skip to main content
10.1145/2187980.2188256acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
tutorial

Identifying communicator roles in twitter

Authors Info & Claims
Published:16 April 2012Publication History

ABSTRACT

Twitter has redefined the way social activities can be coordinated; used for mobilizing people during natural disasters, studying health epidemics, and recently, as a communication platform during social and political change. As a large scale system, the volume of data transmitted per day presents Twitter users with a problem: how can valuable content be distilled from the back chatter, how can the providers of valuable information be promoted, and ultimately how can influential individuals be identified? To tackle this, we have developed a model based upon the Twitter message exchange which enables us to analyze conversations around specific topics and identify key players in a conversation. A working implementation of the model helps categorize Twitter users by specific roles based on their dynamic communication behavior rather than an analysis of their static friendship network. This provides a method of identifying users who are potentially producers or distributers of valuable knowledge.

References

  1. Twitter, "Twitter Blog: #numbers," 2011. {Online}. Available: http://blog.twitter.com/2011/03/numbers.html. {Accessed: 01-Oct-2011}.Google ScholarGoogle Scholar
  2. J. Weng and B.-sung Lee, "Event Detection in Twitter," in Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011.Google ScholarGoogle Scholar
  3. D. Chakrabarti and K. Punera, "Event Summarization Using Tweets," in Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011, pp. 66--73.Google ScholarGoogle Scholar
  4. M. J. Paul and M. Dredze, "You Are What You Tweet: Analyzing Twitter for Public Health," Artificial Intelligence, pp. 265--272, 2011.Google ScholarGoogle Scholar
  5. J. Park and W. Lee, "Revolution 2.0 in Tunisia and Egypt: Reactions and sentiments in the online world," in Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011, vol. 1.Google ScholarGoogle Scholar
  6. Pear Analytics, "Twitter Study -- August 2009," 2009.Google ScholarGoogle Scholar
  7. Z. Chu, S. Gianvecchio, and H. Wang, "Who is Tweeting on Twitter: Human, Bot, or Cyborg?," in Proceedings of the 26th Annual Computer Security Applications Conference, 2010, pp. 21--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Yardi, D. Romero, G. Schoenebeck, and D. Boyd, "Detecting spam in a twitter network," First Monday, vol. 15, no. 1, 2010.Google ScholarGoogle Scholar
  9. D. Boyd, S. Golder, and G. Lotan, "Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter," in HICSS-43, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Honeycutt and S. C. Herring, "Beyond Microblogging: Conversation and Collaboration via Twitter," in 42nd Hawaii International Conference on System Sciences, 2009, vol. 0, pp. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Rao, D. Yarowsky, A. Shreevats, and M. Gupta, "Classifying Latent User Attributes in Twitter," in Proceedings of the 2nd international workshop on Search and mining user-generated, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Kim, Y. Jo, I.-C. Moon, and A. Oh, "Analysis of Twitter Lists as a Potential Source for Discovering Latent Characteristics of Users," in CHI 2010 Workshop on Microblogging: What and How Can We Learn From It?, 2010.Google ScholarGoogle Scholar
  13. M. Pennacchiotti and A.-maria Popescu, "A Machine Learning Approach to Twitter User Classification," in Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011, pp. 281--288.Google ScholarGoogle Scholar
  14. J. Weng, E.-peng Lim, and J. Jiang, "TwitterRank: Finding Topic-sensitive Influential Twitterers," in Proceedings of the third ACM international conference on Web search and data mining, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Chen, R. Nairn, L. Nelson, M. Bernstein, and E. H. Chi, "Short and Tweet: Experiments on Recommending Content from Information Streams," in Proceedings of the 28th international conference on Human factors in computing systems, 2010, pp. 1185--1194. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Hurlock and M. L. Wilson, "Searching Twitter: Separating the Tweet from the Chaff," in Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011, pp. 161--168.Google ScholarGoogle Scholar
  17. A. Java, X. Song, T. Finin, and B. Tseng, "Why We Twitter/: Understanding Microblogging," in Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, 2007, pp. 56--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. F. Abel, Q. Gao, G.-jan Houben, and K. Tao, "Analyzing User Modeling on Twitter for Personalized News Recommendations," in Proceedings of the 19th international conference on User modeling, adaption, and personalization, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. B. Krishnamurthy, P. Gill, and M. Arlitt, "A few chirps about twitter," Proceedings of the first workshop on Online social networks - WOSP '08, p. 19, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. I. Anger and C. Kittl, "Measuring Influence on Twitter," in Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. A. Macskassy and M. Michelson, "Why Do People Retweet? Anti-Homophily Wins the Day!," in Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, 2011, pp. 209--216.Google ScholarGoogle Scholar
  22. M. J. Welch, U. Schonfeld, and D. He, "Topical Semantics of Twitter Links," in Proceedings of the fourth ACM international conference on Web search and data mining, 2011, pp. 327--336. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. E. M. Rogers, Diffusion of innovations, vol. 65, no. 5. Free Press, 1995, p. 519.Google ScholarGoogle Scholar
  24. H.-ching Chang, "A New Perspective on Twitter Hashtag Use/: Diffusion of Innovation Theory," in Proceedings of the 73rd ASIS&T Annual Meeting on Navigating Streams in an Information Ecosystem, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. Bentwood, "Distributed Influence: Quantifying the Impact of Social Media," Edelman, 2008. {Online}. Available: http://technobabble2dot0.files.wordpress.com/2008/01/edelman-white-paper-distributed-influence-quantifying-the-impact-of-social-media.pdf. {Accessed: 01-Mar-2011}.Google ScholarGoogle Scholar
  26. J. Hargreaves and L. Davies, "New Influentials, Collective Emotional Intelligence & The Topology of Influence'," 2011.Google ScholarGoogle Scholar
  27. J. Halliday, "Google+ launches 'What's Hot' and 'Ripples'," The Guardian, 27-Oct-2011. {Online}. Available: http://www.guardian.co.uk/technology/blog/2011/oct/27/google-plus-google. {Accessed: 27-Oct-2011}.Google ScholarGoogle Scholar

Index Terms

  1. Identifying communicator roles in twitter

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      WWW '12 Companion: Proceedings of the 21st International Conference on World Wide Web
      April 2012
      1250 pages
      ISBN:9781450312301
      DOI:10.1145/2187980

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 April 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • tutorial

      Acceptance Rates

      Overall Acceptance Rate1,899of8,196submissions,23%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader