Skip to main content
Erschienen in: Social Network Analysis and Mining 1/2016

01.12.2016 | Review Article

User characterization for online social networks

verfasst von: Tayfun Tuna, Esra Akbas, Ahmet Aksoy, Muhammed Abdullah Canbaz, Umit Karabiyik, Bilal Gonen, Ramazan Aygun

Erschienen in: Social Network Analysis and Mining | Ausgabe 1/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Online social network analysis has attracted great attention with a vast number of users sharing information and availability of APIs that help to crawl online social network data. In this paper, we study the research studies that are helpful for user characterization as online users may not always reveal their true identity or attributes. We especially focused on user attribute determination such as gender and age; user behavior analysis such as motives for deception; mental models that are indicators of user behavior; user categorization such as bots versus humans; and entity matching on different social networks. We believe our summary of analysis of user characterization will provide important insights into researchers and better services to online users.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Adali S, Golbeck J (2012) Predicting personality with social behavior. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM 2012), pp 302–309 Adali S, Golbeck J (2012) Predicting personality with social behavior. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM 2012), pp 302–309
Zurück zum Zitat Alowibdi JS, Buy UA, Yu P (2013) Empirical evaluation of profile characteristics for gender classification on twitter. In: Proceedings of the 2013 12th international conference on machine learning and applications, vol 1. ICMLA ’13IEEE Computer Society, Washington, DC, USA, pp 365–369 Alowibdi JS, Buy UA, Yu P (2013) Empirical evaluation of profile characteristics for gender classification on twitter. In: Proceedings of the 2013 12th international conference on machine learning and applications, vol 1. ICMLA ’13IEEE Computer Society, Washington, DC, USA, pp 365–369
Zurück zum Zitat Alowibdi JS, Buy UA, Yu P (2013) Language independent gender classification on twitter. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining. ASONAM ’13ACM, New York, NY, USA, pp 739–743 Alowibdi JS, Buy UA, Yu P (2013) Language independent gender classification on twitter. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining. ASONAM ’13ACM, New York, NY, USA, pp 739–743
Zurück zum Zitat Alowibdi JS, Buy U, Yu PS, Stenneth L et al (2014) Detecting deception in online social networks. In: 2014 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 383–390 Alowibdi JS, Buy U, Yu PS, Stenneth L et al (2014) Detecting deception in online social networks. In: 2014 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 383–390
Zurück zum Zitat Amichai-Hamburger Y, Vinitzky G (2010) Social network use and personality. Comput Hum Behav 26(6):1289–1295CrossRef Amichai-Hamburger Y, Vinitzky G (2010) Social network use and personality. Comput Hum Behav 26(6):1289–1295CrossRef
Zurück zum Zitat Aydogan A, Tuna T, Yildirim A (2016) Does political elites represent their followers? Quantitative text analysis of Turkish tweets. In: Proceedings of the midwest political science association 74th annual conference. Chicago, USA Aydogan A, Tuna T, Yildirim A (2016) Does political elites represent their followers? Quantitative text analysis of Turkish tweets. In: Proceedings of the midwest political science association 74th annual conference. Chicago, USA
Zurück zum Zitat Backstrom L, Kleinberg J, Kumar R, Novak J (2008) Spatial variation in search engine queries. In: Proceedings of the 17th international conference on world wide web. WWW ’08ACM, New York, NY, USA, pp 357–366 Backstrom L, Kleinberg J, Kumar R, Novak J (2008) Spatial variation in search engine queries. In: Proceedings of the 17th international conference on world wide web. WWW ’08ACM, New York, NY, USA, pp 357–366
