Mining lurkers in online social networks : principles, models, and computational methods /: principles, models, and computational methods. ([2018])
- Record Type:
- Book
- Title:
- Mining lurkers in online social networks : principles, models, and computational methods /: principles, models, and computational methods. ([2018])
- Main Title:
- Mining lurkers in online social networks : principles, models, and computational methods
- Further Information:
- Note: Andrea Tagarelli, Roberto Interdonato.
- Authors:
- Tagarelli, Andrea, 1976-
Interdonato, Roberto - Contents:
- Intro; Contents; 1 Introduction; 1.1 Organization of This Brief; 1.2 Audience and Scope; 1.3 Thanks; References; 2 Background; 2.1 Perception of Lurking; 2.2 How to Identify Lurkers?; 2.3 Why Do Lurkers Act?; 2.4 How to Promote Delurking?; 2.5 Lurking as a Computational Problem; References; 3 Characterization and Ranking of Lurkers; 3.1 Topology-Driven Lurking Definition; 3.2 The LurkerRank Family of Ranking Algorithms; 3.3 Time-Aware LurkerRank Algorithms; 3.3.1 Freshness and Activity Trend; 3.3.2 Time-Static LurkerRank; 3.3.3 Time-Evolving LurkerRank; 3.4 Learning to Rank Lurkers 5.2.1 TrustRank-Biased LurkerRank5.2.2 Lurking and Trustworthiness in Ranking Problems; 5.2.3 Lurking and Data Privacy Preservation; References; 6 Delurking; 6.1 User Engagement in Online Social Networks; 6.2 Self-Delurking Randomization; 6.3 Delurking and Influence Propagation; 6.3.1 Information Diffusion and Influence Maximization; 6.3.2 Delurking-Oriented Targeted Influence Maximization; 6.3.3 Community-Based Delurking; 6.3.4 Diversity-Aware Delurking; 6.3.4.1 Diversity in Information Spreading; 6.3.4.2 Diversity-Integrated Targeted Influence Maximization; References 7 Boundary Spanning Lurking7.1 Lurkers Across Communities; 7.1.1 Across-Community Boundary Spanning vs. Within-Community Centrality; 7.1.2 Lurkers vs. Community-Based Bridge Users; 7.2 Cross-OSN Analysis of Alternate Behaviors of Lurking and Active Participation; 7.2.1 Multilayer Network Model; 7.2.2 Multilayer LurkerRank; 7.2.3Intro; Contents; 1 Introduction; 1.1 Organization of This Brief; 1.2 Audience and Scope; 1.3 Thanks; References; 2 Background; 2.1 Perception of Lurking; 2.2 How to Identify Lurkers?; 2.3 Why Do Lurkers Act?; 2.4 How to Promote Delurking?; 2.5 Lurking as a Computational Problem; References; 3 Characterization and Ranking of Lurkers; 3.1 Topology-Driven Lurking Definition; 3.2 The LurkerRank Family of Ranking Algorithms; 3.3 Time-Aware LurkerRank Algorithms; 3.3.1 Freshness and Activity Trend; 3.3.2 Time-Static LurkerRank; 3.3.3 Time-Evolving LurkerRank; 3.4 Learning to Rank Lurkers 5.2.1 TrustRank-Biased LurkerRank5.2.2 Lurking and Trustworthiness in Ranking Problems; 5.2.3 Lurking and Data Privacy Preservation; References; 6 Delurking; 6.1 User Engagement in Online Social Networks; 6.2 Self-Delurking Randomization; 6.3 Delurking and Influence Propagation; 6.3.1 Information Diffusion and Influence Maximization; 6.3.2 Delurking-Oriented Targeted Influence Maximization; 6.3.3 Community-Based Delurking; 6.3.4 Diversity-Aware Delurking; 6.3.4.1 Diversity in Information Spreading; 6.3.4.2 Diversity-Integrated Targeted Influence Maximization; References 7 Boundary Spanning Lurking7.1 Lurkers Across Communities; 7.1.1 Across-Community Boundary Spanning vs. Within-Community Centrality; 7.1.2 Lurkers vs. Community-Based Bridge Users; 7.2 Cross-OSN Analysis of Alternate Behaviors of Lurking and Active Participation; 7.2.1 Multilayer Network Model; 7.2.2 Multilayer LurkerRank; 7.2.3 Multilayer Alternate Lurker-Contributor Ranking; References; 8 Bringing Lurking in Game Theory; 8.1 The Lurker Game; 8.1.1 Basic Dynamics; 8.1.2 Mean Field Analysis; 8.1.3 Rewarding Mechanisms; 8.2 Lurker Game on Networks; References 9 Concluding Remarks and Challenges9.1 Modeling Lurking Behaviors Through Latent Interactions; 9.2 Emotion-Driven Analysis of Lurkers; 9.3 Psycho-Sociological Influences on Lurkers; 9.4 Dis/Misinformation, Fake News, and Lurkers; References … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 006.312
Computer science
Data mining
Online social networks
Information systems
Social sciences -- Data processing
Computer Communication Networks
COMPUTERS / General
Computers -- Data Processing
Computers -- Hardware -- Network Hardware
Society & social sciences
Network hardware
Computers -- Online Services -- General
Computer networking & communications
Electronic books - Languages:
- English
- ISBNs:
- 9783030002299
3030002292 - Related ISBNs:
- 9783030002282
3030002284 - Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (EBSCO, viewed November 15, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.360451
- Ingest File:
- 02_340.xml