A hybrid approach for article recommendation in research social networks

2017 ◽  
Vol 44 (5) ◽  
pp. 696-711 ◽  
Author(s):  
Jianshan Sun ◽  
Yuanchun Jiang ◽  
Xusen Cheng ◽  
Wei Du ◽  
Yezheng Liu ◽  
...  

With the prevalence of research social networks, determining effective methods for recommending scientific articles to online scholars has become a challenging and complex task. Current studies on article recommendation works are focused on digital libraries and reference sharing websites while studies on research social networking websites have seldom been conducted. Existing content-based approaches or collaborative filtering approaches suffer from the problem of data sparsity. The quality information of articles has been largely ignored in previous studies, thus raising the need for a unified recommendation framework. We propose a hybrid approach to combine relevance, connectivity and quality to recommend scientific articles. The effectiveness of the proposed framework and methods is verified using a user study on a real research social network website. The results demonstrate that our proposed methods outperform baseline methods.

2018 ◽  
Vol 42 (1) ◽  
pp. 1-16
Author(s):  
Anthoniraj Amalanathan ◽  
Uffe Kock Wiil

Personalization is the process of customizing social network pages of users according to their needs and personal interests. It can also be used for filtering unwanted information from an individual's page received from other users, in case this information is unpleasant or unacceptable. To avoid unwanted information from a particular user in current social networks, the user needs to be denied accessibility by blocking them. However, instead of blocking the user, it would be preferable to have a mechanism that prevents the undesirable content in a user's social network page. Thus, this paper presents a model that determine the emotions shared in the content of a social network page by the user. The model determines the dominant emotions for a period of time and uses these to filter the content using the user's dominant emotions. Using the developed model, a novel system based on item based collaborative filtering process to personalize the user's social network page has been developed. A user study involving 5000 Twitter messages shows that the developed system performs satisfactory with a correctness in the filtering process of 87%.


Author(s):  
Wadim Strielkowski

Being a combination of the conference call, talkback radio, audio podcast, and an online video chat, Clubhouse is a new social networking app that gained over 10 million users and over $100 in valuation in just 8 months. Unlike other social networks, it offers a real-time streaming audio chat that does not ask users to share any unnecessary information like exchanging text messages, conducting video calls, or sharing photos. Instead, Clubhouse users can listen to real-time conversations, contribute to these conversations and create their own conversations for the others to listen and to interact with. Often nicknamed a “Silicon Valley’s hottest start-up”, Clubhouse positions itself as an “exclusive” and “alternative” social network that attracts various celebrities and people who just want to talk to each other. Launched in March 2020, amidst the COVID-19 pandemic with its social distancing and lockdowns, Clubhouse offered its users a space for the digital group psychotherapy where people could solve their problems by talking them through with strangers. However, it is unclear what is going to happen to this new social network in the post-pandemic world after all of its hype eventually evaporates. This paper discusses the possible underlying motives for the Clubhouse creation and its real purposes. Moreover, it looks at the three possible scenarios of its further development.


Author(s):  
Vipin K. Nadda ◽  
Sumesh Singh Dadwal ◽  
Dirisa Mulindwa ◽  
Rubina Vieira

Revolutionary development in field of communication and information technology have globally opened new avenue of marketing tourism and hospitality products. Major shift in web usage happened when Napster in 1999 released peer-to-peer share media and then with pioneer social networking websites named ‘Six Degrees'. This kind of interactive social web was named as ‘Web 2.0'. It would create openness, community and interaction. Web2. is also known as Social media base. Social media is incudes “all the different kinds of content that form social networks: posts on blogs or forums, photos, audio, videos, links, profiles on social networking web sites, status updates and more”. It allows people to create; upload post and share content easily and share globally. Social media allows the creation and exchange of user-generated content and experiences online. Thus, social media is any kind of information we share with our social network, using social networking web sites and services.


2011 ◽  
pp. 1286-1297
Author(s):  
Malcolm Shore

This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the evolution of hacking as a form of social networking, from its roots in Bulletin Board systems to the current attacks on Second Life, and considers the motivation for hacking. Ajzen’s Theory of Planned Behavior and Beveren’s Flow Theory model are, when considered together, found to explain many of the observed characteristics of early hacker activity. The place of social networks in motivating hacking is explored, and some observations are made in relation to hacking and the Second Life environment. A number of control variables are identified which can be used to reduce the likelihood of people engaging in the hacking activity. Addressing the social network factors which motivate hacking provides an important early step in addressing cybercrime.


Author(s):  
Justin Henley Beneke

Social networking is often touted as being a prominent application responsible for driving the adoption of residential broadband services. The growth of social networks is phenomenal – in many cases more than doubling in size on an annual basis. This study considers how social networking may be utilized for commercial purposes to spread word-of-mouth communication. The chapter therefore considers the characteristics of young adult social network users, how they behave and interact with other users on such platforms, as well as the manner in which marketers can make the most of this platform without experiencing a consumer backlash. The research suggests that if a symbiotic relationship does indeed exist between broadband proliferation and the adoption of social networking, both have a vested interest in each other’s continued success.


