SlideShare a Scribd company logo
1 of 36
CSE509: Introduction to Web Science and Technology Lecture 6: Social Information Retrieval ArjumandYounus Web Science Research Group Institute of Business Administration (IBA)
Last Time… Transition from Web 1.0 to Web 2.0 Social Media Characteristics Part I: Theoretical Aspects Social Networks as a Graph Properties of Social Networks Part II: Getting Hands-On Experience on Social Media Analytics Twitter Data Hacks Part III: Example Researches August 13, 2011
Today Role of Today’s Web: Changing the way Information Needs are Satisfied Social Search Research Case by Microsoft Research: What do People Ask their Social Networks Techniques for Influence Analysis in Social Networks August 13, 2011
Role of Today’s Web August 13, 2011 Marketing  Tool Information Finding Tool Media  Tool
New Dimensions in Search with The Social Web Information Overload Search engines don’t always hold answers that users are looking for Smart Search (CNN Money) “The Web, they say, is leaving the era of search and entering one of discovery. What’s the difference?  Search is what you do when you’re  looking for something. Discovery is when something wonderful that you didn’t know existed, or didn’t know how to ask for, finds you.” August 13, 2011 What does that mean for search engines? Will they be left behind?
Role of Today’s Web August 13, 2011 Marketing  Tool Information Finding Tool Media  Tool
Social Search Takes into account the “social graph” of the person initiating the query Search activity in which users pose a question to their social networks Search systems using statistical analytics over traces left behind by others Conducting a search over an existing database of content previously provided by other users such as searching over the collection of public Twitter posts or searching through an archive of questions and answers August 13, 2011
Social Search Benefits Reduced impact of link spamby lesser reliance on link structure of Web pages Increased relevance due to each result being selected by users Web pages relevance judged from reader’s perspective rather than author’s perspective More current results through constant feedback August 13, 2011 Improvements achieved by social search have not been quantified so far
What Do People Ask Social Networks? Meredith Ringel Morris, MSR Jaime Teevan, MSR Katrina Panovich, MIT August 13, 2011
Questions about People’s Questions What questions do people ask? How are the questions phrased? What are the question types and topics? Who asks which questions and why? Which questions get answered? How is answer speed and utility perceived? What are people’s motivations for answering? August 13, 2011
Survey of Asking via Status Messages Survey content Used a status message to ask a question? Frequency of asking, question type, responses received Provide an example Answered a status message question? Why or why not? Provide an example 624 participants Focus on Facebook and Twitter behavior August 13, 2011
Questions: Types August 13, 2011
Questions: Topics Missing: Health, Religion Politics, Dating, and Finance August 13, 2011
Questions: Who Asks What August 13, 2011 men old Twitter women Facebook young
Questions: Motives for Asking August 13, 2011
Questions About People’s Questions What questions do people ask? How are the questions phrased? What are the question types and topics? Who asks which questions and why? Which questions get answered? How is answer speed and utility perceived? What are people’s motivations for answering? August 13, 2011
Answers: Speed and Utility 94% of questions received an answer Answer speed A quarter in 30 minutes, almost all in a day People expected faster, but satisfied with speed Shorter questions got more useful responses Answer utility 69% of responses helpful August 13, 2011
Answers: Speed and Utility Fast No correlation Unhelpful August 13, 2011
Answers: Motives for Answering Motives for Not Answering - Don’t know the answer - Private topic - Question impersonal August 13, 2011
Answers About People’s Questions The questions people ask Short, directed to “anyone” Subjective questions on acceptable topics Social relationships important motivators The questions that get answered Fast, helpful responses, related to length and type Answers motivated by altruism and expertise August 13, 2011
Enhancing Search using Social Network Features  Recency Crawling and Ranking Identification of Hot Topics on Social Web [YQG+11] News in the Making Trend analysis Event detection Real-Time Search Information Diffusion and Influence Analysis Community Detection Opinion Mining August 13, 2011
August 13, 2011 Nodes, Ties and Influence
Importance of Nodes Not all nodes are equally important Centrality Analysis Find out the most important nodes in one network Commonly-used Measures Degree Centrality Closeness Centrality Betweenness Centrality Eigenvector Centrality August 13, 2011
Degree Centrality The importance of a node is determined by the number of nodes adjacent to it The larger the degree, the more import the node is Only a small number of nodes have high degrees in many real-life networks Degree Centrality Normalized Degree Centrality:   For node 1, degree centrality is 3; Normalized degree centrality is  3/(9-1)=3/8. August 13, 2011
Closeness Centrality “Central” nodes are important, as they can reach the whole network more quickly than non-central nodes Importance measured by how close a node is to other nodes Average Distance Closeness Centrality  August 13, 2011
Closeness Centrality Example Node 4 is more central than node 3 August 13, 2011
Betweenness Centrality Node betweenness counts the number of shortest paths that pass one node Nodes with high betweenness are important in communication and information diffusion Betweenness Centrality The number of shortest paths between s and t The number of shortest paths between s and t that pass vi 26 August 13, 2011
Betweenness Centrality Example The number of shortest paths between s and t The number of shortest paths between s and t that pass vi August 13, 2011
Eigenvector Centrality One’s importance is determined by his friends’ If one has many important friends, he should be important as well.  The centrality corresponds to the top eigenvector of the adjacency matrix A.  A variant of this eigenvector centrality is the PageRank score. August 13, 2011
Weak and Strong Ties In practice, connections are not of the same strength Interpersonal social networks are composed of strong ties (close friends) and weak ties (acquaintances) Strong ties and weak ties play different roles for community formation and information diffusion Strength of Weak Ties (Granovetter, 1973)  Occasional encounters with distant acquaintances can provide important information about new opportunities for job search August 13, 2011
Connections in Social Media ,[object Object],One user might have thousands of friends online Who are the most important ones among your 300 Facebook friends? ,[object Object],Analyze network topology Learn from User Profiles and Attributes August 13, 2011
Learning from Network Topology Bridges connecting two different communities are weak ties An edge is a bridge if its removal results in disconnection of its terminal nodes e(2,5) is a bridge e(2,5) is NOT a bridge August 13, 2011
“shortcut” Bridge Bridges are rare in real-life networks Alternatively, one can relax the definition by checking if  the distance between two terminal nodes increases if the edge is removed The larger the distance, the weaker the tie is d(2,5) = 4 if e(2,5) is removed d(5,6) = 2 if e(5,6) is removed e(5,6) is a stronger tie than e(2,5) August 13, 2011
Neighborhood Overlap Tie Strength can be measured based on neighborhood overlap; the larger the overlap, the stronger the tie is -2 in the denominator is to exclude vi and vj August 13, 2011
Neighborhood Overlap Tie Strength can be measured based on neighborhood overlap; the larger the overlap, the stronger the tie is -2 in the denominator is to exclude vi and vj August 13, 2011
Learning from Profiles and Interactions Twitter: one can follow others without followee’s confirmation The real friendship network is determined by the frequency two users talk to each other, rather than the follower-followee network The real friendship network is more influential in driving Twitter usage Strengths of ties can be predicted accurately based on various information from Facebook Friend-initiated posts, message exchanged in wall post,  number of mutual friends, etc.  Learning numeric link strength by maximum likelihood estimation User profile similarity determines the strength Link strength in turn determines user interaction Maximize the likelihood based on observed profiles and interactions 35 August 13, 2011

