skip to main content
column

Mining social media with social theories: a survey

Published:16 June 2014Publication History
Skip Abstract Section

Abstract

The increasing popularity of social media encourages more and more users to participate in various online activities and produces data in an unprecedented rate. Social media data is big, linked, noisy, highly unstructured and in- complete, and differs from data in traditional data mining, which cultivates a new research field - social media mining. Social theories from social sciences are helpful to explain social phenomena. The scale and properties of social media data are very different from these of data social sciences use to develop social theories. As a new type of social data, social media data has a fundamental question - can we apply social theories to social media data? Recent advances in computer science provide necessary computational tools and techniques for us to verify social theories on large-scale social media data. Social theories have been applied to mining social media. In this article, we review some key social theories in mining social media, their verification approaches, interesting findings, and state-of-the-art algorithms. We also discuss some future directions in this active area of mining social media with social theories.

References

  1. E. Agichtein, C. Castillo, D. Donato, A. Gionis, and G. Mishne. Finding high-quality content in social media. In WSDM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Amelio and C. Pizzuti. Community mining in signed networks: a multiobjective approach. In ASONAM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Asur and B. A. Huberman. Predicting the future with social media. In WI-IAT, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic. The role of social networks in information diffusion. In WWW, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A.-L. Barabási and R. Albert. Emergence of scaling in random networks. science, 1999.Google ScholarGoogle Scholar
  6. S. Y. Bhat and M. Abulaish. Community-based features for identifying spammers in online social networks. In ASONAM, pages 100--107. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Bisgin, N. Agarwal, and X. Xu. Investigating homophily in online social networks. In WI-IAT, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Bollen, H. Mao, and X. Zeng. Twitter mood predicts the stock market. Journal of Computational Science, 2(1):1--8, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  9. R. S. Burt. Structural holes: The social structure of competition. Harvard university press, 2009.Google ScholarGoogle Scholar
  10. K.-Y. Chiang, N. Natarajan, A. Tewari, and I. S. Dhillon. Exploiting longer cycles for link prediction in signed networks. In CIKM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. A. Davis. Clustering and structural balance in graphs. Human relations, 1967.Google ScholarGoogle Scholar
  12. P. Domingos. A few useful things to know about machine learning. Communications of the ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. T. DuBois, J. Golbeck, and A. Srinivasan. Predicting trust and distrust in social networks. In socialcom, 2011.Google ScholarGoogle Scholar
  14. H. Gao, J. Tang, and H. Liu. Exploring social-historical ties on location-based social networks. In ICWSM, 2012.Google ScholarGoogle Scholar
  15. L. Getoor and C. P. Diehl. Link mining: a survey. ACM SIGKDD Explorations Newsletter, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Granovetter. The strength of weak ties. JSTOR, 1973.Google ScholarGoogle ScholarCross RefCross Ref
  17. F. Heider. Attitudes and cognitive organization. The Journal of psychology, 1946.Google ScholarGoogle Scholar
  18. C.-J. Hsieh, K.-Y. Chiang, and I. S. Dhillon. Low rank modeling of signed networks. In KDD, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. X. Hu, J. Tang, Y. Zhang, and H. Liu. Social spammerdetection in microblogging. In IJCAI, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. X. Hu, L. Tang, J. Tang, and H. Liu. Exploiting social relations for sentiment analysis in microblogging. In WSDM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. B. Huberman, D. M. Romero, and F. Wu. Social networks that matter: Twitter under the microscope. First Monday, 2008.Google ScholarGoogle Scholar
  22. M. Jamali and M. Ester. A matrix factorization technique with trust propagation for recommendation in social networks. In Recsys, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. D. Jensen and J. Neville. Linkage and autocorrelation cause feature selection bias in relational learning. In ICML, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. I. Kahanda and J. Neville. Using transactional information to predict link strength in online social networks. In ICWSM, 2009.Google ScholarGoogle Scholar
  25. D. Kim, D. Kim, E. Hwang, and S. Rho. Twittertrends: a spatio-temporal trend detection and related keywords recommendation scheme. Multimedia Systems,2014.Google ScholarGoogle Scholar
  26. M. Kosinski, D. Stillwell, and T. Graepel. Private traits and attributes are predictable from digital records of human behavior. PNAS, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  27. J. Leskovec, D. Huttenlocher, and J. Kleinberg. Predicting positive and negative links in online social networks. In WWW, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Leskovec, D. Huttenlocher, and J. Kleinberg. Signed networks in social media. In CHI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. F. Li and M.-H. Hsieh. An empirical study of clustering behavior of spammers and group-based anti-spam strategies. In CEAS, 2006.Google ScholarGoogle Scholar
  30. D. Liben-Nowell and J. Kleinberg. The link-prediction problem for social networks. JASIST, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. H. Liu and H. Motoda. Computational methods of feature selection. CRC Press, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. B. Long, Z. M. Zhang, X. Wu, and P. S. Yu. Spectral clustering for multi-type relational data. In ICML, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. T. Lou and J. Tang. Mining structural hole spanners through information diffusion in social networks. In WWW, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Q. Lu and L. Getoor. Link-based classification. In ICML, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. H. Ma, D. Zhou, C. Liu, M. R. Lyu, and I. King. Recommender systems with social regularization. In WSDM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. A. Macskassy and F. Provost. A simple relational classifier. In MRDM, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  37. S. A. Macskassy and F. Provost. Classification in networked data: A toolkit and a univariate case study. JMLR, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. P. Massa. A survey of trust use and modeling in real online systems. Trust in E-services: Technologies, Practices and Challenges, 2007.Google ScholarGoogle Scholar