Zurück zum Zitat Benevenuto F, Rodrigues T, Cha M, Almeida V (2009) Characterizing user behavior in online social networks. In: Proceedings of the 9th ACM SIGCOMM conference on internet measurement conference, pp 49–62 Benevenuto F, Rodrigues T, Cha M, Almeida V (2009) Characterizing user behavior in online social networks. In: Proceedings of the 9th ACM SIGCOMM conference on internet measurement conference, pp 49–62
Zurück zum Zitat Bhaskaran N, Nwogu I, Frank MG, Govindaraju V (2011) Lie to me: deceit detection via online behavioral learning. In: 2011 IEEE international conference on automatic face & gesture recognition and workshops (FG 2011), pp 24–29 Bhaskaran N, Nwogu I, Frank MG, Govindaraju V (2011) Lie to me: deceit detection via online behavioral learning. In: 2011 IEEE international conference on automatic face & gesture recognition and workshops (FG 2011), pp 24–29
Zurück zum Zitat Blei DM, Ng AY, Jordan MI (2003) Latent dirichlet allocation. J Mach Learn Res 3:993–1022MATH Blei DM, Ng AY, Jordan MI (2003) Latent dirichlet allocation. J Mach Learn Res 3:993–1022MATH
Zurück zum Zitat Blythe J, Camp LJ (2012) Implementing mental models. In: 2012 IEEE symposium on security and privacy workshops (SPW), pp 86–90 Blythe J, Camp LJ (2012) Implementing mental models. In: 2012 IEEE symposium on security and privacy workshops (SPW), pp 86–90
Zurück zum Zitat Burger JD, Henderson J, Kim G, Zarrella G (2011) Discriminating gender on twitter. In: Proceedings of the conference on empirical methods in natural language processing, EMNLP ’11. Association for Computational Linguistics, pp 1301–1309 Burger JD, Henderson J, Kim G, Zarrella G (2011) Discriminating gender on twitter. In: Proceedings of the conference on empirical methods in natural language processing, EMNLP ’11. Association for Computational Linguistics, pp 1301–1309
Zurück zum Zitat Burt DM, Perrett DI (1995) Perception of age in adult caucasian male faces: computer graphic manipulation of shape and colour information. P R Soc Lond B Biol Sci 259(1355):137–143. doi:10.1098/rspb.1995.0021 CrossRef Burt DM, Perrett DI (1995) Perception of age in adult caucasian male faces: computer graphic manipulation of shape and colour information. P R Soc Lond B Biol Sci 259(1355):137–143. doi:10.​1098/​rspb.​1995.​0021 CrossRef
Zurück zum Zitat Chang Hw, Lee D, Eltaher M, Lee J (2012) @phillies tweeting from philly? Predicting twitter user locations with spatial word usage. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining, ASONAM ’12. IEEE Computer Society, Washington, DC, USA, pp 111–118 Chang Hw, Lee D, Eltaher M, Lee J (2012) @phillies tweeting from philly? Predicting twitter user locations with spatial word usage. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining, ASONAM ’12. IEEE Computer Society, Washington, DC, USA, pp 111–118
Zurück zum Zitat Cheng N, Chandramouli R, Subbalakshmi KP (2011) Author gender identification from text. Digit Investig 8(1):78–88CrossRef Cheng N, Chandramouli R, Subbalakshmi KP (2011) Author gender identification from text. Digit Investig 8(1):78–88CrossRef
Zurück zum Zitat Cheng Z, Caverlee J, Lee K (2010) You are where you tweet: a content-based approach to geo-locating twitter users. In: Proceedings of the 19th ACM international conference on information and knowledge management. CIKM ’10ACM, New York, NY, USA, pp 759–768 Cheng Z, Caverlee J, Lee K (2010) You are where you tweet: a content-based approach to geo-locating twitter users. In: Proceedings of the 19th ACM international conference on information and knowledge management. CIKM ’10ACM, New York, NY, USA, pp 759–768
Zurück zum Zitat Chu Z, Gianvecchio S, Wang H, Jajodia S (2010) Who is tweeting on twitter: human, bot, or cyborg? In: Proceedings of the 26th annual computer security applications conference. ACSAC ’10ACM, New York, NY, USA, pp 21–30 Chu Z, Gianvecchio S, Wang H, Jajodia S (2010) Who is tweeting on twitter: human, bot, or cyborg? In: Proceedings of the 26th annual computer security applications conference. ACSAC ’10ACM, New York, NY, USA, pp 21–30
Zurück zum Zitat Ciot M, Sonderegger M, Ruths D (2013) Gender inference of twitter users in non-English contexts. In: EMNLP. ACL, pp 1136–1145 Ciot M, Sonderegger M, Ruths D (2013) Gender inference of twitter users in non-English contexts. In: EMNLP. ACL, pp 1136–1145
Zurück zum Zitat Coleman JS (1988) Social capital in the creation of human capital. Am J Sociol 94:S95–S120CrossRef Coleman JS (1988) Social capital in the creation of human capital. Am J Sociol 94:S95–S120CrossRef
Zurück zum Zitat Darmon D, Sylvester J, Girvan M, Rand W (2013) Predictability of user behavior in social media: Bottom-up v. top-down modeling. In: 2013 international conference on social computing (SocialCom), pp 102–107 Darmon D, Sylvester J, Girvan M, Rand W (2013) Predictability of user behavior in social media: Bottom-up v. top-down modeling. In: 2013 international conference on social computing (SocialCom), pp 102–107
Zurück zum Zitat Deitrick W, Miller Z, Valyou B, Dickinson B, Munson T, Hu W (2012) Gender identification on twitter using the modified balanced winnow. Commun Netw 4(3):189–195CrossRef Deitrick W, Miller Z, Valyou B, Dickinson B, Munson T, Hu W (2012) Gender identification on twitter using the modified balanced winnow. Commun Netw 4(3):189–195CrossRef
Zurück zum Zitat Fan RE, Chang KW, Hsieh CJ, Wang XR, Lin CJ (2008) Liblinear: a library for large linear classification. J Mach Learn Res 9:1871–1874MATH Fan RE, Chang KW, Hsieh CJ, Wang XR, Lin CJ (2008) Liblinear: a library for large linear classification. J Mach Learn Res 9:1871–1874MATH
Zurück zum Zitat Fazeen M, Dantu R, Guturu P (2011) Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. Soc Netw Anal Min 1(3):241–254CrossRef Fazeen M, Dantu R, Guturu P (2011) Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. Soc Netw Anal Min 1(3):241–254CrossRef
Zurück zum Zitat Ferrara E, Varol O, Davis C, Menczer F, Flammini A (2016) The rise of social bots. Commun ACM 59(7):96–104CrossRef Ferrara E, Varol O, Davis C, Menczer F, Flammini A (2016) The rise of social bots. Commun ACM 59(7):96–104CrossRef
Zurück zum Zitat Fire M, Kagan D, Elyashar A, Elovici Y (2014) Friend or foe? Fake profile identification in online social networks. Soc Netw Anal Min 4(1):1–23CrossRef Fire M, Kagan D, Elyashar A, Elovici Y (2014) Friend or foe? Fake profile identification in online social networks. Soc Netw Anal Min 4(1):1–23CrossRef
Zurück zum Zitat Freund Y, Schapire RE (1996) Experiments with a new boosting algorithm. In: Saitta L (ed) Proceedings of the thirteenth international conference on machine learning (ICML 1996). Morgan Kaufmann, pp 148–156 Freund Y, Schapire RE (1996) Experiments with a new boosting algorithm. In: Saitta L (ed) Proceedings of the thirteenth international conference on machine learning (ICML 1996). Morgan Kaufmann, pp 148–156
Zurück zum Zitat Friedman J, Hastie T, Tibshirani R et al (2000) Additive logistic regression: a statistical view of boosting (with discussion and a rejoinder by the authors). Ann Stat 28(2):337–407MathSciNetCrossRefMATH Friedman J, Hastie T, Tibshirani R et al (2000) Additive logistic regression: a statistical view of boosting (with discussion and a rejoinder by the authors). Ann Stat 28(2):337–407MathSciNetCrossRefMATH
Zurück zum Zitat Friedman C, Sideli R (1992) Tolerating spelling errors during patient validation. Comput Biomed Res 25(5):486–509CrossRef Friedman C, Sideli R (1992) Tolerating spelling errors during patient validation. Comput Biomed Res 25(5):486–509CrossRef
Zurück zum Zitat Garg V, Nilizadeh S (2013) Craigslist scams and community composition: investigating online fraud victimization. In: Security and privacy workshops (SPW), pp 123–126 Garg V, Nilizadeh S (2013) Craigslist scams and community composition: investigating online fraud victimization. In: Security and privacy workshops (SPW), pp 123–126
Zurück zum Zitat Golbeck J, Hansen D (2014) A method for computing political preference among Twitter followers. Soc Netw 36:177–184CrossRef Golbeck J, Hansen D (2014) A method for computing political preference among Twitter followers. Soc Netw 36:177–184CrossRef
