Mining Lurkers in Online Social Networks

Principles, Models, and Computational Methods
 
 
Springer (Verlag)
  • erschienen am 9. November 2018
  • |
  • VI, 93 Seiten
 
E-Book | PDF mit Wasserzeichen-DRM | Systemvoraussetzungen
978-3-030-00229-9 (ISBN)
 

This SpringerBrief brings order to the wealth of research studies that contribute to shape our understanding of on-line social networks (OSNs) lurking phenomena. This brief also drives the development of computational approaches that can be effectively applied to answer questions related to lurking behaviors, as well as to the engagement of lurkers in OSNs.

All large-scale online social networks (OSNs) are characterized by a participation inequality principle, i.e., the crowd of an OSN does not actively contribute, rather it takes on a silent role. Silent users are also referred to as lurkers, since they gain benefit from others' information without significantly giving back to the community. Nevertheless, lurkers acquire knowledge from the OSN, therefore a major goal is to encourage them to more actively participate.

Lurking behavior analysis has been long studied in social science and human-computer interaction fields, but it has also matured over the last few years in social network analysis and mining.

While the main target audience corresponds to computer, network, and web data scientists, this brief might also help increase the visibility of the topic by bridging different closely related research fields. Practitioners, researchers and students interested in social networks, web search, data mining, computational social science and human-computer interaction will also find this brief useful research material .


1st ed. 2018
  • Englisch
  • Cham
  • |
  • Schweiz
Springer International Publishing
  • 1 s/w Abbildung, 9 farbige Abbildungen
  • |
  • 1 schwarz-weiße und 9 farbige Abbildungen, Bibliographie
  • 3,03 MB
978-3-030-00229-9 (9783030002299)
10.1007/978-3-030-00229-9
weitere Ausgaben werden ermittelt
  • Intro
  • Contents
  • 1 Introduction
  • 1.1 Organization of This Brief
  • 1.2 Audience and Scope
  • 1.3 Thanks
  • References
  • 2 Background
  • 2.1 Perception of Lurking
  • 2.2 How to Identify Lurkers?
  • 2.3 Why Do Lurkers Act?
  • 2.4 How to Promote Delurking?
  • 2.5 Lurking as a Computational Problem
  • References
  • 3 Characterization and Ranking of Lurkers
  • 3.1 Topology-Driven Lurking Definition
  • 3.2 The LurkerRank Family of Ranking Algorithms
  • 3.3 Time-Aware LurkerRank Algorithms
  • 3.3.1 Freshness and Activity Trend
  • 3.3.2 Time-Static LurkerRank
  • 3.3.3 Time-Evolving LurkerRank
  • 3.4 Learning to Rank Lurkers
  • References
  • 4 Lurking Behavior Analysis
  • 4.1 Significance and Effectiveness of LurkerRank
  • 4.2 Do Lurkers Match Inactive Users?
  • 4.3 Do Lurkers Match Newcomers?
  • 4.4 How Frequently Do Lurkers Respond to Others' Actions?
  • 4.5 Do Lurkers Create Preferential Relations with Active Users?
  • 4.6 How Do Lurking Trends Evolve?
  • 4.7 How Do Topical Interests of Lurkers Evolve?
  • References
  • 5 Pervasiveness of the Notion of Lurking in OSNs
  • 5.1 Lurking and Collaboration Networks
  • 5.1.1 Vicarious-Learning-Oriented RCNs
  • 5.1.2 The VLRank Method
  • 5.2 Lurking and Trust Contexts
  • 5.2.1 TrustRank-Biased LurkerRank
  • 5.2.2 Lurking and Trustworthiness in Ranking Problems
  • 5.2.3 Lurking and Data Privacy Preservation
  • References
  • 6 Delurking
  • 6.1 User Engagement in Online Social Networks
  • 6.2 Self-Delurking Randomization
  • 6.3 Delurking and Influence Propagation
  • 6.3.1 Information Diffusion and Influence Maximization
  • 6.3.2 Delurking-Oriented Targeted Influence Maximization
  • 6.3.3 Community-Based Delurking
  • 6.3.4 Diversity-Aware Delurking
  • 6.3.4.1 Diversity in Information Spreading
  • 6.3.4.2 Diversity-Integrated Targeted Influence Maximization
  • References
  • 7 Boundary Spanning Lurking
  • 7.1 Lurkers Across Communities
  • 7.1.1 Across-Community Boundary Spanning vs. Within-Community Centrality
  • 7.1.2 Lurkers vs. Community-Based Bridge Users
  • 7.2 Cross-OSN Analysis of Alternate Behaviors of Lurking and Active Participation
  • 7.2.1 Multilayer Network Model
  • 7.2.2 Multilayer LurkerRank
  • 7.2.3 Multilayer Alternate Lurker-Contributor Ranking
  • References
  • 8 Bringing Lurking in Game Theory
  • 8.1 The Lurker Game
  • 8.1.1 Basic Dynamics
  • 8.1.2 Mean Field Analysis
  • 8.1.3 Rewarding Mechanisms
  • 8.2 Lurker Game on Networks
  • References
  • 9 Concluding Remarks and Challenges
  • 9.1 Modeling Lurking Behaviors Through Latent Interactions
  • 9.2 Emotion-Driven Analysis of Lurkers
  • 9.3 Psycho-Sociological Influences on Lurkers
  • 9.4 Dis/Misinformation, Fake News, and Lurkers
  • References

Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie die kostenlose App Adobe Digital Editions oder eine andere Lese-App für E-Books (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein "weicher" Kopierschutz verwendet. Daher ist technisch zwar alles möglich - sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

55,92 €
inkl. 19% MwSt.
Download / Einzel-Lizenz
E-Book bestellen