Encyclopedia of Social Network Analysis and Mining

Living Edition
| Editors: Reda Alhajj, Jon Rokne

Analysis and Mining of Tags, (Micro)Blogs, and Virtual Communities

Living reference work entry
DOI: https://doi.org/10.1007/978-1-4614-7163-9_172-1

Synonyms

Glossary

Buzz monitoring

Collection and analysis of the voice of the public

Targeting

Analysis of social media with the goal to detect individuals

Alias

Internet alias that is used for communication on the Internet

Part of speech tagging

Marking words in a text according to lexical categories

Syntactic parsing

The process of analyzing a string of symbols according to a grammar

Sentiment analysis

Text analysis techniques used to classify the polarity of written text

Introduction

Analysis and mining of various social media sites has become an important task for many different reasons. By using a variety of state-of-the-art techniques including web crawling, text analysis, computational linguistics, and other algorithms, online content from social media sites can be gathered and analyzed. Analysis of social media can be performed using many different approaches depending on the goal of the analysis and the specific media that is...

This is a preview of subscription content, log in to check access.

Notes

Acknowledgments

This research was financially supported by Vinnova through the Vinnmer programme.

References

  1. Abbasi A, Chen H (2008) Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans Inf Syst 26(2):7:1–7:29CrossRefGoogle Scholar
  2. Asur S, Huberman BA (2010) Predicting the future with social media. In: Proceedings of the 2010 IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology – volume 01, WI-IAT’10. Toronto. IEEE Computer Society, Washington, DC, pp 492–499CrossRefGoogle Scholar
  3. Brynielsson J, Horndahl A, Johansson F, Kaati L, Mårtenson C, Svenson P (2012) Analysis of weak signals for detecting lone wolf terrorists. In: Proceedings of the European intelligence and security informatics conference 2012, Odense, pp 197–204Google Scholar
  4. Chen HC, Goldberg MK, Magdon-Ismail M (2004) Identifying multi-ID users in open forums. In: Intelligence and security informatics. Springer, Berlin/New York, pp 176–186CrossRefGoogle Scholar
  5. Dahlin J, Johansson F, Kaati L, Mårtenson C, Svenson P (2012) Combining entity matching techniques for detecting extremist behavior on discussion boards. In: ASONAM, Istanbul, pp 850–857Google Scholar
  6. Gruhl D, Guha R, Kumar R, Novak J, Tomkins A (2005) The predictive power of online chatter. In: Proceedings of the eleventh ACM SIGKDD international conference on knowledge discovery in data mining, KDD’05, Chicago. ACM, New York, pp 78–87CrossRefGoogle Scholar
  7. Juola P (2006) Authorship attribution. Found Trends Inf Retr 1(3):233–334CrossRefGoogle Scholar
  8. Narayanan A, Paskov H, Gong N, Bethencourt J, Stefanov E, Shin E, Song D (2012) On the feasibility of internet-scale author identification. In: 2012 I.E. symposium on security and privacy (SP), San Francisco, pp 300–314Google Scholar
  9. Novak J, Raghavan P, Tomkins A (2004) Anti-aliasing on the web. In: Proceedings of the 13th international conference on world wide web, WWW’04. New York. ACM, New York, pp 30–39Google Scholar
  10. Stamatatos E (2009) A survey of modern authorship attribution methods. J Am Soc Inf Sci Technol 60(3):538–556CrossRefGoogle Scholar
  11. Veijalainen J, Semenov A, Kyppö J (2010) Tracing potential school shooters in the digital sphere. In: ISA, Miyazaki, pp 163–178Google Scholar
  12. Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge/New YorkCrossRefMATHGoogle Scholar
  13. Zheng R, Li J, Chen H, Huang Z (2006) A framework for authorship identification of online messages: writing-style features and classification techniques. J Am Soc Inf Sci Technol 57(3):378–393CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media LLC 2017

Authors and Affiliations

  1. 1.Department of Information TechnologyUppsala UniversityUppsalaSweden