The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online communities are flourishing as social meeting web-spaces for users and peer community members. Different online communities require different levels of competence for participants to join, and scattered evidence suggests that women can be overly under-represented. Moreover, anecdotal evidence of the Q&amp, A website Stack Overflow suggests that women withdraw from unfriendly online...
The unstructured text content of online communication artifacts is a salient source of information about social relationships. We investigate the utility of keywords extracted from the message body as a representation of the relationship's characteristics, which are reflected by the conversation topics to a certain extent. Keyword extraction is performed using standard natural language processing...
As a result of the author's need for help in finding a given name for the unborn baby, the name ling, a search engine for given names, based on data from the ``Social Web'' was born. Within less than six months, more than 35,000 users accessed \name ling with more than 300,000 search requests, underpinning the relevance of the underlying research questions. The present work compares different metrics...
Social tagging has become popular around the Internet as well as in research. The main idea behind tagging is to allow users to provide metadata to the web content from their perspective to facilitate categorization and retrieval. There are many factors that influence users' tag choice. Many studies have been conducted to reveal these factors by analysing tagging data. This paper uses two theories...
Scientific progress depends on communication and exchange of ideas. Among others, scientific conferences are considered to be the primary venues for connecting with fellow scientists. Would those who are more active in the conference have more impact in terms of the citations today? In this paper we present an analysis of human behavioral data collected at a scientific conference by means of Spot...
gSocial computingh is a keyword in contemporary society. However, if we ask anew what the term social computing means, we realize that its definition, meaning and modeling have not necessarily been clarified. This paper first investigates when questions are raised about gsocial computing.h We find that the oldest Wikipedia article on social computing was written on January 21, 2005. However, it is...
Traces of activity left by social media users can shed light on individual behavior, social relationships, and community efficacy. Tools and processes to make sense of social traces are essential for enabling practitioners to study and nurture meaningful and sustainable social interaction. Yet such tools and processes remain in their infancy. This paper describes a study of 15 graduate students who...
The aim of this paper is to develop the conceptual foundation for exploring Coordination by Rule and Control (CRC) and Collaboration by Social Influence (CSI). CRC is based on mechanical (rule and time based) structures, while CSI is based on organic (informal, trusted and shared aware) social networks. We pose the overriding research question "How is CSI achieved for stability operations?",...
This paper analyzes the potential of the Mobile Social Web in facilitating the social dimension of agile requirements engineering. In doing so, an agile requirements engineering process (AREP) is presented. AREP consists of a nonlinear sequence of technical activities, each of which is supported by a number of social activities. A compendium of representative examples that illustrate the interplay...
This paper examines the role of sentiment in information propagation. We make use of political communication in the Twitter space, and relate emotion expressions in a message to the degrees of responses generated by the message. We also compare differences between user reply vs. retweet behavior with respect to sentiment variables. The current results indicate that that degree of emotion expressions...
The Internet offers opportunities for informal deliberation, and civic and civil engagement. However, social inequalities have traditionally meant that some communities, where there is a concentration of poverty, are both less likely to exhibit these democratic behaviors and less likely to benefit from any additional boost as a result of technology use. We argue that some new technologies afford opportunities...
Microblogging services such as Twitter and Tencent Weibo have enjoyed drastic popularity in the latest few years. Recommender is essential to those microblogs as a means to find items (users or other information sources such as organizations) that might interest a user to follow. It can greatly improve user experience as well as reduce the risk of information overload might be introduced by irrelevant...
Account compromise can occur frequently in popular Massively Multiplayer Online Role-playing Games(MMORPGs) to gain easy profits and in extreme scenarios, it can lead to gold farming in the real world. Despite security concerns over compromised accounts in MMORPGs, few attempts have been made towards deeper exploration of the problem. Previous research has studied only the classification of cheating...
In the paper we present an algorithm called Game Rank, modified from Page rank and HITS, to evaluate the pitching and batting ability for players in Major League Baseball (MLB) with a network perspective. The model could also be easily expanded and applied on any network that has multiple factors interacting with each other, to quantify the vertex's significance. Then, we evaluate the algorithm by...
The process of distributing tasks to anonymous group of people, collecting their solutions and integrating them to produce the final result is called Crowd computing. It is a promising alternative for large and small business enterprises to accomplish many different types of tasks through geographically distributed workforce with uncontracted workforce in a la pay-per-use basis, allowing them to seemlessly...
Information privacy is desired not only by individuals but also by a community of individuals to safeguard sensitive information for which they are collectively responsible. This paper reports on two aspects of privacy-aware communities that emerged from focus group interviews of three organizations: privacy awareness and situated disclosures. With respect to privacy awareness the study found that...
Web applications are increasingly showing recommended users from social media along with some descriptions, an attempt to show relevancy-why they are being shown. For example, Twitter search for a topical keyword shows expert twitterers on the side for `whom to follow'. Google+ and Facebook also recommend users to follow or add to friend circle. Popular Internet newspaper-The Huffing ton Post shows...
Sentiment analysis refers to a broad range of fields of natural language processing, computational linguistics, and text mining. Sentiment classification of reviews and comments has emerged as the most useful application in the area of sentiment analysis. Bag of words and feature based sentiment are the most popular approaches used by researchers to deal with sentiment analysis of opinions about products...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.