Featured Articles is a section of the Special Technical Community on Social Networks that will shed light to pieces of social network research that are considered interesting and promising. Each month one research article will be selected from the IEEE Computer Society Digital Library to be featured in this section. The content featured here will be curated by Symeon Papadopoulos. Eventually, the featured articles will become freely available from this page.
Abstract: A large part of media shared on online platforms such as Flickr and YouTube is captured at various social events (such as music festivals, exhibitions, and sport events). While it is quite easy to share personal impressions online, it is much more challenging to identify content that is related to the same social event across different platforms. Here, the authors focus on the detection of social events in a data collection from Flickr and YouTube. They propose an unsupervised, multistaged approach that explores commonly available, real-world metadata for the detection and linking of social events across sharing platforms. The proposed methodology and the performed experiments allow for a thorough evaluation of the usefulness of available metadata in the context of social event detection in both single- and cross-platform scenarios. This article is part of a special issue on social multimedia and storytelling.
Michail Tsikerdekis, Sherali Zeadally, "Detecting and Preventing Online Identity Deception in Social Networking Services", IEEE Internet Computing, vol.19, no. 3, pp. 41-49, May-June 2015, doi:10.1109/MIC.2015.21
Abstract: In the past decade social networking services (SNS) flooded the Web. The nature of such sites makes identity deception easy, offering a quick way to set up and manage identities, and then connect with and deceive others. Fighting deception requires a coordinated approach by users and developers to ensure detection and prevention. This article identifies the most prevalent approaches in detecting and preventing identity deception (from both a user's and developer's perspective), evaluating their efficiency, and providing recommendations to help eradicate this issue.
Shitalkumar Halale, G.R. Gangadharan, Lorna Uden, "Enhancing Cocreation Using Social Media", IT Professional, vol.17, no. 2, pp. 40-45, Mar.-Apr. 2015, doi:10.1109/MITP.2015.22
Abstract: Innovation is essential for firms to survive in today's global economy. Cocreation is a strategy where customers and providers participate in the innovation process. Social media is a perfect tool for cocreating value because it promotes communication between the organization and the customer. It's fast becoming an integral part of business operations and has many important uses, including innovation. This article explores the use of social media in cocreating business value. The authors' study provides a conceptual framework for understanding core elements and processes of cocreation using social media. Using the conceptual framework, they examine and analyze case studies from IBM and SAP in the context of use of social media in cocreation.
Adam Tsakalidis, Symeon Papadopoulos, Alexandra I. Cristea, Yiannis Kompatsiaris, "Predicting Elections for Multiple Countries Using Twitter and Polls", IEEE Intelligent Systems, vol.30, no. 2, pp. 10-17, Mar.-Apr. 2015, doi:10.1109/MIS.2015.17
Abstract: The authors' work focuses on predicting the 2014 European Union elections in three different countries using Twitter and polls. Past works in this domain relying strictly on Twitter data have been proven ineffective. Others, using polls as their ground truth, have raised questions regarding the contribution of Twitter data for this task. Here, the authors treat this task as a multivariate time-series forecast, extracting Twitter- and poll-based features and training different predictive algorithms. They've achieved better results than several past works and the commercial baseline.
Kaitai Liang, Joseph K. Liu, Rongxing Lu, Duncan S. Wong, "Privacy Concerns for Photo Sharing in Online Social Networks", IEEE Internet Computing, vol.19, no. 2, pp. 58-63, Mar.-Apr. 2015, doi:10.1109/MIC.2014.107
Abstract: As wireless networks flourish, Internet users can access social network platforms (such as Facebook and Twitter) through personal electronic devices anywhere and anytime. However, because users often deploy social network platforms in a public network setting, a common concern remains about how to guarantee privacy for photo sharing. Although most platforms aim to protect such privacy, few are able to reach the goal. This work focuses on an interesting potential privacy risk, called the deletion delay of photo sharing, by pinpointing and investigating the risk's existence in some well-known social network platforms.
Abstract: Location information in social media is becoming increasingly vital in applications such as election prediction, epidemic forecasting, and emergency detection. However, only a tiny proportion of users proactively share their residence locations (which can be used to approximate the locations of most user-generated content) in their profiles, and inferring the residence location of the remaining users is nontrivial. In this article, the authors propose a framework for residence location inference in social media by jointly considering social, visual, and textual information. They first propose a data-driven approach to explore the use of friendship locality, social proximity, and content proximity for geographically nearby users. Based on these observations, they then propose a location propagation algorithm to effectively infer residence location for social media users. They extensively evaluate the proposed method using a large-scale real dataset and achieve a 15 percent relative improvement over state-of-the-art approaches.
February 2015: Using Twitter Sentiment to Forecast the 2013 Pakistani Election and the 2014 Indian Election
Vadim Kagan, Andrew Stevens, V.S. Subrahmanian, "Using Twitter Sentiment to Forecast the 2013 Pakistani Election and the 2014 Indian Election", IEEE Intelligent Systems, vol.30, no. 1, pp. 2-5, Jan.-Feb. 2015, doi:10.1109/MIS.2015.16
Abstract: This column discusses the authors' efforts to project the winner of the 2013 Pakistan and the 2014 Indian prime minister election using social network analysis and methods to create a diffusion estimation model.
Marco Balduini, Alessandro Bozzon, Emanuele Della Valle, Yi Huang, Geert-Jan Houben, "Recommending Venues Using Continuous Predictive Social Media Analytics", IEEE Internet Computing, vol.18, no. 5, pp. 28-35, Sept.-Oct. 2014, doi:10.1109/MIC.2014.84
Abstract: The authors' Continuous Predictive Social Media Analytics system operates in real time on social media streams and graphs to recommend venues to visitors of geo- and temporally bounded city-scale events. By combining deductive and inductive stream reasoning techniques with visitor-modeling functionalities, this system semantically analyzes and links visitors' social network activities to produce high-quality link predictions when information about preferences is sparse. The authors demonstrate their system's quality with experiments on real-world data.
Markus Strohmaier, Claudia Wagner, "Computational Social Science for the World Wide Web", IEEE Intelligent Systems, vol.29, no. 5, pp. 84-88, Sept.-Oct. 2014, doi:10.1109/MIS.2014.80
Abstract: In introducing the field of computational social science to the intelligent systems community, the authors discuss how this field can help advance the current state of understanding and engineering social-computational systems on the World Wide Web.
Abstract: Online social networks have been typically created for convenience -so they haven't been built from the ground up with security in mind. They often have confusing privacy settings and are susceptible to various kinds of attacks that exploit users' trust and privacy. In this article, the authors discuss security pitfalls in today's social networks, briefly introducing common attack methods. They implemented a proof-of-concept Facebook app, which is actually a harmless malware that uses common attack methods to demonstrate the vulnerability of online social networks. Although today's online social networks commonly offer users a variety of security settings, users tend to trust the information obtained from online social networks regardless of the settings. This kind of user mentality can be more crucial than technical aspects in determining the level of security in online social networks.
1-10 of 41