What Will Be Popular Next? Predicting Hotspots in Two-Mode Social Networks

MIS Quarterly ◽  
2021 ◽  
Vol 45 (2) ◽  
pp. 925-966
Author(s):  
Zhepeng (Lionel) Li ◽  
Yong Ge ◽  
Xue Bai

In social networks, social foci are physical or virtual entities around which social individuals organize joint activities, for example, places and products (physical form) or opinions and services (virtual form). Forecasting which social foci will diffuse to more social individuals is important for managerial functions such as marketing and public management operations. In terms of diffusive social adoptions, prior studies on user adoptive behavior in social networks have focused on single-item adoption in homogeneous networks. We advance this body of research by modeling scenarios with multi-item adoption and learning the relative propagation of social foci in concurrent social diffusions for online social networking platforms. In particular, we distinguish two types of social nodes in our two-mode social network model: social foci and social actors. Based on social network theories, we identify and operationalize factors that drive social adoption within the two-mode social network. We also capture the interdependencies between social actors and social foci using a bilateral recursive process—specifically, a mutual reinforcement process that converges to an analytical form. Thus, we develop a gradient learning method based on a mutual reinforcement process that targets the optimal parameter configuration for pairwise ranking of social diffusions. Further, we demonstrate analytical properties of the proposed method such as guaranteed convergence and the convergence rate. In the evaluation, we benchmark the proposed method against prevalent methods, and we demonstrate its superior performance using three real-world data sets that cover the adoption of both physical and virtual entities in online social networking platforms.

2021 ◽  
Author(s):  
Muhammad Luqman Jamil ◽  
Sebastião Pais ◽  
João Cordeiro ◽  
Gaël Dias

Abstract Online social networking platforms allow people to freely express their ideas, opinions, and emotions negatively or positively. Previous studies have examined user’s sentiments on these platforms to study their behaviour in different contexts and purposes. The mechanism of collecting public opinion information has attracted researchers to automatically classify the polarity of public opinions based on the use of concise language in messages, such as tweets, by analyzing social media data. In this paper, we extend the preceding work [1], by proposing an unsupervised approach to automatically detect extreme opinions/posts in social networks. We have evaluated our performance on five different social network and media datasets. In this work, we use the semi-supervised approach BERT to check the accuracy of our classified dataset. The latter task shows that, in these datasets, posts that were previously classified as negative or positive are, in fact, extremely negative or positive in many cases.


2014 ◽  
Vol 8 (3) ◽  
pp. 1411-1413
Author(s):  
Nader Yahya Alkeinay ◽  
Norita Md Norwawi ◽  
Fauziah Abdul Wahid ◽  
Roesnita Ismail ◽  
Najwa Hayaati Mohd Alwi

Social network is term used to refer to the social structure that is made up of a set of social actors. The social actors in this case include organizations or individuals. Social networks allow people to interact and socialize as they get to learn and know each other. Through social networking sites, people from different parts of a country or the world also get to meet and interact. However, there have been issues with regards to social network privacy for those who use the internet to use social network sites. This paper will look at some of the factors that affect trust of the users as well as the privacy issues related to social networks (Fernandez, 2009).


Author(s):  
Manish Kumar

Social Networks are nodes consisting of people, groups and organizations growing dynamically. The growth is horizontal as well as vertical in terms of size and number. Social network analysis has gained success due to online social networking and sharing sites. The accessibility of online social sites such as MySpace, Facebook, Twitter, Hi5, Friendster, SkyRock and Beb offer sharing and maintaining large amount of different data. Social network analysis is focused on mining such data i.e. generating pattern of people’s interaction. The analysis involves the knowledge discovery that helps the sites as well as users in terms of usage and business goals respectively. Further it is desired that the process must be privacy preserving. This chapter describes the various mining techniques applicable on social networks data.


Author(s):  
Wadim Strielkowski

Being a combination of the conference call, talkback radio, audio podcast, and an online video chat, Clubhouse is a new social networking app that gained over 10 million users and over $100 in valuation in just 8 months. Unlike other social networks, it offers a real-time streaming audio chat that does not ask users to share any unnecessary information like exchanging text messages, conducting video calls, or sharing photos. Instead, Clubhouse users can listen to real-time conversations, contribute to these conversations and create their own conversations for the others to listen and to interact with. Often nicknamed a “Silicon Valley’s hottest start-up”, Clubhouse positions itself as an “exclusive” and “alternative” social network that attracts various celebrities and people who just want to talk to each other. Launched in March 2020, amidst the COVID-19 pandemic with its social distancing and lockdowns, Clubhouse offered its users a space for the digital group psychotherapy where people could solve their problems by talking them through with strangers. However, it is unclear what is going to happen to this new social network in the post-pandemic world after all of its hype eventually evaporates. This paper discusses the possible underlying motives for the Clubhouse creation and its real purposes. Moreover, it looks at the three possible scenarios of its further development.