Zurück zum Zitat Golbeck J, Robles C, Turner K (2011) Predicting personality with social media. In: CHI ’11 extended abstracts on human factors in computing systems., CHI EA ’11ACM, New York, NY, USA, pp 253–262 Golbeck J, Robles C, Turner K (2011) Predicting personality with social media. In: CHI ’11 extended abstracts on human factors in computing systems., CHI EA ’11ACM, New York, NY, USA, pp 253–262
Zurück zum Zitat Griffin C, Squicciarini A (2012) Toward a game theoretic model of information release in social media with experimental results. In: 2012 IEEE Symposium on security and privacy workshops (SPW), pp 113–116 Griffin C, Squicciarini A (2012) Toward a game theoretic model of information release in social media with experimental results. In: 2012 IEEE Symposium on security and privacy workshops (SPW), pp 113–116
Zurück zum Zitat Grimaudo L, Song HH, Baldi M, Mellia M, Munafo M (2014) Tucan: Twitter user centric analyzer. In: Online social media analysis and visualization. Springer, pp 63–79 Grimaudo L, Song HH, Baldi M, Mellia M, Munafo M (2014) Tucan: Twitter user centric analyzer. In: Online social media analysis and visualization. Springer, pp 63–79
Zurück zum Zitat Gyarmati L, Trinh TA (2010) Measuring user behavior in online social networks. IEEE Netw 24(5):26–31CrossRef Gyarmati L, Trinh TA (2010) Measuring user behavior in online social networks. IEEE Netw 24(5):26–31CrossRef
Zurück zum Zitat Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The weka data mining software: an update. SIGKDD Explor Newsl 11(1):10–18CrossRef Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The weka data mining software: an update. SIGKDD Explor Newsl 11(1):10–18CrossRef
Zurück zum Zitat Harris interactive public relations research. A study of social networks scams Harris interactive public relations research. A study of social networks scams
Zurück zum Zitat Holmes D, McCabe M (2002) Improving precision and recall for soundex retrieval. In: Proceedings of international conference on information technology: coding and computing, 2002, pp 22–26 Holmes D, McCabe M (2002) Improving precision and recall for soundex retrieval. In: Proceedings of international conference on information technology: coding and computing, 2002, pp 22–26
Zurück zum Zitat Ikeda K, Hattori G, Matsumoto K, Ono C, Higashino T (2012) Demographic estimation of twitter users for marketing analysis. IPSJ Trans Consum Devices Syst 2(1):82–93 Ikeda K, Hattori G, Matsumoto K, Ono C, Higashino T (2012) Demographic estimation of twitter users for marketing analysis. IPSJ Trans Consum Devices Syst 2(1):82–93
Zurück zum Zitat Ito J, Hoshide T, Toda H, Uchiyama T, Nishida K (2013) What is he/she like?: Estimating twitter user attributes from contents and social neighbors. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining. ASONAM ’13ACM, New York, NY, USA, pp 1448–1450 Ito J, Hoshide T, Toda H, Uchiyama T, Nishida K (2013) What is he/she like?: Estimating twitter user attributes from contents and social neighbors. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining. ASONAM ’13ACM, New York, NY, USA, pp 1448–1450
Zurück zum Zitat Jin L, Chen Y, Wang T, Hui P, Vasilakos AV (2013) Understanding user behavior in online social networks: a survey. Commun Mag 51(9):144–150CrossRef Jin L, Chen Y, Wang T, Hui P, Vasilakos AV (2013) Understanding user behavior in online social networks: a survey. Commun Mag 51(9):144–150CrossRef
Zurück zum Zitat Johansson F, Kaati L, Shrestha A (2013) Detecting multiple aliases in social media. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining, pp 1004–1011 Johansson F, Kaati L, Shrestha A (2013) Detecting multiple aliases in social media. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining, pp 1004–1011
Zurück zum Zitat John O, Donahue E, Kentle R (1991) The big five inventory—versions 4a and 54, Berkeley: University of California. Institute of Personality and Social Research, Berkeley John O, Donahue E, Kentle R (1991) The big five inventory—versions 4a and 54, Berkeley: University of California. Institute of Personality and Social Research, Berkeley