More Related Content

What's hot

10 More than a Pretty Picture: Visual Thinking in Network Studies
10 More than a Pretty Picture: Visual Thinking in Network Studies10 More than a Pretty Picture: Visual Thinking in Network Studies
10 More than a Pretty Picture: Visual Thinking in Network Studiesdnac
 
The Basics of Social Network Analysis
The Basics of Social Network AnalysisThe Basics of Social Network Analysis
The Basics of Social Network AnalysisRory Sie
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018Arsalan Khan
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation Ratnesh Shah
 
Overview Of Network Analysis Platforms
Overview Of Network Analysis PlatformsOverview Of Network Analysis Platforms
Overview Of Network Analysis PlatformsNoah Flower
 
Social Network Analysis Introduction including Data Structure Graph overview.
Social Network Analysis Introduction including Data Structure Graph overview. Social Network Analysis Introduction including Data Structure Graph overview.
Social Network Analysis Introduction including Data Structure Graph overview. Doug Needham
 
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...BAINIDA
 
Social Network Analysis: applications for education research
Social Network Analysis: applications for education researchSocial Network Analysis: applications for education research
Social Network Analysis: applications for education researchChristian Bokhove
 
00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and OverviewDuke Network Analysis Center
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network AnalysisScott Gomer
 
Social network analysis intro part I
Social network analysis intro part ISocial network analysis intro part I
Social network analysis intro part ITHomas Plotkowiak
 
Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011guillaume ereteo
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measuresdnac
 

What's hot (20)

09 Ego Network Analysis
09 Ego Network Analysis09 Ego Network Analysis
09 Ego Network Analysis
 
10 More than a Pretty Picture: Visual Thinking in Network Studies
10 More than a Pretty Picture: Visual Thinking in Network Studies10 More than a Pretty Picture: Visual Thinking in Network Studies
10 More than a Pretty Picture: Visual Thinking in Network Studies
 
13 Community Detection
13 Community Detection13 Community Detection
13 Community Detection
 
The Basics of Social Network Analysis
The Basics of Social Network AnalysisThe Basics of Social Network Analysis
The Basics of Social Network Analysis
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
01 Network Data Collection (2017)
01 Network Data Collection (2017)01 Network Data Collection (2017)
01 Network Data Collection (2017)
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation
 
Overview Of Network Analysis Platforms
Overview Of Network Analysis PlatformsOverview Of Network Analysis Platforms
Overview Of Network Analysis Platforms
 
Social Network Analysis Introduction including Data Structure Graph overview.
Social Network Analysis Introduction including Data Structure Graph overview. Social Network Analysis Introduction including Data Structure Graph overview.
Social Network Analysis Introduction including Data Structure Graph overview.
 
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
 
Social Network Analysis: applications for education research
Social Network Analysis: applications for education researchSocial Network Analysis: applications for education research
Social Network Analysis: applications for education research
 
Introduction to Social Network Analysis
Introduction to Social Network AnalysisIntroduction to Social Network Analysis
Introduction to Social Network Analysis
 
05 Network Canvas (2017)
05 Network Canvas (2017)05 Network Canvas (2017)
05 Network Canvas (2017)
 
00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Social network analysis intro part I
Social network analysis intro part ISocial network analysis intro part I
Social network analysis intro part I
 
Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures
 
12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC
 
15 Network Visualization and Communities
15 Network Visualization and Communities15 Network Visualization and Communities
15 Network Visualization and Communities
 

Similar to CSE509 Lecture 6

Social Web 2.0 Class Week 4: Social Networks, Privacy
Social Web 2.0 Class Week 4: Social Networks, PrivacySocial Web 2.0 Class Week 4: Social Networks, Privacy
Social Web 2.0 Class Week 4: Social Networks, PrivacyShelly D. Farnham, Ph.D.
 
Attention and Bias in Social Information Networks
Attention and Bias in Social Information NetworksAttention and Bias in Social Information Networks
Attention and Bias in Social Information NetworksScott Counts
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networkseSAT Publishing House
 
The Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisThe Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisIJMER
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
 
Running&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docx
Running&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docxRunning&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docx
Running&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docxanhlodge
 
Information Literacy for the Google Generation
Information Literacy for the Google GenerationInformation Literacy for the Google Generation
Information Literacy for the Google GenerationTeresa S. Welsh
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Biasgloriakt
 
CFMC NWLC 20100818
CFMC NWLC 20100818CFMC NWLC 20100818
CFMC NWLC 20100818Janet Shing
 
Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6jiahao84
 
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOA COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOijaia
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networkseditorjournal
 
Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systemsguest77b0cd12
 
Social Network Analytics (SNA)
Social Network Analytics (SNA) Social Network Analytics (SNA)
Social Network Analytics (SNA) Joseph Asamoah
 
Social implications of social networking sites
Social implications of social networking sitesSocial implications of social networking sites
Social implications of social networking sitesPetter Bae Brandtzæg
 

Similar to CSE509 Lecture 6 (20)

