SlideShare a Scribd company logo
CSE509: Introduction to Web Science and Technology Lecture 6: Social Information Retrieval ArjumandYounus Web Science Research Group Institute of Business Administration (IBA)
Last Time… Transition from Web 1.0 to Web 2.0 Social Media Characteristics Part I: Theoretical Aspects Social Networks as a Graph Properties of Social Networks Part II: Getting Hands-On Experience on Social Media Analytics Twitter Data Hacks Part III: Example Researches August 13, 2011
Today Role of Today’s Web: Changing the way Information Needs are Satisfied Social Search Research Case by Microsoft Research: What do People Ask their Social Networks Techniques for Influence Analysis in Social Networks August 13, 2011
Role of Today’s Web August 13, 2011 Marketing  Tool Information Finding Tool Media  Tool
New Dimensions in Search with The Social Web Information Overload Search engines don’t always hold answers that users are looking for Smart Search (CNN Money) “The Web, they say, is leaving the era of search and entering one of discovery. What’s the difference?  Search is what you do when you’re  looking for something. Discovery is when something wonderful that you didn’t know existed, or didn’t know how to ask for, finds you.” August 13, 2011 What does that mean for search engines? Will they be left behind?
Role of Today’s Web August 13, 2011 Marketing  Tool Information Finding Tool Media  Tool
Social Search Takes into account the “social graph” of the person initiating the query Search activity in which users pose a question to their social networks Search systems using statistical analytics over traces left behind by others Conducting a search over an existing database of content previously provided by other users such as searching over the collection of public Twitter posts or searching through an archive of questions and answers August 13, 2011
Social Search Benefits Reduced impact of link spamby lesser reliance on link structure of Web pages Increased relevance due to each result being selected by users Web pages relevance judged from reader’s perspective rather than author’s perspective More current results through constant feedback August 13, 2011 Improvements achieved by social search have not been quantified so far
What Do People Ask Social Networks? Meredith Ringel Morris, MSR Jaime Teevan, MSR Katrina Panovich, MIT August 13, 2011
Questions about People’s Questions What questions do people ask? How are the questions phrased? What are the question types and topics? Who asks which questions and why? Which questions get answered? How is answer speed and utility perceived? What are people’s motivations for answering? August 13, 2011
Survey of Asking via Status Messages Survey content Used a status message to ask a question? Frequency of asking, question type, responses received Provide an example Answered a status message question? Why or why not? Provide an example 624 participants Focus on Facebook and Twitter behavior August 13, 2011
Questions: Types August 13, 2011
Questions: Topics Missing: Health, Religion Politics, Dating, and Finance August 13, 2011
Questions: Who Asks What August 13, 2011 men old Twitter women Facebook young
Questions: Motives for Asking August 13, 2011
Questions About People’s Questions What questions do people ask? How are the questions phrased? What are the question types and topics? Who asks which questions and why? Which questions get answered? How is answer speed and utility perceived? What are people’s motivations for answering? August 13, 2011
Answers: Speed and Utility 94% of questions received an answer Answer speed A quarter in 30 minutes, almost all in a day People expected faster, but satisfied with speed Shorter questions got more useful responses Answer utility 69% of responses helpful August 13, 2011
Answers: Speed and Utility Fast No correlation Unhelpful August 13, 2011
Answers: Motives for Answering Motives for Not Answering - Don’t know the answer - Private topic - Question impersonal August 13, 2011
Answers About People’s Questions The questions people ask Short, directed to “anyone” Subjective questions on acceptable topics Social relationships important motivators The questions that get answered Fast, helpful responses, related to length and type Answers motivated by altruism and expertise August 13, 2011