Zurück zum Zitat Klimt B, Yang Y (2004) The Enron corpus: a new dataset for email classification research. In: Machine learning: ECML 2004. Springer, pp 217–226 Klimt B, Yang Y (2004) The Enron corpus: a new dataset for email classification research. In: Machine learning: ECML 2004. Springer, pp 217–226
Zurück zum Zitat Kohli S, Gupta A (2014) Modeling anonymous human behavior using social media. In: 2014 9th international conference for internet technology and secured transactions (ICITST), pp 409–412 Kohli S, Gupta A (2014) Modeling anonymous human behavior using social media. In: 2014 9th international conference for internet technology and secured transactions (ICITST), pp 409–412
Zurück zum Zitat Lewis DD, Yang Y, Rose TG, Li F (2004) Rcv1: a new benchmark collection for text categorization research. J Mach Learn Res 5:361–397 Lewis DD, Yang Y, Rose TG, Li F (2004) Rcv1: a new benchmark collection for text categorization research. J Mach Learn Res 5:361–397
Zurück zum Zitat Lotka AJ (1926) The frequency distribution of scientific productivity. J Wash Acad Sci 16:316–322 Lotka AJ (1926) The frequency distribution of scientific productivity. J Wash Acad Sci 16:316–322
Zurück zum Zitat Maia M, Almeida J, Almeida V (2008) Identifying user behavior in online social networks. In: Proceedings of the 1st workshop on social network systems, pp 1–6 Maia M, Almeida J, Almeida V (2008) Identifying user behavior in online social networks. In: Proceedings of the 1st workshop on social network systems, pp 1–6
Zurück zum Zitat Mazumder A, Das A, Kim N, Gokalp S, Sen A, Davulcu H (2013) Spatio-temporal signal recovery from political tweets in Indonesia. In: 2013 international conference on social computing (SocialCom), pp 280–287 Mazumder A, Das A, Kim N, Gokalp S, Sen A, Davulcu H (2013) Spatio-temporal signal recovery from political tweets in Indonesia. In: 2013 international conference on social computing (SocialCom), pp 280–287
Zurück zum Zitat Moon B (1995) Paradigms in migration research: exploring ‘moorings’ as a schema. Prog Hum Geogr 19(4):504–524CrossRef Moon B (1995) Paradigms in migration research: exploring ‘moorings’ as a schema. Prog Hum Geogr 19(4):504–524CrossRef
Zurück zum Zitat Moskowitz DS, Zuroff DC (2004) Flux, pulse, and spin: dynamic additions to the personality lexicon. J Pers Soc Psychol 86(6):880–893CrossRef Moskowitz DS, Zuroff DC (2004) Flux, pulse, and spin: dynamic additions to the personality lexicon. J Pers Soc Psychol 86(6):880–893CrossRef
Zurück zum Zitat Moskowitz DS, Zuroff DC (2005) Robust predictors of flux, pulse, and spin. J Res Pers 39:130–147CrossRef Moskowitz DS, Zuroff DC (2005) Robust predictors of flux, pulse, and spin. J Res Pers 39:130–147CrossRef
Zurück zum Zitat Murphy CA (2012) The role of perception in age estimation. In: Digital forensics and cyber crime: third international ICST conference, Berlin, Heidelberg, pp 1–16 Murphy CA (2012) The role of perception in age estimation. In: Digital forensics and cyber crime: third international ICST conference, Berlin, Heidelberg, pp 1–16
Zurück zum Zitat Navarro G (2001) A guided tour to approximate string matching. ACM Comput Surv 33(1):31–88CrossRef Navarro G (2001) A guided tour to approximate string matching. ACM Comput Surv 33(1):31–88CrossRef
Zurück zum Zitat Orebaugh A, Allnutt J (2010) Data mining instant messaging communications to perform author identification for cybercrime investigations. In: Digital forensics and cyber crime: first international ICST conference, Berlin, Heidelberg, pp 99–110 Orebaugh A, Allnutt J (2010) Data mining instant messaging communications to perform author identification for cybercrime investigations. In: Digital forensics and cyber crime: first international ICST conference, Berlin, Heidelberg, pp 99–110
Zurück zum Zitat Orebaugh A, Allnutt J (2009) Classification of instant messaging communications for forensics analysis. Int J Forensic Comput Sci 1:22–28CrossRef Orebaugh A, Allnutt J (2009) Classification of instant messaging communications for forensics analysis. Int J Forensic Comput Sci 1:22–28CrossRef