CSE509 Lecture 5
CSE509 Lecture 5CSE509 Lecture 5
CSE509 Lecture 5
 
Social Web 2.0 Class Week 4: Social Networks, Privacy
Social Web 2.0 Class Week 4: Social Networks, PrivacySocial Web 2.0 Class Week 4: Social Networks, Privacy
Social Web 2.0 Class Week 4: Social Networks, Privacy
 
Attention and Bias in Social Information Networks
Attention and Bias in Social Information NetworksAttention and Bias in Social Information Networks
Attention and Bias in Social Information Networks
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
 
The Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisThe Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its Analysis
 
DCLA14_Haythornthwaite_Absar_Paulin
DCLA14_Haythornthwaite_Absar_PaulinDCLA14_Haythornthwaite_Absar_Paulin
DCLA14_Haythornthwaite_Absar_Paulin
 
Witness session - Drs Seaman and Elliott
Witness session - Drs Seaman and ElliottWitness session - Drs Seaman and Elliott
Witness session - Drs Seaman and Elliott
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
Running&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docx
Running&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docxRunning&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docx
Running&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docx
 
Information Literacy for the Google Generation
Information Literacy for the Google GenerationInformation Literacy for the Google Generation
Information Literacy for the Google Generation
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
 
CFMC NWLC 20100818
CFMC NWLC 20100818CFMC NWLC 20100818
CFMC NWLC 20100818
 
Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6
 
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOA COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
 
Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systems
 
Social Network Analytics (SNA)
Social Network Analytics (SNA) Social Network Analytics (SNA)
Social Network Analytics (SNA)
 
2011 11 4_uci
2011 11 4_uci2011 11 4_uci
2011 11 4_uci
 
Hay network madness lasi14.pptx
Hay network madness lasi14.pptxHay network madness lasi14.pptx
Hay network madness lasi14.pptx
 
Social implications of social networking sites
Social implications of social networking sitesSocial implications of social networking sites
Social implications of social networking sites
 

More from Web Science Research Group at Institute of Business Administration, Karachi, Pakistan (7)

ReThinking CS Curriculum for Pakistan
ReThinking CS Curriculum for PakistanReThinking CS Curriculum for Pakistan
ReThinking CS Curriculum for Pakistan
 
Information Retrieval
Information RetrievalInformation Retrieval
Information Retrieval
 
Social Media Mining and Analytics
Social Media Mining and AnalyticsSocial Media Mining and Analytics
Social Media Mining and Analytics
 
CSE509 Lecture 4
CSE509 Lecture 4CSE509 Lecture 4
CSE509 Lecture 4
 
CSE509 Lecture 3
CSE509 Lecture 3CSE509 Lecture 3
CSE509 Lecture 3
 
CSE509 Lecture 2
CSE509 Lecture 2CSE509 Lecture 2
CSE509 Lecture 2
 
CSE509 Lecture 1
CSE509 Lecture 1CSE509 Lecture 1
CSE509 Lecture 1
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

