Skip to main content
Top

2018 | OriginalPaper | Chapter

9. Concluding Remarks and Challenges

Authors : Andrea Tagarelli, Roberto Interdonato

Published in: Mining Lurkers in Online Social Networks

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter ends the brief offering a summary of the main topics discussed and providing suggestions for future research.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sara Bastiaensens, Heidi Vandebosch, Karolien Poels, Katrien Van Cleemput, Ann DeSmet, and Ilse De Bourdeaudhuij. Cyberbullying on social network sites. An experimental study into bystanders’ behavioural intentions to help the victim or reinforce the bully. Computers in Human Behavior, 31:259–271, 2014.CrossRef Sara Bastiaensens, Heidi Vandebosch, Karolien Poels, Katrien Van Cleemput, Ann DeSmet, and Ilse De Bourdeaudhuij. Cyberbullying on social network sites. An experimental study into bystanders’ behavioural intentions to help the victim or reinforce the bully. Computers in Human Behavior, 31:259–271, 2014.CrossRef
2.
go back to reference V. Belák, A. J. Mashhadi, A. Sala, and D. Morrison. Phantom cascades: The effect of hidden nodes on information diffusion. Computer Communications, 73:12–21, 2016.CrossRef V. Belák, A. J. Mashhadi, A. Sala, and D. Morrison. Phantom cascades: The effect of hidden nodes on information diffusion. Computer Communications, 73:12–21, 2016.CrossRef
3.
go back to reference F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. Characterizing user navigation and interactions in online social networks. Information Sciences, 195:1–24, 2012.CrossRef F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. Characterizing user navigation and interactions in online social networks. Information Sciences, 195:1–24, 2012.CrossRef
4.
go back to reference M. S. Bernstein, E. Bakshy, M. Burke, and B. Karrer. Quantifying the invisible audience in social networks. In Proc. ACM Conf. on Human Factors in Computing Systems (CHI), pages 21–30, 2013. M. S. Bernstein, E. Bakshy, M. Burke, and B. Karrer. Quantifying the invisible audience in social networks. In Proc. ACM Conf. on Human Factors in Computing Systems (CHI), pages 21–30, 2013.
5.
go back to reference M. Burke, C. Marlow, and T. Lento. Social network activity and social well-being. In Proc. ACM Conf. on Human Factors in Computing Systems (CHI), pages 1909–1912, 2010. M. Burke, C. Marlow, and T. Lento. Social network activity and social well-being. In Proc. ACM Conf. on Human Factors in Computing Systems (CHI), pages 1909–1912, 2010.
6.
go back to reference A. Caliò, R. Interdonato, C. Pulice, and A. Tagarelli. Topology-driven diversity for targeted influence maximization with application to user engagement in social networks. IEEE Transactions on Knowledge and Data Engineering, 2018. A. Caliò, R. Interdonato, C. Pulice, and A. Tagarelli. Topology-driven diversity for targeted influence maximization with application to user engagement in social networks. IEEE Transactions on Knowledge and Data Engineering, 2018.
7.
go back to reference E. Cambria and B. White. Jumping NLP curves: A review of natural language processing research. IEEE Computational Intelligence Magazine, 9(2):48–57, 2014.CrossRef E. Cambria and B. White. Jumping NLP curves: A review of natural language processing research. IEEE Computational Intelligence Magazine, 9(2):48–57, 2014.CrossRef
8.
go back to reference Giovanni Luca Ciampaglia, Alexios Mantzarlis, Gregory Maus, and Filippo Menczer. Research challenges of digital misinformation: Toward a trustworthy web. AI Magazine, 39(1):65–74, 2018.CrossRef Giovanni Luca Ciampaglia, Alexios Mantzarlis, Gregory Maus, and Filippo Menczer. Research challenges of digital misinformation: Toward a trustworthy web. AI Magazine, 39(1):65–74, 2018.CrossRef
9.
go back to reference J. M. Darley and B. Latané. Bystander intervention in emergencies: Diffusion of responsibility. Journal of Personality and Social Psychology, 8(4):377–383, 1968.CrossRef J. M. Darley and B. Latané. Bystander intervention in emergencies: Diffusion of responsibility. Journal of Personality and Social Psychology, 8(4):377–383, 1968.CrossRef
10.
