scholarly journals The bottom-up formation and maintenance of a Twitter community

2015 ◽  
Vol 115 (4) ◽  
pp. 612-624 ◽  
Author(s):  
Eugene Ch'ng

Purpose – The purpose of this paper is to explore the formation, maintenance and disintegration of a fringe Twitter community in order to understand if offline community structure applies to online communities. Design/methodology/approach – The research adopted Big Data methodological approaches in tracking user-generated contents over a series of months and mapped online Twitter interactions as a multimodal, longitudinal “social information landscape”. Centrality measures were employed to gauge the importance of particular user nodes within the complete network and time-series analysis were used to track ego centralities in order to see if this particular online communities were maintained by specific egos. Findings – The case study shows that communities with distinct boundaries and memberships can form and exist within Twitter’s limited user content and sequential policies, which unlike other social media services, do not support formal groups, demonstrating the resilience of desperate online users when their ideology overcome social media limitations. Analysis in this paper using social networks approaches also reveals that communities are formed and maintained from the bottom-up. Research limitations/implications – The research data is based on a particular data set which occurred within a specific time and space. However, due to the rapid, polarising group behaviour, growth, disintegration and decline of the online community, the data set presents a “laboratory” case from which many other online community can be compared with. It is highly possible that the case can be generalised to a broader range of communities and from which online community theories can be proved/disproved. Practical implications – The paper showed that particular group of egos with high activities, if removed, could entirely break the cohesiveness of the community. Conversely, strengthening such egos will reinforce the community strength. The questions mooted within the paper and the methodology outlined can potentially be applied in a variety of social science research areas. The contribution to the understanding of a complex social and political arena, as outlined in the paper, is a key example of such an application within an increasingly strategic research area – and this will surely be applied and developed further by the computer science and security community. Originality/value – The majority of researches that cover these domains have not focused on communities that are multimodal and longitudinal. This is mainly due to the challenges associated with the collection and analysis of continuous data sets that have high volume and velocity. Such data sets are therefore unexploited with regards to cyber-community research.

2020 ◽  
Author(s):  
RW Helms ◽  
W Ai ◽  
Jocelyn Cranefield

Online communities offer many potential sources of value to individuals and organisations. However, the effectiveness of online communities in delivering benefits such as knowledge sharing depends on the network of social relations within a community. Research in this area aims to understand and optimize such networks. Researchers in this area employ diverse network creation methods, with little focus on the selection process, the fit of the selected method, or its relative accuracy. In this study we evaluate and compare the performance of four network creation methods. First we review the literature to identify four network creation methods (algorithms) and their underlying assumptions. Using several data sets from an online community we test and compare the accuracy of each method against a baseline ('actual') network determined by content analysis. We use visual inspection, network correlation analysis and sensitivity analysis to highlight similarities and differences between the methods, and find some differences significant enough to impact study results. Based on our observations we argue for more careful selection of network creation methods. We propose two key guidelines for research into social networks that uses unstructured data from online communities. The study contributes to the rigour of methodological decisions underpinning research in this area.


2015 ◽  
Vol 115 (4) ◽  
pp. 661-677 ◽  
Author(s):  
Seung Ik Baek ◽  
Young Min Kim