CSE509 Lecture 6

  • 1. CSE509: Introduction to Web Science and Technology Lecture 6: Social Information Retrieval ArjumandYounus Web Science Research Group Institute of Business Administration (IBA)
  • 2. Last Time… Transition from Web 1.0 to Web 2.0 Social Media Characteristics Part I: Theoretical Aspects Social Networks as a Graph Properties of Social Networks Part II: Getting Hands-On Experience on Social Media Analytics Twitter Data Hacks Part III: Example Researches August 13, 2011
  • 3. Today Role of Today’s Web: Changing the way Information Needs are Satisfied Social Search Research Case by Microsoft Research: What do People Ask their Social Networks Techniques for Influence Analysis in Social Networks August 13, 2011
  • 4. Role of Today’s Web August 13, 2011 Marketing Tool Information Finding Tool Media Tool
  • 5. New Dimensions in Search with The Social Web Information Overload Search engines don’t always hold answers that users are looking for Smart Search (CNN Money) “The Web, they say, is leaving the era of search and entering one of discovery. What’s the difference? Search is what you do when you’re looking for something. Discovery is when something wonderful that you didn’t know existed, or didn’t know how to ask for, finds you.” August 13, 2011 What does that mean for search engines? Will they be left behind?
  • 6. Role of Today’s Web August 13, 2011 Marketing Tool Information Finding Tool Media Tool
  • 7. Social Search Takes into account the “social graph” of the person initiating the query Search activity in which users pose a question to their social networks Search systems using statistical analytics over traces left behind by others Conducting a search over an existing database of content previously provided by other users such as searching over the collection of public Twitter posts or searching through an archive of questions and answers August 13, 2011
  • 8. Social Search Benefits Reduced impact of link spamby lesser reliance on link structure of Web pages Increased relevance due to each result being selected by users Web pages relevance judged from reader’s perspective rather than author’s perspective More current results through constant feedback August 13, 2011 Improvements achieved by social search have not been quantified so far
  • 9. What Do People Ask Social Networks? Meredith Ringel Morris, MSR Jaime Teevan, MSR Katrina Panovich, MIT August 13, 2011
  • 10. Questions about People’s Questions What questions do people ask? How are the questions phrased? What are the question types and topics? Who asks which questions and why? Which questions get answered? How is answer speed and utility perceived? What are people’s motivations for answering? August 13, 2011
  • 11. Survey of Asking via Status Messages Survey content Used a status message to ask a question? Frequency of asking, question type, responses received Provide an example Answered a status message question? Why or why not? Provide an example 624 participants Focus on Facebook and Twitter behavior August 13, 2011
  • 13. Questions: Topics Missing: Health, Religion Politics, Dating, and Finance August 13, 2011
  • 14. Questions: Who Asks What August 13, 2011 men old Twitter women Facebook young
  • 15. Questions: Motives for Asking August 13, 2011
  • 16. Questions About People’s Questions What questions do people ask? How are the questions phrased? What are the question types and topics? Who asks which questions and why? Which questions get answered? How is answer speed and utility perceived? What are people’s motivations for answering? August 13, 2011
  • 17. Answers: Speed and Utility 94% of questions received an answer Answer speed A quarter in 30 minutes, almost all in a day People expected faster, but satisfied with speed Shorter questions got more useful responses Answer utility 69% of responses helpful August 13, 2011
  • 18. Answers: Speed and Utility Fast No correlation Unhelpful August 13, 2011
  • 19. Answers: Motives for Answering Motives for Not Answering - Don’t know the answer - Private topic - Question impersonal August 13, 2011
  • 20. Answers About People’s Questions The questions people ask Short, directed to “anyone” Subjective questions on acceptable topics Social relationships important motivators The questions that get answered Fast, helpful responses, related to length and type Answers motivated by altruism and expertise August 13, 2011