Enhancing Search using Social Network Features  Recency Crawling and Ranking Identification of Hot Topics on Social Web [YQG+11] News in the Making Trend analysis Event detection Real-Time Search Information Diffusion and Influence Analysis Community Detection Opinion Mining August 13, 2011
August 13, 2011 Nodes, Ties and Influence
Importance of Nodes Not all nodes are equally important Centrality Analysis Find out the most important nodes in one network Commonly-used Measures Degree Centrality Closeness Centrality Betweenness Centrality Eigenvector Centrality August 13, 2011
Degree Centrality The importance of a node is determined by the number of nodes adjacent to it The larger the degree, the more import the node is Only a small number of nodes have high degrees in many real-life networks Degree Centrality Normalized Degree Centrality:   For node 1, degree centrality is 3; Normalized degree centrality is  3/(9-1)=3/8. August 13, 2011
Closeness Centrality “Central” nodes are important, as they can reach the whole network more quickly than non-central nodes Importance measured by how close a node is to other nodes Average Distance Closeness Centrality  August 13, 2011
Closeness Centrality Example Node 4 is more central than node 3 August 13, 2011
Betweenness Centrality Node betweenness counts the number of shortest paths that pass one node Nodes with high betweenness are important in communication and information diffusion Betweenness Centrality The number of shortest paths between s and t The number of shortest paths between s and t that pass vi 26 August 13, 2011
Betweenness Centrality Example The number of shortest paths between s and t The number of shortest paths between s and t that pass vi August 13, 2011
Eigenvector Centrality One’s importance is determined by his friends’ If one has many important friends, he should be important as well.  The centrality corresponds to the top eigenvector of the adjacency matrix A.  A variant of this eigenvector centrality is the PageRank score. August 13, 2011
Weak and Strong Ties In practice, connections are not of the same strength Interpersonal social networks are composed of strong ties (close friends) and weak ties (acquaintances) Strong ties and weak ties play different roles for community formation and information diffusion Strength of Weak Ties (Granovetter, 1973)  Occasional encounters with distant acquaintances can provide important information about new opportunities for job search August 13, 2011
Connections in Social Media ,[object Object],One user might have thousands of friends online Who are the most important ones among your 300 Facebook friends? ,[object Object],Analyze network topology Learn from User Profiles and Attributes August 13, 2011
Learning from Network Topology Bridges connecting two different communities are weak ties An edge is a bridge if its removal results in disconnection of its terminal nodes e(2,5) is a bridge e(2,5) is NOT a bridge August 13, 2011
“shortcut” Bridge Bridges are rare in real-life networks Alternatively, one can relax the definition by checking if  the distance between two terminal nodes increases if the edge is removed The larger the distance, the weaker the tie is d(2,5) = 4 if e(2,5) is removed d(5,6) = 2 if e(5,6) is removed e(5,6) is a stronger tie than e(2,5) August 13, 2011
Neighborhood Overlap Tie Strength can be measured based on neighborhood overlap; the larger the overlap, the stronger the tie is -2 in the denominator is to exclude vi and vj August 13, 2011
Neighborhood Overlap Tie Strength can be measured based on neighborhood overlap; the larger the overlap, the stronger the tie is -2 in the denominator is to exclude vi and vj August 13, 2011
Learning from Profiles and Interactions Twitter: one can follow others without followee’s confirmation The real friendship network is determined by the frequency two users talk to each other, rather than the follower-followee network The real friendship network is more influential in driving Twitter usage Strengths of ties can be predicted accurately based on various information from Facebook Friend-initiated posts, message exchanged in wall post,  number of mutual friends, etc.  Learning numeric link strength by maximum likelihood estimation User profile similarity determines the strength Link strength in turn determines user interaction Maximize the likelihood based on observed profiles and interactions 35 August 13, 2011