  39. P. Massa and P. Avesani. Trust-aware collaborative filtering for recommender systems. In CoopIS, DOA, and ODBASE, 2004.Google ScholarGoogle Scholar
  40. M. McPherson, L. Smith-Lovin, and J. M. Cook. Birds of a feather: Homophily in social networks. Annual review of sociology, 2001.Google ScholarGoogle Scholar
  41. A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You are who you know: inferring user profiles in online social networks. In WSDM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. J. Neville and D. Jensen. Leveraging relational auto-correlation with latent group models. In MRDM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. M. E. Newman and M. Girvan. Finding and evaluating community structure in networks. PRE, 69(2):026113, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  44. S. Papadopoulos, Y. Kompatsiaris, A. Vakali, and P. Spyridonos. Community detection in social media. DMKD, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. R. R. Sinha and K. Swearingen. Comparing recommendations made by online systems and friends. In DELOS, 2001.Google ScholarGoogle Scholar
  46. M. Speriosu, N. Sudan, S. Upadhyay, and J. Baldridge. Twitter polarity classification with label propagation over lexical links and the follower graph. In ULNLP, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. G. Stringhini, C. Kruegel, and G. Vigna. Detecting spammers on social networks. In ACSAC, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. C. Tan, L. Lee, J. Tang, L. Jiang, M. Zhou, and P. Li. User-level sentiment analysis incorporating social networks. In KDD, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. J. Tang, H. Gao, X. Hu, and H. Liu. Exploiting homophily effect for trust prediction. In WSDM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. J. Tang, H. Gao, and H. Liu. mtrust: discerning multi-faceted trust in a connected world. In WSDM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. J. Tang, X. Hu, and H. Liu. Social recommendation: a review. SNAM, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  52. J. Tang and H. Liu. Feature selection with linked data in social media. In SDM, 2012.Google ScholarGoogle Scholar
  53. J. Tang, T. Lou, and J. Kleinberg. Inferring social ties across heterogenous networks. In WSDM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. L. Tang and H. Liu. Relational learning via latent social dimensions. In KDD, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. L. Tang and H. Liu. Community detection and mining in social media. Synthesis Lectures on Data Mining and Knowledge Discovery, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  56. W. Tang, H. Zhuang, and J. Tang. Learning to infer social ties in large networks. In PKDD, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. B. Taskar, P. Abbeel, M.-F.Wong, and D. Koller. Label and link prediction in relational data. In SRL, 2003.Google ScholarGoogle Scholar
  58. V. Traag and J. Bruggeman. Community detection in networks with positive and negative links. PRE, 80(3):036115, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  59. D. Wang, D. Pedreschi, C. Song, F. Giannotti, and A.-L. Barabasi. Human mobility, social ties, and link prediction. In KDD, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. X. Wang, L. Tang, H. Gao, and H. Liu. Discovering overlapping groups in social media. In ICDM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. D. J. Watts. Computational social science: Exciting progress and future directions. Winter Issue of The Bridge on Frontiers of Engineering, 2014.Google ScholarGoogle Scholar
  62. S. Webb, J. Caverlee, and C. Pu. Social honeypots: Making friends with a spammer near you. In CEAS, 2008.Google ScholarGoogle Scholar
  63. J. Weng, E.-P. Lim, J. Jiang, and Q. He. Twitterrank: finding topic-sensitive influential twitterers. In WSDM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. R. Xiang and J. Neville. Collective inference for network data with copula latent markov networks. In WSDM, pages 647--656. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. R. Xiang, J. Neville, and M. Rogati. Modeling relationship strength in online social networks. In WWW, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. X. Xu, N. Yuruk, Z. Feng, and T. A. Schweiger. Scan: a structural clustering algorithm for networks. In KDD, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. J. Yang and J. Leskovec. Modeling information diffusion in implicit networks. In ICDM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. S.-H. Yang, A. J. Smola, B. Long, H. Zha, and Y. Chang. Friend or frenemy?: predicting signed ties in social networks. In SIGIR, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. M. Ye, X. Liu, and W.-C. Lee. Exploring social influence for recommendation: a generative model approach. In SIGIR, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. R. Zafarani, M. A. Abbasi, and H. Liu. Social Media Mining: An Introduction. Cambridge University Press, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. X. Zhang, J. Cheng, T. Yuan, B. Niu, and H. Lu. Toprec: domain-specific recommendation through community topic mining in social network. In WWW, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. S. Zhu, K. Yu, Y. Chi, and Y. Gong. Combining content and link for classification using matrix factorization. In SIGIR, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Y. Zhu, X. Wang, E. Zhong, N. N. Liu, H. Li, and Q. Yang. Discovering spammers in social networks. In AAAI, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. D. Watts, and S, Steven. Collective dynamics of 'small-world' networks. In nature, 1998.Google ScholarGoogle Scholar

Index Terms

  1. Mining social media with social theories: a survey

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image ACM SIGKDD Explorations Newsletter
              ACM SIGKDD Explorations Newsletter  Volume 15, Issue 2
              December 2013
              60 pages
              ISSN:1931-0145
              EISSN:1931-0153
              DOI:10.1145/2641190
              Issue’s Table of Contents

              Copyright © 2014 Authors

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 16 June 2014

              Check for updates

              Qualifiers

              • column

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader