Abstract
The social web has empowered us to easily share information, express opinions, and engage in discussions on events around the world. While users of social media platforms often offer help and emotional support to others (the good), they also spam (the bad) and harass others as well as even manipulate others via fake news (the ugly). In order to both leverage the positive effects and mitigate the negative effects of using social media, intent mining provides a computational approach to proactively analyze social media data. This chapter introduces an intent taxonomy of social media usage with examples and describes methods and future challenges to mine the intentional uses of social media.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
References
Al-khateeb, S., Hussain, M.N., Agarwal, N.: Social cyber forensics approach to study twitter’s and blogs’ influence on propaganda campaigns. In: International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation, pp. 108–113. Springer, Berlin (2017)
Allcott, H., Gentzkow, M.: Social media and fake news in the 2016 election. J. Econ. Perspect. 31(2), 211–36 (2017)
Balasuriya, L., Wijeratne, S., Doran, D., Sheth, A.: Finding street gang members on twitter. In: 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 685–692. IEEE, New York (2016)
Boux, H.J., Daum, C.W.: At the intersection of social media and rape culture: how Facebook postings, texting and other personal communications challenge the real rape myth in the criminal justice system. Univ. Illinois J. Law Technol. Policy 1, 149 (2015)
Brown, J.: Is social media bad for you? the evidence and the unknowns (2018). http://www.bbc.com/future/story/20180104-is-social-media-bad-for-you-the-evidence-and-the-unknowns
Carlos, C.S., Yalamanchi, M.: Intention analysis for sales, marketing and customer service. In: Proceedings of COLING 2012: Demonstration Papers, pp. 33–40 (2012)
Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: Proceedings of the 20th International Conference on World Wide Web, pp. 675–684. ACM, New York (2011)
Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., Vakali, A.: Mean birds: detecting aggression and bullying on twitter. In: Proceedings of the 2017 ACM on Web Science Conference, pp. 13–22. ACM, New York (2017)
Chen, Z., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Identifying intention posts in discussion forums. In: Proceedings of the 2013 conference of the North American chapter of the association for computational linguistics: human language technologies, pp. 1041–1050 (2013)
Conover, M.D., Ferrara, E., Menczer, F., Flammini, A.: The digital evolution of occupy wall street. PLos One 8(5), e64679 (2013)
De Choudhury, M., Jhaver, S., Sugar, B., Weber, I.: Social media participation in an activist movement for racial equality. In: ICWSM, pp. 92–101 (2016)
De Vries, L., Gensler, S., Leeflang, P.S.: Popularity of brand posts on brand fan pages: an investigation of the effects of social media marketing. J. Interact. Mark. 26(2), 83–91 (2012)
Dennett, D.C.: The Intentional Stance. MIT Press, Cambridge (1989)
Dinakar, K., Jones, B., Havasi, C., Lieberman, H., Picard, R.: Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Trans. Interact. Intell. Syst. 2(3), 18 (2012)
Ding, X., Liu, T., Duan, J., Nie, J.Y.: Mining user consumption intention from social media using domain adaptive convolutional neural network. In: AAAI vol. 15, 2389–2395 (2015)
Ferrara, E., Varol, O., Davis, C., Menczer, F., Flammini, A.: The rise of social bots. Commun. ACM 59(7), 96–104 (2016). http://doi.acm.org/10.1145/2818717
Gates, S., Podder, S.: Social media, recruitment, allegiance and the Islamic state. Perspect. Terrorism 9(4), 107–116 (2015)
Ghosh, S., Viswanath, B., Kooti, F., Sharma, N.K., Korlam, G., Benevenuto, F., Ganguly, N., Gummadi, K.P.: Understanding and combating link farming in the twitter social network. In: Proceedings of the 21st International Conference on World Wide Web, pp. 61–70. ACM, New York (2012)
Glasgow, K., Vitak, J., Tausczik, Y., Fink, C.: Grieving in the 21st century: Social media’s role in facilitating supportive exchanges following community-level traumatic events. In: Proceedings of the 7th 2016 International Conference on Social Media & Society, p. 4. ACM, New York (2016)