go back to reference Dominic DiFranzo, Samuel Hardman Taylor, Franccesca Kazerooni, Olivia D. Wherry, and Natalya N. Bazarova. Upstanding by design: Bystander intervention in cyberbullying. In Proc. ACM Conf. on Human Factors in Computing Systems (CHI), page 211, 2018. Dominic DiFranzo, Samuel Hardman Taylor, Franccesca Kazerooni, Olivia D. Wherry, and Natalya N. Bazarova. Upstanding by design: Bystander intervention in cyberbullying. In Proc. ACM Conf. on Human Factors in Computing Systems (CHI), page 211, 2018.
11.
go back to reference Emilio Ferrara. Disinformation and social bot operations in the run up to the 2017 french presidential election. First Monday, 22(8), 2017. Emilio Ferrara. Disinformation and social bot operations in the run up to the 2017 french presidential election. First Monday, 22(8), 2017.
12.
go back to reference Kiran Garimella, Gianmarco De Francisci Morales, Aristides Gionis, and Michael Mathioudakis. Political discourse on social media: Echo chambers, gatekeepers, and the price of bipartisanship. In Proceedings of the 2018 World Wide Web Conference on World Wide Web, WWW 2018, Lyon, France, April 23-27, 2018, pages 913–922, 2018. Kiran Garimella, Gianmarco De Francisci Morales, Aristides Gionis, and Michael Mathioudakis. Political discourse on social media: Echo chambers, gatekeepers, and the price of bipartisanship. In Proceedings of the 2018 World Wide Web Conference on World Wide Web, WWW 2018, Lyon, France, April 23-27, 2018, pages 913–922, 2018.
13.
go back to reference Nabeel Gillani, Ann Yuan, Martin Saveski, Soroush Vosoughi, and Deb Roy. Me, my echo chamber, and I: introspection on social media polarization. In Proceedings of the 2018 World Wide Web Conference on World Wide Web, WWW 2018, Lyon, France, April 23-27, 2018, pages 823–831, 2018. Nabeel Gillani, Ann Yuan, Martin Saveski, Soroush Vosoughi, and Deb Roy. Me, my echo chamber, and I: introspection on social media polarization. In Proceedings of the 2018 World Wide Web Conference on World Wide Web, WWW 2018, Lyon, France, April 23-27, 2018, pages 823–831, 2018.
14.
go back to reference L. R. Goldberg. The structure of phenotypic personality traits. American Psychologist, 48(1):26, 1993.CrossRef L. R. Goldberg. The structure of phenotypic personality traits. American Psychologist, 48(1):26, 1993.CrossRef
15.
go back to reference Pik-Mai Hui, Chengcheng Shao, Alessandro Flammini, Filippo Menczer, and Giovanni Luca Ciampaglia. The Hoaxy misinformation and fact-checking diffusion network. In Proc. Int. Conf. on Weblogs and Social Media (ICWSM), pages 528–530, 2018. Pik-Mai Hui, Chengcheng Shao, Alessandro Flammini, Filippo Menczer, and Giovanni Luca Ciampaglia. The Hoaxy misinformation and fact-checking diffusion network. In Proc. Int. Conf. on Weblogs and Social Media (ICWSM), pages 528–530, 2018.
16.
go back to reference R. Interdonato, C. Pulice, and A. Tagarelli. “Got to have faith!”: The DEvOTION algorithm for delurking in social networks. In Proc. Int. Conf. on Advances in Social Networks Analysis and Mining (ASONAM), pages 314–319, 2015. R. Interdonato, C. Pulice, and A. Tagarelli. “Got to have faith!”: The DEvOTION algorithm for delurking in social networks. In Proc. Int. Conf. on Advances in Social Networks Analysis and Mining (ASONAM), pages 314–319, 2015.
17.
go back to reference J. Jiang, C. Wilson, X. Wang, W. Sha, P. Huang, Y. Dai, and B. Y. Zhao. Understanding latent interactions in online social networks. ACM Trans. on the Web, 7(4):18, 2013.CrossRef J. Jiang, C. Wilson, X. Wang, W. Sha, P. Huang, Y. Dai, and B. Y. Zhao. Understanding latent interactions in online social networks. ACM Trans. on the Web, 7(4):18, 2013.CrossRef
18.
go back to reference E. J. Johnson, G. Hubl, and A. Keinan. Aspects of endowment: a query theory of value construction. Journal of Experimental Psychology Learning Memory Cognition, 33(3):461, 2007. E. J. Johnson, G. Hubl, and A. Keinan. Aspects of endowment: a query theory of value construction. Journal of Experimental Psychology Learning Memory Cognition, 33(3):461, 2007.
19.