Purpose – The purpose of this paper is to explore the dynamics of an online community by examining its participants’ centrality measures: degree, closeness, and the betweenness centrality. Each centrality measure shows the different roles and positions of an individual participant within an online community. To be specific, this research examines how an individual participant’s role and position affects her/his information sharing activities within an online community over time. Additionally, it investigates the differences between two different online communities (a personal interest focussed community and a social interest focussed community), in terms of the interaction patterns of participants. Design/methodology/approach – For this research, the authors collected log files from Korean online discussion communities (café.naver.com) using a crawler program. A social network analysis was used to explore the interaction patterns of participants and calculate the centrality measures of individual participants. Time series cross-sectional analysis was used to analyze the effects of the roles and the positions on their information sharing activities in a longitudinal setting. Findings – The results of this research showed that all three centrality measures of an individual participant in previous time periods positively influenced his/her information sharing activity in the current periods. In addition, this research found that, depending on the nature of the discussion issues, the participants showed different interaction patterns. Throughout this research, the authors explored the interaction patterns of individual participants by using a network variable, the centrality, within a large online community, and found that the interaction patterns provided strong impact on their information sharing activities in the following months. Research limitations/implications – To investigate the changes of participant’s behaviors, this study simply relies on the numbers of comments received and posted without considering the contents of the comments. Future studies might need to analyze the contents of the comments exchanged between participants, as well as the social network among participants. Practical implications – Online communities have developed to take a more active role in inviting public opinions and promoting discussion about various socio-economic issues. Governments and companies need to understand the dynamics which are created by the interactions among many participants. This study offers them a framework for analyzing the dynamics of large online communities. Furthermore, it helps them to respond to online communities in the right way and in the right time. Social implications – Online communities do not merely function as a platform for the free exchange and sharing of personal information and knowledge, but also as a social network that exerts massive influence in various parts of society including politics, economy, and culture. Now online communities become playing an important role in our society. By examining communication or interaction behaviors of individual participants, this study tries to understand how the online communities are evolved over time. Originality/value – In the area of online communities, many previous studies have relied on the subjective data, like participant’s perception data, in a particular time by using survey or interview. However, this study explores the dynamics of online communities by analyzing the vast amount of data accumulated in online communities.


2019 ◽  
Vol 28 (2) ◽  
pp. 188-199 ◽  
Author(s):  
Laurence Dessart ◽  
Maureen Duclou

PurposeThis paper aims to determine the impact of online community participation on attitudes and product-related behaviour in the health and fitness sector.Design/methodology/approachSurvey data are collected from 221 users of the social medium Instagram, members of the self-proclaimed health and fitness community (#fitfam). Data are analysed with structural equation modelling.FindingsThe study shows that online community identification and engagement significantly increase health environment sensitivity, resulting in heightened engagement in physical fitness and healthy product choices.Social implicationsGiven the difficulty to remain engaged in pro-health behaviour and the growing impact of social media on young adults’ lives, these findings are encouraging. They show that online health and fitness communities provide a supportive environment in which consumers can identify and freely engage and a fertile ground to the development of health sensitivity and product-related behaviour.Originality/valueThe study advances knowledge on the role of social media and online communities in promoting health and fitness product behaviours and attitudes.


2020 ◽  
Author(s):  
RW Helms ◽  
W Ai ◽  
Jocelyn Cranefield

Online communities offer many potential sources of value to individuals and organisations. However, the effectiveness of online communities in delivering benefits such as knowledge sharing depends on the network of social relations within a community. Research in this area aims to understand and optimize such networks. Researchers in this area employ diverse network creation methods, with little focus on the selection process, the fit of the selected method, or its relative accuracy. In this study we evaluate and compare the performance of four network creation methods. First we review the literature to identify four network creation methods (algorithms) and their underlying assumptions. Using several data sets from an online community we test and compare the accuracy of each method against a baseline ('actual') network determined by content analysis. We use visual inspection, network correlation analysis and sensitivity analysis to highlight similarities and differences between the methods, and find some differences significant enough to impact study results. Based on our observations we argue for more careful selection of network creation methods. We propose two key guidelines for research into social networks that uses unstructured data from online communities. The study contributes to the rigour of methodological decisions underpinning research in this area.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Yahya Albalawi ◽  
Jim Buckley ◽  
Nikola S. Nikolov

AbstractThis paper presents a comprehensive evaluation of data pre-processing and word embedding techniques in the context of Arabic document classification in the domain of health-related communication on social media. We evaluate 26 text pre-processings applied to Arabic tweets within the process of training a classifier to identify health-related tweets. For this task we use the (traditional) machine learning classifiers KNN, SVM, Multinomial NB and Logistic Regression. Furthermore, we report experimental results with the deep learning architectures BLSTM and CNN for the same text classification problem. Since word embeddings are more typically used as the input layer in deep networks, in the deep learning experiments we evaluate several state-of-the-art pre-trained word embeddings with the same text pre-processing applied. To achieve these goals, we use two data sets: one for both training and testing, and another for testing the generality of our models only. Our results point to the conclusion that only four out of the 26 pre-processings improve the classification accuracy significantly. For the first data set of Arabic tweets, we found that Mazajak CBOW pre-trained word embeddings as the input to a BLSTM deep network led to the most accurate classifier with F1 score of 89.7%. For the second data set, Mazajak Skip-Gram pre-trained word embeddings as the input to BLSTM led to the most accurate model with F1 score of 75.2% and accuracy of 90.7% compared to F1 score of 90.8% achieved by Mazajak CBOW for the same architecture but with lower accuracy of 70.89%. Our results also show that the performance of the best of the traditional classifier we trained is comparable to the deep learning methods on the first dataset, but significantly worse on the second dataset.