Gupta, A., Lamba, H., Kumaraguru, P., Joshi, A.: Faking sandy: characterizing and identifying fake images on twitter during hurricane sandy. In: Proceedings of the 22nd International Conference on World Wide Web. pp. 729–736. ACM, New York (2013)
He, X., Lin, Y.R.: Measuring and monitoring collective attention during shocking events. EPJ Data Sci. 6(1), 30 (2017)
Hollerit, B., Kröll, M., Strohmaier, M.: Towards linking buyers and sellers: detecting commercial intent on twitter. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 629–632. ACM, New York (2013)
Jansen, B.J., Booth, D.L., Spink, A.: Determining the informational, navigational, and transactional intent of web queries. Inf. Process. Manag. 44(3), 1251–1266 (2008)
Jiang, M., Cui, P., Faloutsos, C.: Suspicious behavior detection: current trends and future directions. IEEE Intell. Syst. 31(1), 31–39 (2016)
Jin, X., Lin, C., Luo, J., Han, J.: A data mining-based spam detection system for social media networks. Proc. VLDB Endowment 4(12), 1458–1461 (2011)
Johri, A., Karbasian, H., Malik, A., Handa, R., Purohit, H.: How diverse users and activities trigger connective action via social media: lessons from the twitter hashtag campaign# ilooklikeanengineer. In: Proceedings of the 51st Hawaii International Conference on System Sciences (2018)
Kavanaugh, A.L., Fox, E.A., Sheetz, S.D., Yang, S., Li, L.T., Shoemaker, D.J., Natsev, A., Xie, L.: Social media use by government: from the routine to the critical. Gov. Inf. Q. 29(4), 480–491 (2012)
Lazer, D.M.J., Baum, M.A., Benkler, Y., Berinsky, A.J., Greenhill, K.M., Menczer, F., Metzger, M.J., Nyhan, B., Pennycook, G., Rothschild, D., Schudson, M., Sloman, S.A., Sunstein, C.R., Thorson, E.A., Watts, D.J., Zittrain, J.L.: The science of fake news. Science 359(6380), 1094–1096 (2018). http://science.sciencemag.org/content/359/6380/1094
Lee, K., Eoff, B.D., Caverlee, J.: Seven months with the devils: A long-term study of content polluters on twitter. In: ICWSM (2011)
Meier, P.: Digital Humanitarians: How Big Data is Changing the Face of Humanitarian Response. CRC Press, Boca Raton (2015)
Mondal, M., Silva, L.A., Benevenuto, F.: A measurement study of hate speech in social media. In: Proceedings of the 28th ACM Conference on Hypertext and Social Media, pp. 85–94. ACM, New York (2017)
Mukherjee, A., Kumar, A., Liu, B., Wang, J., Hsu, M., Castellanos, M., Ghosh, R.: Spotting opinion spammers using behavioral footprints. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 632–640. ACM, New York (2013)
Nazer, T.H., Morstatter, F., Dani, H., Liu, H.: Finding requests in social media for disaster relief. In: 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 1410–1413. IEEE, New York (2016)
O’Keeffe, G.S., Clarke-Pearson, K., et al.: The impact of social media on children, adolescents, and families. Pediatrics 127(4), 800–804 (2011)
Pedrood, B., Purohit, H.: Mining help intent on twitter during disasters via transfer learning with sparse coding. In: Proceedings of the 11th International Conference on Social Computing, Behavioral-Cultural Modeling, & Prediction and Behavior Representation in Modeling and Simulation (2018, in press). http://ist.gmu.edu/~hpurohit/informatics-lab/papers/sbp18-transferlearning-camera-ready-FINAL.pdf
Purohit, H., Castillo, C., Diaz, F., Sheth, A., Meier, P.: Emergency-relief coordination on social media: Automatically matching resource requests and offers. First Monday 19(1) (2013). http://firstmonday.org/ojs/index.php/fm/issue/view/408
Purohit, H., Hampton, A., Bhatt, S., Shalin, V.L., Sheth, A.P., Flach, J.M.: Identifying seekers and suppliers in social media communities to support crisis coordination. Comput. Supported Coop. Work 23(4–6), 513–545 (2014)
Purohit, H., Dong, G., Shalin, V., Thirunarayan, K., Sheth, A.: Intent classification of short-text on social media. In: IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), 2015, pp. 222–228. IEEE, New York (2015)
Purohit, H., Banerjee, T., Hampton, A., Shalin, V.L., Bhandutia, N., Sheth, A.: Gender-based violence in 140 characters or fewer: a# bigdata case study of twitter. First Monday 21(1) (2016). http://firstmonday.org/ojs/index.php/fm/issue/view/408