Author(s):  
Vipin K. Nadda ◽  
Sumesh Singh Dadwal ◽  
Dirisa Mulindwa ◽  
Rubina Vieira

Revolutionary development in field of communication and information technology have globally opened new avenue of marketing tourism and hospitality products. Major shift in web usage happened when Napster in 1999 released peer-to-peer share media and then with pioneer social networking websites named ‘Six Degrees'. This kind of interactive social web was named as ‘Web 2.0'. It would create openness, community and interaction. Web2. is also known as Social media base. Social media is incudes “all the different kinds of content that form social networks: posts on blogs or forums, photos, audio, videos, links, profiles on social networking web sites, status updates and more”. It allows people to create; upload post and share content easily and share globally. Social media allows the creation and exchange of user-generated content and experiences online. Thus, social media is any kind of information we share with our social network, using social networking web sites and services.


2011 ◽  
pp. 1286-1297
Author(s):  
Malcolm Shore

This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the evolution of hacking as a form of social networking, from its roots in Bulletin Board systems to the current attacks on Second Life, and considers the motivation for hacking. Ajzen’s Theory of Planned Behavior and Beveren’s Flow Theory model are, when considered together, found to explain many of the observed characteristics of early hacker activity. The place of social networks in motivating hacking is explored, and some observations are made in relation to hacking and the Second Life environment. A number of control variables are identified which can be used to reduce the likelihood of people engaging in the hacking activity. Addressing the social network factors which motivate hacking provides an important early step in addressing cybercrime.


Author(s):  
Justin Henley Beneke

Social networking is often touted as being a prominent application responsible for driving the adoption of residential broadband services. The growth of social networks is phenomenal – in many cases more than doubling in size on an annual basis. This study considers how social networking may be utilized for commercial purposes to spread word-of-mouth communication. The chapter therefore considers the characteristics of young adult social network users, how they behave and interact with other users on such platforms, as well as the manner in which marketers can make the most of this platform without experiencing a consumer backlash. The research suggests that if a symbiotic relationship does indeed exist between broadband proliferation and the adoption of social networking, both have a vested interest in each other’s continued success.


2013 ◽  
Vol 3 (2) ◽  
pp. 22-37
Author(s):  
N. Veerasamy ◽  
W. A. Labuschagne

The use of social network sites has exploded with its multitude of functions which include posting pictures, interests, activities and establishing contacts. However, users may be unaware of the lurking dangers of threats originating from Social Networking Sites (SNS) which include malware or fake profiles. This paper investigates the indicators to arouse suspicion that a social networking account is invalid with a specific focus on Facebook as an illustrative example. The results from a survey on users’ opinions on social networks, is presented in the paper. This helps reveal some of the trust indicators that leads users to ascertaining whether a social networking profile is valid or not. Finally, indicators of potentially deceptive agents and profiles are given as a guideline to help users decide whether they should proceed with interaction with certain contacts.


2019 ◽  
pp. 097215091986886 ◽  
Author(s):  
Ameeta Jaiswal-Dale ◽  
Fanny Simon-Lee ◽  
Giovanna Zanotti ◽  
Peter Cincinelli

The aim of this research is to apply the tool of social network analysis to situations in capital sourcing, including early stage financing. The study is conducted within the social network of Medical Alley Association of Minnesota (MAA). We investigate the correlation between the main centrality measures: closeness, degree and betweenness, and the amount of funding received by the 163 MAA members during 2009–2012. Companies benefit from their social network to get access to better financing. The empirical results also provide a road map to encourage the sponsored or spontaneous growth of other social networks in related fields. Despite the financial crisis, the empirical results show how competition works when firms have established relations with others. Where an intersection occurs is merely an empirical curiosity and the causation resides in the intersection of relations. The relation that intersects on an organization determines the player’s competitive advantage.


Sign in / Sign up

Export Citation Format

Share Document