Mining Social Media: A Brief Introduction

The pervasive use of social media has generated unprecedented amounts of social data. Social media provides easily an accessible platform for users to share informa- tion. Mining social media has its potential to extract actionable patterns that can be benecial for business, users, and consumers. Social media data are vast, noisy, unstructured, and dynamic in nature, and thus novel challenges arise. This tutorial reviews the basics of data mining and social media, introduces representative research problems of mining social media, illustrates the application of data mining to social media using examples, and describes some projects of mining social media for human- itarian assistance and disaster relief for real-world applications.

[1]  Huan Liu,et al.  Exploiting vulnerability to secure user privacy on a social networking site , 2011, KDD.

[2]  Kristen LeFevre,et al.  Privacy wizards for social networking sites , 2010, WWW '10.

[3]  Chao Liu,et al.  Recommender systems with social regularization , 2011, WSDM '11.

[4]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[5]  Huan Liu,et al.  Synthesis Lectures on Data Mining and Knowledge Discovery , 2009 .

[6]  Sushil Jajodia,et al.  Who is tweeting on Twitter: human, bot, or cyborg? , 2010, ACSAC '10.

[7]  LiuHuan,et al.  Quantifying the trustworthiness of social media content , 2011 .

[8]  R. Suganya,et al.  Data Mining Concepts and Techniques , 2010 .

[9]  Bing Liu,et al.  Identifying comparative sentences in text documents , 2006, SIGIR.

[10]  Anna Cinzia Squicciarini,et al.  WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Collective Privacy Management in Social Networks , 2022 .

[11]  Nitin Indurkhya,et al.  Handbook of Natural Language Processing , 2010 .

[12]  M. McPherson,et al.  Birds of a Feather: Homophily in Social Networks , 2001 .

[13]  Nitin Agarwal,et al.  Modeling blogger influence in a community , 2011, Social Network Analysis and Mining.

[14]  Bing Liu,et al.  Mining and summarizing customer reviews , 2004, KDD.

[15]  Mohammad Ali Abbasi,et al.  Lessons Learned in Using Social Media for Disaster Relief - ASU Crisis Response Game , 2012, SBP.

[16]  Huiji Gao,et al.  Harnessing the Crowdsourcing Power of Social Media for Disaster Relief , 2011, IEEE Intelligent Systems.

[17]  Huan Liu,et al.  Exploring Social-Historical Ties on Location-Based Social Networks , 2012, ICWSM.

[18]  Huan Liu,et al.  Spectral Feature Selection for Data Mining , 2011 .

[19]  P. Lazarsfeld,et al.  Friendship as Social process: a substantive and methodological analysis , 1964 .

[20]  Ioannis Konstas,et al.  On social networks and collaborative recommendation , 2009, SIGIR.

[21]  Arun Sundararajan,et al.  Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks , 2009, Proceedings of the National Academy of Sciences.

[22]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[23]  Jennifer Neville,et al.  Randomization tests for distinguishing social influence and homophily effects , 2010, WWW '10.

[24]  Eli Berger Dynamic Monopolies of Constant Size , 2001, J. Comb. Theory, Ser. B.

[25]  Philip S. Yu,et al.  Identifying the influential bloggers in a community , 2008, WSDM '08.

[26]  Balachander Krishnamurthy,et al.  On the leakage of personally identifiable information via online social networks , 2010, Comput. Commun. Rev..

[27]  Ellen Riloff,et al.  Learning Extraction Patterns for Subjective Expressions , 2003, EMNLP.

[28]  Daniel T. Larose,et al.  Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .

[29]  Danah Boyd,et al.  Detecting Spam in a Twitter Network , 2009, First Monday.

[30]  Jon M. Kleinberg,et al.  Group formation in large social networks: membership, growth, and evolution , 2006, KDD '06.

[31]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[32]  Bo Pang,et al.  Thumbs up? Sentiment Classification using Machine Learning Techniques , 2002, EMNLP.

[33]  Alexander Grey,et al.  The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .

[34]  Bing Liu,et al.  Opinion spam and analysis , 2008, WSDM '08.

[35]  Bing Liu,et al.  Sentiment Analysis and Subjectivity , 2010, Handbook of Natural Language Processing.

[36]  Vijay Mahajan,et al.  New Product Diffusion Models in Marketing: A Review and Directions for Research: , 1990 .

[37]  James A. Hendler,et al.  Inferring binary trust relationships in Web-based social networks , 2006, TOIT.

[38]  อนิรุธ สืบสิงห์,et al.  Data Mining Practical Machine Learning Tools and Techniques , 2014 .

[39]  Peter D. Turney Thumbs Up or Thumbs Down? Semantic Orientation Applied to Unsupervised Classification of Reviews , 2002, ACL.

[40]  Oren Etzioni,et al.  Extracting Product Features and Opinions from Reviews , 2005, HLT.

[41]  Huan Liu,et al.  Quantifying the trustworthiness of social media content , 2011, Distributed and Parallel Databases.

[42]  P. Sztompka Trust: A Sociological Theory , 2000 .

[43]  A. Kaplan,et al.  Users of the world, unite! The challenges and opportunities of Social Media , 2010 .

[44]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[45]  Huan Liu,et al.  mTrust: discerning multi-faceted trust in a connected world , 2012, WSDM '12.

[46]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[47]  Huan Liu,et al.  Promoting Coordination for Disaster Relief - From Crowdsourcing to Coordination , 2011, SBP.

[48]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[49]  Hong Yu,et al.  Towards Answering Opinion Questions: Separating Facts from Opinions and Identifying the Polarity of Opinion Sentences , 2003, EMNLP.

[50]  Reza Zafarani,et al.  Understanding User Migration Patterns in Social Media , 2011, AAAI.

[51]  Lise Getoor,et al.  To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles , 2009, WWW '09.

[52]  Christopher Krügel,et al.  A Practical Attack to De-anonymize Social Network Users , 2010, 2010 IEEE Symposium on Security and Privacy.

[53]  Hiroshi Motoda,et al.  Computational Methods of Feature Selection , 2007 .

[54]  M. Macy Chains of Cooperation: Threshold Effects in Collective Action , 1991 .

[55]  Lillian Lee,et al.  Opinion Mining and Sentiment Analysis , 2008, Found. Trends Inf. Retr..

[56]  Hugo Liu InterestMap : Harvesting Social Network Profiles for Recommendations , 2004 .

[57]  Wolfgang Nejdl,et al.  Security and Trust Issues in Semantic Grids , 2005, Semantic Grid.

[58]  David S. Rosenblum,et al.  What Anyone Can Know: The Privacy Risks of Social Networking Sites , 2007, IEEE Security & Privacy.

[59]  Rebecca Goolsby,et al.  Social media as crisis platform: The future of community maps/crisis maps , 2010, TIST.

[60]  N. Ling The Mathematical Theory of Infectious Diseases and its applications , 1978 .

[61]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[62]  Mark S. Granovetter Threshold Models of Collective Behavior , 1978, American Journal of Sociology.

[63]  Lik Mui,et al.  A Computational Model of Trust and Reputation for E-businesses , 2002 .

[64]  Huan Liu,et al.  Community Detection and Mining in Social Media , 2010, Community Detection and Mining in Social Media.

[65]  Jure Leskovec,et al.  Supervised random walks: predicting and recommending links in social networks , 2010, WSDM '11.