Purohit, H., Stabile, B., Grant, A., Pandey, R.: Modeling policy-relevant intent related to gender violence myths on social media using social construction theory. In: International Conference on Computational Social Science (IC2S2) (2018, forthcoming). http://ist.gmu.edu/~hpurohit/informatics-lab/papers/modeling-gbv-policy-intent-ic2s218.pdf
Ramanand, J., Bhavsar, K., Pedanekar, N.: Wishful thinking: finding suggestions and ‘buy’ wishes from product reviews. In: Proceedings of the NAACL HLT 2010 Workshop on Computational Approaches to Analysis and Generation of Emotion in Text, pp. 54–61. Association for Computational Linguistics, Los Angeles (2010)
Salawu, S., He, Y., Lumsden, J.: Approaches to automated detection of cyberbullying: a survey. IEEE Trans. Affect. Comput. (2017). https://doi.org/10.1109/TAFFC.2017.2761757, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8063898&isnumber=5520654
Solon, O.: Tim Berners-Lee: we must regulate tech firms to prevent ‘weaponised’ web (2018). https://www.theguardian.com/technology/2018/mar/11/tim-berners-lee-tech-companies-regulations?CMP=Share_iOSApp_Other
Squicciarini, A., Rajtmajer, S., Liu, Y., Griffin, C.: Identification and characterization of cyberbullying dynamics in an online social network. In: 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 280–285. IEEE, New York (2015)
Starbird, K.: Examining the alternative media ecosystem through the production of alternative narratives of mass shooting events on twitter. In: ICWSM, pp. 230–239 (2017)
Starbird, K., Spiro, E., Edwards, I., Zhou, K., Maddock, J., Narasimhan, S.: Could this be true?: I think so! expressed uncertainty in online rumoring. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 360–371. ACM, New York (2016)
Sukthankar, G., Geib, C., Bui, H.H., Pynadath, D., Goldman, R.P.: Plan, activity, and intent recognition: theory and practice. In: Newnes (2014)
Tomlinson, M., Bracewell, D., Krug, W.: Capturing cultural differences in expressions of intentions. In: Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers, pp. 48–57 (2014)
Tyshchuk, Y., Li, H., Ji, H., Wallace, W.A.: Evolution of communities on twitter and the role of their leaders during emergencies. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 727–733. ACM, New York (2013)
Wang, J., Cong, G., Zhao, W.X., Li, X.: Mining user intents in twitter: a semi-supervised approach to inferring intent categories for tweets. In: AAAI, pp. 318–324 (2015)
Welser, H.T., Cosley, D., Kossinets, G., Lin, A., Dokshin, F., Gay, G., Smith, M.: Finding social roles in Wikipedia. In: Proceedings of the 2011 iConference, pp. 122–129. ACM, New York (2011)
Wu, L., Liu, H.: Tracing fake-news footprints: Characterizing social media messages by how they propagate. In: Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, WSDM’18, pp. 637–645. ACM, New York (2018). http://doi.acm.org/10.1145/3159652.3159677
Yu, D., Tyshchuk, Y., Ji, H., Wallace, W.: Detecting deceptive groups using conversations and network analysis. In: Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing, vol. 1, pp. 857–866 (2015)
Zarkov, D., Davis, K.: Ambiguities and dilemmas around #metoo: #forhow long and #whereto? Eur. J. Women’s Stud. 25(1), 3–9 (2018). https://doi.org/10.1177/1350506817749436
Acknowledgements
The authors thank Professor Amit Sheth at Kno.e.sis Center, Wright State University for valuable feedback and US National Science Foundation (NSF) for partially supporting this research on intent mining through grant award IIS-1657379. Opinions in this chapter are those of the authors and do not necessarily represent the official position or policies of the NSF.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Purohit, H., Pandey, R. (2019). Intent Mining for the Good, Bad, and Ugly Use of Social Web: Concepts, Methods, and Challenges. In: Agarwal, N., Dokoohaki, N., Tokdemir, S. (eds) Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-94105-9_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-94105-9_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-94104-2
Online ISBN: 978-3-319-94105-9
eBook Packages: Social SciencesSocial Sciences (R0)