2013 ◽  
Vol 3 (2) ◽  
pp. 22-37
Author(s):  
N. Veerasamy ◽  
W. A. Labuschagne

The use of social network sites has exploded with its multitude of functions which include posting pictures, interests, activities and establishing contacts. However, users may be unaware of the lurking dangers of threats originating from Social Networking Sites (SNS) which include malware or fake profiles. This paper investigates the indicators to arouse suspicion that a social networking account is invalid with a specific focus on Facebook as an illustrative example. The results from a survey on users’ opinions on social networks, is presented in the paper. This helps reveal some of the trust indicators that leads users to ascertaining whether a social networking profile is valid or not. Finally, indicators of potentially deceptive agents and profiles are given as a guideline to help users decide whether they should proceed with interaction with certain contacts.


2019 ◽  
pp. 097215091986886 ◽  
Author(s):  
Ameeta Jaiswal-Dale ◽  
Fanny Simon-Lee ◽  
Giovanna Zanotti ◽  
Peter Cincinelli

The aim of this research is to apply the tool of social network analysis to situations in capital sourcing, including early stage financing. The study is conducted within the social network of Medical Alley Association of Minnesota (MAA). We investigate the correlation between the main centrality measures: closeness, degree and betweenness, and the amount of funding received by the 163 MAA members during 2009–2012. Companies benefit from their social network to get access to better financing. The empirical results also provide a road map to encourage the sponsored or spontaneous growth of other social networks in related fields. Despite the financial crisis, the empirical results show how competition works when firms have established relations with others. Where an intersection occurs is merely an empirical curiosity and the causation resides in the intersection of relations. The relation that intersects on an organization determines the player’s competitive advantage.


Author(s):  
Ryan Bigge

The media coverage and resultant discourse surrounding social networking sites such as Facebook, MySpace and Friendster contain narratives of inevitability and technological determinism that require careful explication. Borrowing a tactic from the Russian Futurists, this paper attempts to make strange (that is, to defamiliarize) social network sites and their associated discourses by drawing upon an eclectic but interrelated set of metaphors and theoretical approaches, including: the digital enclosure, network sociality, socio-technical capital and Steven Jones’s recent examination of neo-Luddites. Whenever appropriate, this paper will integrate relevant magazine and newspaper journalism about social networking sites.


2019 ◽  
Author(s):  
◽  
Douglas Steiert

In this day and age with the prevalence of smartphones, networking has evolved in an intricate and complex way. With the help of a technology-driven society, the term "social networking" was created and came to mean using media platforms such as Myspace, Facebook, and Twitter to connect and interact with friends, family, or even complete strangers. Websites are created and put online each day, with many of them possessing hidden threats that the average person does not think about. A key feature that was created for vast amount of utility was the use of location-based services, where many websites inform their users that the website will be using the users' locations to enhance the functionality. However, still far too many websites do not inform their users that they may be tracked, or to what degree. In a similar juxtaposed scenario, the evolution of these social networks has allowed countless people to share photos with others online. While this seems harmless at face-value, there may be times in which people share photos of friends or other non-consenting individuals who do not want that picture viewable to anyone at the photo owner's control. There exists a lack of privacy controls for users to precisely de fine how they wish websites to use their location information, and for how others may share images of them online. This dissertation introduces two models that help mitigate these privacy concerns for social network users. MoveWithMe is an Android and iOS application which creates decoys that move locations along with the user in a consistent and semantically secure way. REMIND is the second model that performs rich probability calculations to determine which friends in a social network may pose a risk for privacy breaches when sharing images. Both models have undergone extensive testing to demonstrate their effectiveness and efficiency.


2021 ◽  
Author(s):  
Muhammad Luqman Jamil ◽  
Sebastião Pais ◽  
João Cordeiro ◽  
Gaël Dias

Abstract Online social networking platforms allow people to freely express their ideas, opinions, and emotions negatively or positively. Previous studies have examined user’s sentiments on these platforms to study their behaviour in different contexts and purposes. The mechanism of collecting public opinion information has attracted researchers to automatically classify the polarity of public opinions based on the use of concise language in messages, such as tweets, by analyzing social media data. In this paper, we extend the preceding work [1], by proposing an unsupervised approach to automatically detect extreme opinions/posts in social networks. We have evaluated our performance on five different social network and media datasets. In this work, we use the semi-supervised approach BERT to check the accuracy of our classified dataset. The latter task shows that, in these datasets, posts that were previously classified as negative or positive are, in fact, extremely negative or positive in many cases.


Sign in / Sign up

Export Citation Format

Share Document