ABSTRACT
In recent years, new studies concentrating on analyzing user personality and finding credible content in social media have become quite popular. Most such work augments features from textual content with features representing the user's social ties and the tie strength. Social ties are crucial in understanding the network the people are a part of. However, textual content is extremely useful in understanding topics discussed and the personality of the individual. We bring a new dimension to this type of analysis with methods to compute the type of ties individuals have and the strength of the ties in each dimension. We present a new genre of behavioral features that are able to capture the "function" of a specific relationship without the help of textual features. Our novel features are based on the statistical properties of communication patterns between individuals such as reciprocity, assortativity, attention and latency. We introduce a new methodology for determining how such features can be compared to textual features, and show, using Twitter data, that our features can be used to capture contextual information present in textual features very accurately. Conversely, we also demonstrate how textual features can be used to determine social attributes related to an individual.
- S. Adali, R. Escriva, M. Goldberg, M. Hayvanovych, M. Magdon-Ismail, B. K. Szymanski, W. A. Wallace, and G. M. Williams. Measuring behavioral trust in social networks. In Proc. International Conference on Intelligence and Security Informatics (ISI), pages 150--152, 2010.Google ScholarCross Ref
- S. Adali, X. Lu, M. Magdon-Ismail, and J. Purnell. Prominence ranking in graphs with community structure. In International AAAI Conference on Weblogs and Social Media (ICWSM'11), 2011.Google Scholar
- B. D. Alan Ritter, Colin Cherry. Unsupervised modeling of twitter conversations. In Proceedings of HLT-NAACL, 2010. Google ScholarDigital Library
- J. Baumes, M. Golberg, and M. Magdon-Ismail. Efficient identification of overlapping communities. In Proc. International Conference on Intelligence and Security Informatics (ISI), 2006. Google ScholarDigital Library
- F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on twitter. In CEAS 2010 - Seventh annual Collaboration, Electronic messaging, Anti- Abuse and Spam Conference, 2010.Google Scholar
- D. Boyd, S. Golder, and G. Lotan. Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. In HICSS-43. IEEE: Kauai, HI, January 6., 2010. Google ScholarDigital Library
- K. Canini, B. Suh, and P. Pirolli. Finding credible information sources in social networks based on content and social structure. In2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, 2011.Google ScholarCross Ref
- C. Chung and J. Pennebaker.The psychological function of function words, pages 343--359. New York: Psychology Press, 2007.Google Scholar
- A. Clauset, M. Newman, and C. Moore. Finding community structure in very large networks.Phys. Rev. E, 70(6):066111, 2004.Google ScholarCross Ref
- T. DuBois, J. Golbeck, and A. Srinavasan. Predicting trust and distrust in social networks. In IEEE International Conference on Social Computing, 2011.Google ScholarCross Ref
- E. Gilbert and K. Karahalios. Predicting tie strength with social media. InProceedings of the 27th international conference on Human factors in computing systems, pages 211--220, 2009. Google ScholarDigital Library
- J. Golbeck, C. Robles, M. Edmondson, and K. Turner. Predicting personality from twitter. In 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, 2011.Google ScholarCross Ref
- J. Golbeck, C. Robles, and K. Turner. Predicting personality with social media. InProceedings of the 2011 annual conference extended abstracts on Human factors in computing systems, CHI EA 2011, pages 253--262, 2011. Google ScholarDigital Library
- M. Granovetter. The strength of weak ties. American Journal of Sociology, 78:1--22, 1973.Google ScholarCross Ref
- M. Granovetter. Economic action and social structure: The problem of embeddedness.American Journal of Sociology, 91:481--510, 1985.Google ScholarCross Ref
- E. T. Hall.The Silent Language. Anchor, 1973.Google Scholar
- C. Honey and S. Herring. Beyond microblogging: Conversation and collaboration via twitter. In HICSS'09. 42nd Hawaii International Conference on System Sciences, 2009. Google ScholarDigital Library
- L. Hong, G. Convertino, and E. Chi. Language matters in twitter: A large scale study. In International AAAI Conference on Weblogs and Social Media (ICWSM'11), 2011.Google Scholar
- A. Java, X. Song, T. Finin, and B. Tseng. Why we twitter: understanding microblogging usage and communities. InProceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, pages 56--65, 2007. Google ScholarDigital Library
- D. Lauterbach, H. Truong, T. Shah, and L. Adamic. Surfing a web of trust: Reputation and reciprocity on couchsurfing. InProceedings of the 2009 International Conference on Computational Science and Engineering, volume 4, pages 346--353, 2009. Google ScholarDigital Library
- M. E. J. Newman. Mixing patterns in networks. Physical Review E, 67, 2003.Google Scholar
- E. Ostrom and J. W. (editors).Trust and Reciprocity. Russell Sage Foundation, 2005.Google Scholar
- J. Pennebaker.The Secret Life of Pronouns: What Our Words Say About Us. Bloomsbury Press, 2011.Google Scholar
- M. Rivera, S. Soderstrom, and B. Uzzi. Dynamics of dyads in social networks: Assortative, relational, and proximity mechanisms.Annual Review of Sociology, pages 91--115, 2010.Google Scholar
- S. Saavedraa, K. Hagerty, and B. Uzzi. Synchronicity, instant messaging, and performance among financial traders. Proceeding of the National Academy of Sciences (PNAS), 2011.Google ScholarCross Ref
- B. Suh, L. Hong, P. Pirolli, and E. Chi. Want to be retweeted? large scale analytics on factors impacting retweet in twitter network. In 2010 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, 2010. Google ScholarDigital Library
- Y. R. Tausczik and J. W. Pennebaker. The psychological meaning of words: Liwc and computerized text analysis methods.Journal of Language and Social Psychology, 29(1):24--54, 2010.Google ScholarCross Ref
- B. Uzzi. Social structure and competition in interfirm networks: The paradox of embeddedness. Administrative Science Quarterly, 42:35--67, March 1997.Google ScholarCross Ref
- A. Wang. Don't follow me: Spam detection in twitter. In Intl Conference on Security and Cryptography (SECRYPT), 2010.Google Scholar
- C. Wang, A. Strathman, O. Lizardo, D. Hachen, Z. Toroczkai, and N. V. Chawla. Weighted reciprocity in human communication networks. Social Networks (under review), 2011.Google Scholar
- S. Wuchty and B. Uzzi. Human communication dynamics: A study of the agreement between self-reported and email derived social networks. PLoS One, forthcoming, 2011.Google Scholar
Index Terms
- Actions speak as loud as words: predicting relationships from social behavior data
Recommendations
A study of Facebook behavior
We retrieved data directly from 1327 participants' Facebook accounts to investigate users' personality.We calculated 154 features, covering demographics, profile descriptions, produced content, and interactions with friends.Neurotic users are inclined ...
How Do You Interact with Your Old Friends on a New Site: Understanding Social Ties among Different Social Network Sites
ChineseCSCW '17: Proceedings of the 12th Chinese Conference on Computer Supported Cooperative Work and Social ComputingUser footprints analysis across different SNSs have become emerging topics in research areas of social network analysis and social media mining. However, the features leveraged for user footprints analysis always have weak discriminability, high ...
Friend or frenemy?: predicting signed ties in social networks
SIGIR '12: Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrievalWe study the problem of labeling the edges of a social network graph (e.g., acquaintance connections in Facebook) as either positive (i.e., trust, true friendship) or negative (i.e., distrust, possible frenemy) relations. Such signed relations provide ...
Comments