2015 ◽  
Vol 10 (3) ◽  
pp. 360-374 ◽  
Author(s):  
Androniki Kavoura ◽  
Aikaterini Stavrianeas

Purpose – The purpose of this paper is to examine visitors’ perceptions and relevant importance of social media when choosing a Mediterranean destination and also to explore the extent in which they believe it is important for them to belong to an online community with shared characteristics among its members. Design/methodology/approach – A stratified, based on nationality and gender, sample of 301 respondents of foreign arrivals of visitors in the Athens airport, Greece was collected in June and July 2014 based on the official Athens Airport Authorities Arrival Research. This is a partially exploratory research. Findings – Differences between age groups as far as the importance attributed to social media as sources of information about a tourism destination were found. The respondents, when using the internet for gathering information about a tourism Mediterranean destination, consider different online channels. Facebook is among the most important sources of information for them associated with the tourism destinations. Official web sites/blogs of the destination are the first source and photo sharing sites are the second most preferred source; sharing aesthetics of photos was found to contribute to the feeling of belonging to an on line travel community. Research limitations/implications – Further research will contribute to the development of greater understanding of the strategic approaches to social media and their use to promote a destination. Greek diaspora would be interesting to examine and geographical differences among groups. Practical implications – The paper denotes the importance for destination management organizations and companies, to fully employ the social media in their marketing efforts. Originality/value – The present study increases our understanding of the adoption of online and traditional communications in the visitor’s process for Athens, Greece, shedding light to the literature existing on the significance attributed to the online travel community belonging from visitors through sharing aesthetics of photos and associations of ideas based on age differences.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Tressy Thomas ◽  
Enayat Rajabi

PurposeThe primary aim of this study is to review the studies from different dimensions including type of methods, experimentation setup and evaluation metrics used in the novel approaches proposed for data imputation, particularly in the machine learning (ML) area. This ultimately provides an understanding about how well the proposed framework is evaluated and what type and ratio of missingness are addressed in the proposals. The review questions in this study are (1) what are the ML-based imputation methods studied and proposed during 2010–2020? (2) How the experimentation setup, characteristics of data sets and missingness are employed in these studies? (3) What metrics were used for the evaluation of imputation method?Design/methodology/approachThe review process went through the standard identification, screening and selection process. The initial search on electronic databases for missing value imputation (MVI) based on ML algorithms returned a large number of papers totaling at 2,883. Most of the papers at this stage were not exactly an MVI technique relevant to this study. The literature reviews are first scanned in the title for relevancy, and 306 literature reviews were identified as appropriate. Upon reviewing the abstract text, 151 literature reviews that are not eligible for this study are dropped. This resulted in 155 research papers suitable for full-text review. From this, 117 papers are used in assessment of the review questions.FindingsThis study shows that clustering- and instance-based algorithms are the most proposed MVI methods. Percentage of correct prediction (PCP) and root mean square error (RMSE) are most used evaluation metrics in these studies. For experimentation, majority of the studies sourced the data sets from publicly available data set repositories. A common approach is that the complete data set is set as baseline to evaluate the effectiveness of imputation on the test data sets with artificially induced missingness. The data set size and missingness ratio varied across the experimentations, while missing datatype and mechanism are pertaining to the capability of imputation. Computational expense is a concern, and experimentation using large data sets appears to be a challenge.Originality/valueIt is understood from the review that there is no single universal solution to missing data problem. Variants of ML approaches work well with the missingness based on the characteristics of the data set. Most of the methods reviewed lack generalization with regard to applicability. Another concern related to applicability is the complexity of the formulation and implementation of the algorithm. Imputations based on k-nearest neighbors (kNN) and clustering algorithms which are simple and easy to implement make it popular across various domains.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jiawei Lian ◽  
Junhong He ◽  
Yun Niu ◽  
Tianze Wang