  • 21. Enhancing Search using Social Network Features Recency Crawling and Ranking Identification of Hot Topics on Social Web [YQG+11] News in the Making Trend analysis Event detection Real-Time Search Information Diffusion and Influence Analysis Community Detection Opinion Mining August 13, 2011
  • 22. August 13, 2011 Nodes, Ties and Influence
  • 23. Importance of Nodes Not all nodes are equally important Centrality Analysis Find out the most important nodes in one network Commonly-used Measures Degree Centrality Closeness Centrality Betweenness Centrality Eigenvector Centrality August 13, 2011
  • 24. Degree Centrality The importance of a node is determined by the number of nodes adjacent to it The larger the degree, the more import the node is Only a small number of nodes have high degrees in many real-life networks Degree Centrality Normalized Degree Centrality: For node 1, degree centrality is 3; Normalized degree centrality is 3/(9-1)=3/8. August 13, 2011
  • 25. Closeness Centrality “Central” nodes are important, as they can reach the whole network more quickly than non-central nodes Importance measured by how close a node is to other nodes Average Distance Closeness Centrality August 13, 2011
  • 26. Closeness Centrality Example Node 4 is more central than node 3 August 13, 2011
  • 27. Betweenness Centrality Node betweenness counts the number of shortest paths that pass one node Nodes with high betweenness are important in communication and information diffusion Betweenness Centrality The number of shortest paths between s and t The number of shortest paths between s and t that pass vi 26 August 13, 2011
  • 28. Betweenness Centrality Example The number of shortest paths between s and t The number of shortest paths between s and t that pass vi August 13, 2011
  • 29. Eigenvector Centrality One’s importance is determined by his friends’ If one has many important friends, he should be important as well. The centrality corresponds to the top eigenvector of the adjacency matrix A. A variant of this eigenvector centrality is the PageRank score. August 13, 2011
  • 30. Weak and Strong Ties In practice, connections are not of the same strength Interpersonal social networks are composed of strong ties (close friends) and weak ties (acquaintances) Strong ties and weak ties play different roles for community formation and information diffusion Strength of Weak Ties (Granovetter, 1973) Occasional encounters with distant acquaintances can provide important information about new opportunities for job search August 13, 2011
  • 31.
  • 32. Learning from Network Topology Bridges connecting two different communities are weak ties An edge is a bridge if its removal results in disconnection of its terminal nodes e(2,5) is a bridge e(2,5) is NOT a bridge August 13, 2011
  • 33. “shortcut” Bridge Bridges are rare in real-life networks Alternatively, one can relax the definition by checking if the distance between two terminal nodes increases if the edge is removed The larger the distance, the weaker the tie is d(2,5) = 4 if e(2,5) is removed d(5,6) = 2 if e(5,6) is removed e(5,6) is a stronger tie than e(2,5) August 13, 2011
  • 34. Neighborhood Overlap Tie Strength can be measured based on neighborhood overlap; the larger the overlap, the stronger the tie is -2 in the denominator is to exclude vi and vj August 13, 2011
  • 35. Neighborhood Overlap Tie Strength can be measured based on neighborhood overlap; the larger the overlap, the stronger the tie is -2 in the denominator is to exclude vi and vj August 13, 2011
  • 36. Learning from Profiles and Interactions Twitter: one can follow others without followee’s confirmation The real friendship network is determined by the frequency two users talk to each other, rather than the follower-followee network The real friendship network is more influential in driving Twitter usage Strengths of ties can be predicted accurately based on various information from Facebook Friend-initiated posts, message exchanged in wall post, number of mutual friends, etc. Learning numeric link strength by maximum likelihood estimation User profile similarity determines the strength Link strength in turn determines user interaction Maximize the likelihood based on observed profiles and interactions 35 August 13, 2011