Zurück zum Zitat Ortega FJ, Troyano JA, Cruz FL, Vallejo CG, EnríQuez F (2012) Propagation of trust and distrust for the detection of trolls in a social network. Comput Netw 56(12):2884–2895CrossRef Ortega FJ, Troyano JA, Cruz FL, Vallejo CG, EnríQuez F (2012) Propagation of trust and distrust for the detection of trolls in a social network. Comput Netw 56(12):2884–2895CrossRef
Zurück zum Zitat Otte E, Rousseau R (2002) Social network analysis: a powerful strategy, also for the information sciences. J Inf Sci 28(6):441–453CrossRef Otte E, Rousseau R (2002) Social network analysis: a powerful strategy, also for the information sciences. J Inf Sci 28(6):441–453CrossRef
Zurück zum Zitat Ozel B (2012) Link and node analysis of gender based collaborations in Turkish social sciences. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM 2012), pp 15–19 Ozel B (2012) Link and node analysis of gender based collaborations in Turkish social sciences. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM 2012), pp 15–19
Zurück zum Zitat Paradesi S, Seneviratne O, Kagal L (2012) Policy aware social miner. In: 2012 IEEE symposium on security and privacy workshops (SPW), pp 53–59 Paradesi S, Seneviratne O, Kagal L (2012) Policy aware social miner. In: 2012 IEEE symposium on security and privacy workshops (SPW), pp 53–59
Zurück zum Zitat Peersman C, Daelemans W, Van Vaerenbergh L (2011) Predicting age and gender in online social networks. In: Proceedings of the 3rd international workshop on search and mining user-generated contents. SMUC ’11ACM, New York, NY, USA, pp 37–44 Peersman C, Daelemans W, Van Vaerenbergh L (2011) Predicting age and gender in online social networks. In: Proceedings of the 3rd international workshop on search and mining user-generated contents. SMUC ’11ACM, New York, NY, USA, pp 37–44
Zurück zum Zitat Peled O, Fire M, Rokach L, Elovici Y (2013) Entity matching in online social networks. In: 2013 international conference on social computing (SocialCom), pp 339–344 Peled O, Fire M, Rokach L, Elovici Y (2013) Entity matching in online social networks. In: 2013 international conference on social computing (SocialCom), pp 339–344
Zurück zum Zitat Quercia D, Kosinski M, Stillwell D, Crowcroft J (2011) Our twitter profiles, our selves: predicting personality with twitter. In: Privacy, security, risk and trust (PASSAT) and 2011 IEEE third international conference on social computing (SocialCom), pp 180–185 Quercia D, Kosinski M, Stillwell D, Crowcroft J (2011) Our twitter profiles, our selves: predicting personality with twitter. In: Privacy, security, risk and trust (PASSAT) and 2011 IEEE third international conference on social computing (SocialCom), pp 180–185
Zurück zum Zitat Raghavan S (2013) Digital forensic research: current state of the art. CSI Trans ICT 1(1):91–114CrossRef Raghavan S (2013) Digital forensic research: current state of the art. CSI Trans ICT 1(1):91–114CrossRef
Zurück zum Zitat Rodriguez JJ, Kuncheva LI, Alonso CJ (2006) Rotation forest: a new classifier ensemble method. IEEE Trans Pattern Anal Mach Intell 28(10):1619–1630CrossRef Rodriguez JJ, Kuncheva LI, Alonso CJ (2006) Rotation forest: a new classifier ensemble method. IEEE Trans Pattern Anal Mach Intell 28(10):1619–1630CrossRef
Zurück zum Zitat Sakakura Y, Amagasa T, Kitagawa H (2012) Detecting social bookmark spams using multiple user accounts. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM 2012), pp 1153–1158 Sakakura Y, Amagasa T, Kitagawa H (2012) Detecting social bookmark spams using multiple user accounts. In: Proceedings of the 2012 international conference on advances in social networks analysis and mining (ASONAM 2012), pp 1153–1158
Zurück zum Zitat Savage D, Zhang X, Yu X, Chou P, Wang Q (2014) Anomaly detection in online social networks. Soc Netw 39:62–70CrossRef Savage D, Zhang X, Yu X, Chou P, Wang Q (2014) Anomaly detection in online social networks. Soc Netw 39:62–70CrossRef
Zurück zum Zitat Sayaf R, Rule J, Clarke D (2013) Can users control their data in social software? An ethical analysis of control systems. In: 2013 IEEE security and privacy workshops (SPW), pp 1–4 Sayaf R, Rule J, Clarke D (2013) Can users control their data in social software? An ethical analysis of control systems. In: 2013 IEEE security and privacy workshops (SPW), pp 1–4
