals and institutions were found to be associated with online trust. However, online trust only, was found to be associated with the disclosure of personal identifiable information. While trust online encourages the disclosure of identifiable information, perception of privacy risks predicted refraining from posting identifiable information online. The results show a complex picture of the association of offline and online characteristics on online behavior.  相似文献   

15.
Modeling users’ acceptance of mobile services   总被引:1,自引:0,他引:1  
The success of mobile services adoption hinges on their ability to cover user needs and attract consumer interest. The extant literature focuses on understanding the factors that might affect consumers’ actual adoption of such services through their effect on behavioral intention; these studies are mostly based on behavioral intention theories, such as Technology Acceptance Model, Diffusion of Innovation and Unified Theory of Acceptance and Use of Technology. In this work, new theoretical constructs are combined with existing evidence in order to extend the Technology Acceptance Model (TAM) as it was initially established by Davis and later further enriched by other researchers. The proposed model includes behavioral intention, perceived usefulness, perceived ease of use, trust, innovativeness, relationship drivers, and functionality. Within this approach, relationship drivers introduce a marketing perspective to the original models of technology adoption by building emotional connections between the users and the mobile services. The hypothesized model is empirically tested using data collected from a survey on m-commerce consumers. Structural Equation Modelling (SEM) was used to evaluate the causal model and Confirmatory Factor Analysis (CFA) was performed to examine the reliability and validity of the measurement model. It is briefly concluded that behavioral intention is directly affected by perceived usefulness, innovativeness and relationship drivers; the findings provide interesting insights and useful hints to practitioners and researchers.  相似文献   

16.
Mining of spatial data is an enabling technology for mobile services, Internet-connected cars and the Internet of Things. But the very distinctiveness of spatial data that drives utility can cost user privacy. Past work has focused upon points and trajectories for differentially private release. In this work, we continue the tradition of privacy-preserving spatial analytics, focusing not on point or path data, but on planar spatial regions. Such data represent the area of a user’s most frequent visitation—such as “around home and nearby shops”. Specifically we consider the differentially private release of data structures that support range queries for counting users’ spatial regions. Counting planar regions leads to unique challenges not faced in existing work. A user’s spatial region that straddles multiple data structure cells can lead to duplicate counting at query time. We provably avoid this pitfall by leveraging the Euler characteristic for the first time with differential privacy. To address the increased sensitivity of range queries to spatial region data, we calibrate privacy-preserving noise using bounded user region size and a constrained inference that uses robust least absolute deviations. Our novel constrained inference reduces noise and promotes covertness by (privately) imposing consistency. We provide a full end-to-end theoretical analysis of both differential privacy and high-probability utility for our approach using concentration bounds. A comprehensive experimental study on several real-world datasets establishes practical validity.  相似文献   

17.
Traditional post-level opinion classification methods usually fail to capture a person’s overall sentiment orientation toward a topic from his/her microblog posts published for a variety of themes related to that topic. One reason for this is that the sentiments connoted in the textual expressions of microblog posts are often obscure. Moreover, a person’s opinions are often influenced by his/her social network. This study therefore proposes a new method based on integrated information of microblog users’ social interactions and textual opinions to infer the sentiment orientation of a user or the whole group regarding a hot topic. A Social Opinion Graph (SOG) is first constructed as the data model for sentiment analysis of a group of microblog users who share opinions on a topic. This represents their social interactions and opinions. The training phase then uses the SOGs of training sets to construct Sentiment Guiding Matrix (SGM), representing the knowledge about the correlation between users’ sentiments, Textual Sentiment Classifier (TSC), and emotion homophily coefficients of the influence of various types of social interaction on users’ mutual sentiments. All of these support a high-performance social sentiment analysis procedure based on the relaxation labeling scheme. The experimental results show that the proposed method has better sentiment classification accuracy than the textual classification and other integrated classification methods. In addition, IMSA can reduce pre-annotation overheads and the influence from sampling deviation.  相似文献   

18.
Online social platform, such as Wikipedia and Foursquare, has been increasingly exploded due to not only various useful services provided but also social gaming mechanisms that can keep users actively engaged. For example, users are awarded ”virtual goods” like badges and points when they contribute to the community in the network by voluntarily sharing ideas and other information. In this paper, we aim to examine the effectiveness of a social gamification mechanism, named user scores, designed in Foursquare which is one of most popular location-based social networks. A user’s score in Foursquare is an aggregate measure based on recent check-in activities of the user, which reflects a snapshot summary of the user’s temporal and spatial behaviors. Whenever a user checks in to a venue, a list of scores of the user’s friends are visible to the user via a ”leaderboard” which ranks these users’ scores in a descending order. Given a pair of friends who participate in a score competition in such a gimification mechanism, we identify if one user’s scores have significant influence on the other user’s scores by utilizing the Granger Causality Test. To understand what types of users and what types of friends tend to participate in the score competition (i.e., their check-ins are more likely driven by such a gamification mechanism), we extract users’ features (e.g. user’s degree) as well as the features of pairs of friends (e.g., number of common friends, score similarity and ranking difference) to examine whether these features have correlations with those pairs of users who are identified as being involved in the score game. The identified influence on user scores has the important implication on applications including friend and venue recommendations in location-based social networks.  相似文献   

19.
Analysis of users’ check-ins in location-based social networks (LBSNs, also called GeoSocial Networks), such as Foursquare and Yelp, is essential to understand users’ mobility patterns and behaviors. However, most empirical results of users’ mobility patterns reported in the current literature are based on users’ sampled and nonconsecutive public check-ins. Additionally, such analyses take no account of the noise or false information in the dataset, such as dishonest check-ins created by users. These empirical results may be biased and hence may bring side effects to LBSN services, such as friend and venue recommendations. Foursquare, one of the most popular LBSNs, provides a feature called a user’s score. A user’s score is an aggregate measure computed by the system based on more accurate and complete check-ins of the user. It reflects a snapshot of the user’s temporal and spatial patterns from his/her check-ins. For example, a high user score indicates that the user checked in at many venues regularly or s/he visited a number of new venues. In this paper, we show how a user’s score can be used as an alternative way to investigate the user’s mobility patterns. We first characterize a set of properties from the time series of a user’s consecutive weekly scores. Based on these properties, we identify different types of users by clustering users’ common check-in patterns using non-negative matrix factorization (NMF). We then analyze the correlations between the social features of user clusters and users’ check-in patterns. We present several interesting findings. For example, users with high scores (more mobile) tend to have more friends (more social). Our empirical results demonstrate how to uncover interesting spatio-temporal patterns by utilizing the aggregate measures released by a LBSN service.  相似文献   

20.
There is a dynamic and interconnected international setting shaped by the power of the Internet and social media. To gain more consumers, understand their behaviours and needs, and maintain closest relationships with them, businesses should understand how consumers behave in social media and how they vary in their purchase intentions. In the scope of the study, we integrate the social network theory and the theory of planned behaviour to analyse online consumers’ purchase intentions and to investigate their structural positions by analysing their friendships in social networks. We target Twitter users to conduct analysis due to Twitter's popularity in use, market penetration, and opportunity to work with open-source data. This study contributes to a better theoretical understanding of online consumers’ purchase intentions by integrating multiple theoretical perspectives. It expands the literature by considering both online consumers’ friendship network in Twitter and their individual online purchasing intentions. The study also guides e-marketers to design proper strategies for potential and current consumers and target the right sets of people in the social networks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号