go back to reference D. E. Kanouse and L. R. Hanson Jr. Negativity in evaluations. In Attribution: Perceiving the causes of behavior. Hillsdale, NJ, US: Lawrence Erlbaum Associates, Inc., 1987. D. E. Kanouse and L. R. Hanson Jr. Negativity in evaluations. In Attribution: Perceiving the causes of behavior. Hillsdale, NJ, US: Lawrence Erlbaum Associates, Inc., 1987.
20.
go back to reference Srijan Kumar, Robert West, and Jure Leskovec. Disinformation on the web: Impact, characteristics, and detection of Wikipedia hoaxes. In Proc. ACM Conf. on World Wide Web (WWW), pages 591–602, 2016. Srijan Kumar, Robert West, and Jure Leskovec. Disinformation on the web: Impact, characteristics, and detection of Wikipedia hoaxes. In Proc. ACM Conf. on World Wide Web (WWW), pages 591–602, 2016.
21.
go back to reference Volodymyr Lysenko and Catherine Brooks. Russian information troops, disinformation, and democracy. First Monday, 23(5), 2018. Volodymyr Lysenko and Catherine Brooks. Russian information troops, disinformation, and democracy. First Monday, 23(5), 2018.
22.
go back to reference H. P. Martínez, Y. Bengio, and G. N. Yannakakis. Learning Deep Physiological Models of Affect. IEEE Computational Intelligence Magazine, 8(2):20–33, 2013.CrossRef H. P. Martínez, Y. Bengio, and G. N. Yannakakis. Learning Deep Physiological Models of Affect. IEEE Computational Intelligence Magazine, 8(2):20–33, 2013.CrossRef
23.
go back to reference World Health Organization. Preventing suicide: A global imperative. Geneva, Switzerland: World Health Organization, 2014. World Health Organization. Preventing suicide: A global imperative. Geneva, Switzerland: World Health Organization, 2014.
24.
go back to reference A. Ortony and T. J. Turner. What’s basic about basic emotions? Psychological Review, 97:315–331, 1990.CrossRef A. Ortony and T. J. Turner. What’s basic about basic emotions? Psychological Review, 97:315–331, 1990.CrossRef
25.
go back to reference Robert Plutchik and Henry Kellerman. Emotion: Theory, research, and experience: Vol. 1. Theories of emotion. Elsevier Inc., 1980. Robert Plutchik and Henry Kellerman. Emotion: Theory, research, and experience: Vol. 1. Theories of emotion. Elsevier Inc., 1980.
26.
go back to reference S. Poria, E. Cambria, A. F. Gelbukh, F. Bisio, and A. Hussain. Sentiment Data Flow Analysis by Means of Dynamic Linguistic Patterns. IEEE Computational Intelligence Magazine, 10(4):26–36, 2015.CrossRef S. Poria, E. Cambria, A. F. Gelbukh, F. Bisio, and A. Hussain. Sentiment Data Flow Analysis by Means of Dynamic Linguistic Patterns. IEEE Computational Intelligence Magazine, 10(4):26–36, 2015.CrossRef
27.
go back to reference Shalom H. Schwartz. Universals in the Content and Structure of Values: Theoretical Advances and Empirical Tests in 20 Countries. Advances in Experimental Social Psychology, 25:1–65, 1992.CrossRef Shalom H. Schwartz. Universals in the Content and Structure of Values: Theoretical Advances and Empirical Tests in 20 Countries. Advances in Experimental Social Psychology, 25:1–65, 1992.CrossRef
28.
go back to reference Jieun Shin, Lian Jian, Kevin Driscoll, and François Bar. The diffusion of misinformation on social media: Temporal pattern, message, and source. Computers in Human Behavior, 83:278–287, 2018.CrossRef Jieun Shin, Lian Jian, Kevin Driscoll, and François Bar. The diffusion of misinformation on social media: Temporal pattern, message, and source. Computers in Human Behavior, 83:278–287, 2018.CrossRef
29.
go back to reference Jiyeon Song and Insoo Oh. Factors influencing bystanders’ behavioral reactions in cyberbullying situations. Computers in Human Behavior, 78:273–282, 2018.CrossRef Jiyeon Song and Insoo Oh. Factors influencing bystanders’ behavioral reactions in cyberbullying situations. Computers in Human Behavior, 78:273–282, 2018.CrossRef
30.
go back to reference T. D. Wilson and D. T. Gilbert. Affective forecasting: Knowing what to want. Current Directions in Psychological Science, 14(3):131–134, 2010.CrossRef T. D. Wilson and D. T. Gilbert. Affective forecasting: Knowing what to want. Current Directions in Psychological Science, 14(3):131–134, 2010.CrossRef
Metadata
Title
Concluding Remarks and Challenges
Authors
Andrea Tagarelli
Roberto Interdonato
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00229-9_9

Premium Partner