Editor's Notes

  1. The past decade has witnessed the emergence of participatory Web and social media, bringing peopletogether in many creative ways. Millions of users are playing, tagging, working, and socializingonline, demonstrating new forms of collaboration, communication, and intelligence that were hardlyimaginable just a short time ago. Social media also helps reshape business models, sway opinions andemotions, and opens up numerous possibilities to study human interaction and collective behavior inan unparalleled scale. This lecture, from a data mining perspective, introduces characteristics of socialmedia, reviews representative tasks of computing with social media, and illustrates associated challenges.
  2. Term social search refers broadly to the process of finding info online with the assistance of social resources, such as by asking friends, reference librarians or unknown persons online for assistance.
  3. What Do People Ask Their Social Networks, and Why? A Survey Study of Status Message Q&A BehaviorMeredith Ringel Morris, Microsoft Research, USAJaime Teevan, Microsoft Research, USAKatrina Panovich, Massachusetts Institute of Technology, USAExplores the phenomenon of using social network status messages to ask questions, including the frequency of the behavior, the question types and topics, and people's motivation for asking and answering.[Survey people: Eaten at a restaurant in Atlanta? Chose the restaurant?]
  4. Understanding for what question types and topics people turn to a social network, rather than a search engine, and their motivations for doing so can help in designing next-generation search tools that integrate both search engine and social functionality
  5. Demographics:- Actively recruited interns – represented 27% of study population 26% female 40% 26-35 years old.- 98.1% have FB accounts. 71% have Twitter. Thus analysis focuses on these systems.
  6. Similar in some ways to popular search engine queries, although technology heavy.But some topics are missing: health and pornographyOther topics people said they wouldn’t ask about: religion, politics, dating, finance
  7. Recommendations fastest responses, then Opinion, then Factual
  8. WaelGhonim’s tweets shown on Google during Egypt uprising.
  9. “A small number of nodes have high degrees” thanks to the power law
  10. involves the computation of the average distance of one node to all the other nodes