Purpose The current popular image processing technologies based on convolutional neural network have the characteristics of large computation, high storage cost and low accuracy for tiny defect detection, which is contrary to the high real-time and accuracy, limited computing resources and storage required by industrial applications. Therefore, an improved YOLOv4 named as YOLOv4-Defect is proposed aim to solve the above problems. Design/methodology/approach On the one hand, this study performs multi-dimensional compression processing on the feature extraction network of YOLOv4 to simplify the model and improve the feature extraction ability of the model through knowledge distillation. On the other hand, a prediction scale with more detailed receptive field is added to optimize the model structure, which can improve the detection performance for tiny defects. Findings The effectiveness of the method is verified by public data sets NEU-CLS and DAGM 2007, and the steel ingot data set collected in the actual industrial field. The experimental results demonstrated that the proposed YOLOv4-Defect method can greatly improve the recognition efficiency and accuracy and reduce the size and computation consumption of the model. Originality/value This paper proposed an improved YOLOv4 named as YOLOv4-Defect for the detection of surface defect, which is conducive to application in various industrial scenarios with limited storage and computing resources, and meets the requirements of high real-time and precision.


2019 ◽  
Vol 43 (1) ◽  
pp. 53-71 ◽  
Author(s):  
Ahmed Al-Rawi ◽  
Jacob Groshek ◽  
Li Zhang

PurposeThe purpose of this paper is to examine one of the largest data sets on the hashtag use of #fakenews that comprises over 14m tweets sent by more than 2.4m users.Design/methodology/approachTweets referencing the hashtag (#fakenews) were collected for a period of over one year from January 3 to May 7 of 2018. Bot detection tools were employed, and the most retweeted posts, most mentions and most hashtags as well as the top 50 most active users in terms of the frequency of their tweets were analyzed.FindingsThe majority of the top 50 Twitter users are more likely to be automated bots, while certain users’ posts like that are sent by President Donald Trump dominate the most retweeted posts that always associate mainstream media with fake news. The most used words and hashtags show that major news organizations are frequently referenced with a focus on CNN that is often mentioned in negative ways.Research limitations/implicationsThe research study is limited to the examination of Twitter data, while ethnographic methods like interviews or surveys are further needed to complement these findings. Though the data reported here do not prove direct effects, the implications of the research provide a vital framework for assessing and diagnosing the networked spammers and main actors that have been pivotal in shaping discourses around fake news on social media. These discourses, which are sometimes assisted by bots, can create a potential influence on audiences and their trust in mainstream media and understanding of what fake news is.Originality/valueThis paper offers results on one of the first empirical research studies on the propagation of fake news discourse on social media by shedding light on the most active Twitter users who discuss and mention the term “#fakenews” in connection to other news organizations, parties and related figures.


2012 ◽  
Vol 7 (1) ◽  
pp. 174-197 ◽  
Author(s):  
Heather Small ◽  
Kristine Kasianovitz ◽  
Ronald Blanford ◽  
Ina Celaya

Social networking sites and other social media have enabled new forms of collaborative communication and participation for users, and created additional value as rich data sets for research. Research based on accessing, mining, and analyzing social media data has risen steadily over the last several years and is increasingly multidisciplinary; researchers from the social sciences, humanities, computer science and other domains have used social media data as the basis of their studies. The broad use of this form of data has implications for how curators address preservation, access and reuse for an audience with divergent disciplinary norms related to privacy, ownership, authenticity and reliability.In this paper, we explore how the characteristics of the Twitter platform, coupled with an ambiguous and evolving understanding of privacy in networked communication, and divergent disciplinary understandings of the resulting data, combine to create complex issues for curators trying to ensure broad-based and ethical reuse of Twitter data. We provide a case study of a specific data set to illustrate how data curators can engage with the topics and questions raised in the paper. While some initial suggestions are offered to librarians and other information professionals who are beginning to receive social media data from researchers, our larger goal is to stimulate discussion and prompt additional research on the curation and preservation of social media data.


Sign in / Sign up

Export Citation Format

Share Document