Zurück zum Zitat Selwyn N (2007) screw blackboard... do it on facebook!: an investigation of students educational use of facebook. Ponencia. En: Poke Selwyn N (2007) screw blackboard... do it on facebook!: an investigation of students educational use of facebook. Ponencia. En: Poke
Zurück zum Zitat Serdyukov P, Murdock V, van Zwol R (2009) Placing flickr photos on a map. In: Proceedings of the 32rd international ACM SIGIR conference on research and development in information retrieval. SIGIR ’09ACM, New York, NY, USA, pp 484–491 Serdyukov P, Murdock V, van Zwol R (2009) Placing flickr photos on a map. In: Proceedings of the 32rd international ACM SIGIR conference on research and development in information retrieval. SIGIR ’09ACM, New York, NY, USA, pp 484–491
Zurück zum Zitat Song HJ, Son JW, Park SB (2013) Identifying user attributes through non-i.i.d. multi-instance learning. Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining. ASONAM ’13ACM, New York, NY, USA, pp 1467–1468 Song HJ, Son JW, Park SB (2013) Identifying user attributes through non-i.i.d. multi-instance learning. Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining. ASONAM ’13ACM, New York, NY, USA, pp 1467–1468
Zurück zum Zitat Squicciarini A, Griffin C (2014) Why and how to deceive: game results with sociological evidence. Soc Netw Anal Min 4(1):1–13CrossRef Squicciarini A, Griffin C (2014) Why and how to deceive: game results with sociological evidence. Soc Netw Anal Min 4(1):1–13CrossRef
Zurück zum Zitat Stafford G, Yu L (2013) An evaluation of the effect of spam on twitter trending topics. In: 2013 international conference on social computing (SocialCom), pp 373–378 Stafford G, Yu L (2013) An evaluation of the effect of spam on twitter trending topics. In: 2013 international conference on social computing (SocialCom), pp 373–378
Zurück zum Zitat Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of the 26th annual computer security applications conference. ACSAC ’10ACM, New York, NY, USA, pp 1–9 Stringhini G, Kruegel C, Vigna G (2010) Detecting spammers on social networks. In: Proceedings of the 26th annual computer security applications conference. ACSAC ’10ACM, New York, NY, USA, pp 1–9
Zurück zum Zitat Tagarelli A, Interdonato R (2013) who’s out there? identifying and ranking lurkers in social networks. In: 2013 IEEE/ACM International Conference on advances in social networks analysis and mining (ASONAM), pp 215–222 Tagarelli A, Interdonato R (2013) who’s out there? identifying and ranking lurkers in social networks. In: 2013 IEEE/ACM International Conference on advances in social networks analysis and mining (ASONAM), pp 215–222
Zurück zum Zitat Tamburrini N, Cinnirella M, Jansen VA, Bryden J (2015) Twitter users change word usage according to conversation-partner social identity. Soc Netw 40:84–89CrossRef Tamburrini N, Cinnirella M, Jansen VA, Bryden J (2015) Twitter users change word usage according to conversation-partner social identity. Soc Netw 40:84–89CrossRef
Zurück zum Zitat Teoh KK, Pourshafie T, Balakrishnan, V (2014) A gender lens perspective of the use of social network in higher education in Malaysia and Australia. In: Proceedings of the 2014 international conference on social computing, p 21 Teoh KK, Pourshafie T, Balakrishnan, V (2014) A gender lens perspective of the use of social network in higher education in Malaysia and Australia. In: Proceedings of the 2014 international conference on social computing, p 21
Zurück zum Zitat Van Laere O, Schockaert S, Dhoedt B (2011) Finding locations of flickr resources using language models and similarity search. In: Proceedings of the 1st ACM international conference on multimedia retrieval, ICMR ’11, vol 8. ACM, New York, NY, USA, pp 48:1–48 Van Laere O, Schockaert S, Dhoedt B (2011) Finding locations of flickr resources using language models and similarity search. In: Proceedings of the 1st ACM international conference on multimedia retrieval, ICMR ’11, vol 8. ACM, New York, NY, USA, pp 48:1–48
Zurück zum Zitat Vosecky J, Hong D, Shen V (2009) User identification across multiple social networks. In: First international conference on networked digital technologies, NDT ’09, pp 360–365 Vosecky J, Hong D, Shen V (2009) User identification across multiple social networks. In: First international conference on networked digital technologies, NDT ’09, pp 360–365
Zurück zum Zitat Wagner C, Asur S, Hailpern J (2013) Religious politicians and creative photographers: automatic user categorization in twitter. In: Proceedings of the 2013 international conference on social computing. SOCIALCOM ’13IEEE Computer Society, Washington, DC, USA, pp 303–310 Wagner C, Asur S, Hailpern J (2013) Religious politicians and creative photographers: automatic user categorization in twitter. In: Proceedings of the 2013 international conference on social computing. SOCIALCOM ’13IEEE Computer Society, Washington, DC, USA, pp 303–310
Zurück zum Zitat Wang D, Irani D, Pu C (2014) Spade: a social-spam analytics and detection framework. Soc Netw Anal Min 4(1):189CrossRef Wang D, Irani D, Pu C (2014) Spade: a social-spam analytics and detection framework. Soc Netw Anal Min 4(1):189CrossRef
Zurück zum Zitat Wang Y, Nepali RK (2013) Privacy measurement for social network actor model. In: 2013 international conference on social computing (SocialCom), pp 659–664 Wang Y, Nepali RK (2013) Privacy measurement for social network actor model. In: 2013 international conference on social computing (SocialCom), pp 659–664
Zurück zum Zitat Wash R, Rader E (2011) Influencing mental models of security: a research agenda. In: Proceedings of the 2011 workshop on new security paradigms workshop. NSPW ’11ACM, New York, NY, USA, pp 57–66 Wash R, Rader E (2011) Influencing mental models of security: a research agenda. In: Proceedings of the 2011 workshop on new security paradigms workshop. NSPW ’11ACM, New York, NY, USA, pp 57–66
Zurück zum Zitat Winkler WE (1990) String comparator metrics and enhanced decision rules in the Fellegi–Sunter model of record linkage. In: Proceedings of the section on survey research methods. American Statistical Association, pp 354–359 Winkler WE (1990) String comparator metrics and enhanced decision rules in the Fellegi–Sunter model of record linkage. In: Proceedings of the section on survey research methods. American Statistical Association, pp 354–359
Zurück zum Zitat Yang C, Zhang J, Gu G (2014) A taste of tweets: reverse engineering twitter spammers. In: Proceedings of the 30th annual computer security applications conference. ACSAC ’14ACM, New York, NY, USA, pp 86–95 Yang C, Zhang J, Gu G (2014) A taste of tweets: reverse engineering twitter spammers. In: Proceedings of the 30th annual computer security applications conference. ACSAC ’14ACM, New York, NY, USA, pp 86–95
Zurück zum Zitat Zangerle E, Specht G (2014) Sorry, I was hacked: a classification of compromised twitter accounts. In: Proceedings of the 29th annual ACM symposium on applied computing. SAC ’14ACM, New York, NY, USA, pp 587–593 Zangerle E, Specht G (2014) Sorry, I was hacked: a classification of compromised twitter accounts. In: Proceedings of the 29th annual ACM symposium on applied computing. SAC ’14ACM, New York, NY, USA, pp 587–593
Zurück zum Zitat Zheng J, Liu S, Ni L (2014) User characterization from geographic topic analysis in online social media. In: 2014 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 464–471 Zheng J, Liu S, Ni L (2014) User characterization from geographic topic analysis in online social media. In: 2014 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 464–471
Metadaten
Titel
User characterization for online social networks
verfasst von
Tayfun Tuna
Esra Akbas
Ahmet Aksoy
Muhammed Abdullah Canbaz
Umit Karabiyik
Bilal Gonen
Ramazan Aygun
Publikationsdatum
01.12.2016
Verlag
Springer Vienna
Erschienen in
Social Network Analysis and Mining / Ausgabe 1/2016
Print ISSN: 1869-5450
Elektronische ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-016-0412-3

Weitere Artikel der Ausgabe 1/2016

Social Network Analysis and Mining 1/2016 Zur Ausgabe