More Related Content

What's hot

09 Ego Network Analysis
09 Ego Network Analysis09 Ego Network Analysis
09 Ego Network Analysis
Duke Network Analysis Center
 
10 More than a Pretty Picture: Visual Thinking in Network Studies
10 More than a Pretty Picture: Visual Thinking in Network Studies10 More than a Pretty Picture: Visual Thinking in Network Studies
10 More than a Pretty Picture: Visual Thinking in Network Studies
dnac
 
13 Community Detection
13 Community Detection13 Community Detection
13 Community Detection
Duke Network Analysis Center
 
The Basics of Social Network Analysis
The Basics of Social Network AnalysisThe Basics of Social Network Analysis
The Basics of Social Network Analysis
Rory Sie
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
Arsalan Khan
 
01 Network Data Collection (2017)
01 Network Data Collection (2017)01 Network Data Collection (2017)
01 Network Data Collection (2017)
Duke Network Analysis Center
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation
Ratnesh Shah
 
Overview Of Network Analysis Platforms
Overview Of Network Analysis PlatformsOverview Of Network Analysis Platforms
Overview Of Network Analysis Platforms
Noah Flower
 
Social Network Analysis Introduction including Data Structure Graph overview.
Social Network Analysis Introduction including Data Structure Graph overview. Social Network Analysis Introduction including Data Structure Graph overview.
Social Network Analysis Introduction including Data Structure Graph overview.
Doug Needham
 
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
BAINIDA
 
Social Network Analysis: applications for education research
Social Network Analysis: applications for education researchSocial Network Analysis: applications for education research
Social Network Analysis: applications for education research
Christian Bokhove
 
Introduction to Social Network Analysis
Introduction to Social Network AnalysisIntroduction to Social Network Analysis
Introduction to Social Network Analysis
Toronto Metropolitan University
 
05 Network Canvas (2017)
05 Network Canvas (2017)05 Network Canvas (2017)
05 Network Canvas (2017)
Duke Network Analysis Center
 
00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview
Duke Network Analysis Center
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
Scott Gomer
 
Social network analysis intro part I
Social network analysis intro part ISocial network analysis intro part I
Social network analysis intro part I
THomas Plotkowiak
 
Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011
guillaume ereteo
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures
dnac
 
12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC
Duke Network Analysis Center
 
15 Network Visualization and Communities
15 Network Visualization and Communities15 Network Visualization and Communities
15 Network Visualization and Communities
Duke Network Analysis Center
 

What's hot (20)

09 Ego Network Analysis
09 Ego Network Analysis09 Ego Network Analysis
09 Ego Network Analysis
 
10 More than a Pretty Picture: Visual Thinking in Network Studies
10 More than a Pretty Picture: Visual Thinking in Network Studies10 More than a Pretty Picture: Visual Thinking in Network Studies
10 More than a Pretty Picture: Visual Thinking in Network Studies
 
13 Community Detection
13 Community Detection13 Community Detection
13 Community Detection
 
The Basics of Social Network Analysis
The Basics of Social Network AnalysisThe Basics of Social Network Analysis
The Basics of Social Network Analysis
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
01 Network Data Collection (2017)
01 Network Data Collection (2017)01 Network Data Collection (2017)
01 Network Data Collection (2017)
 
Social Network Analysis power point presentation
Social Network Analysis power point presentation Social Network Analysis power point presentation
Social Network Analysis power point presentation
 
Overview Of Network Analysis Platforms
Overview Of Network Analysis PlatformsOverview Of Network Analysis Platforms
Overview Of Network Analysis Platforms
 
Social Network Analysis Introduction including Data Structure Graph overview.
Social Network Analysis Introduction including Data Structure Graph overview. Social Network Analysis Introduction including Data Structure Graph overview.
Social Network Analysis Introduction including Data Structure Graph overview.
 
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
 
Social Network Analysis: applications for education research
Social Network Analysis: applications for education researchSocial Network Analysis: applications for education research
Social Network Analysis: applications for education research
 
Introduction to Social Network Analysis
Introduction to Social Network AnalysisIntroduction to Social Network Analysis
Introduction to Social Network Analysis
 
05 Network Canvas (2017)
05 Network Canvas (2017)05 Network Canvas (2017)
05 Network Canvas (2017)
 
00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview00 Introduction to SN&H: Key Concepts and Overview
00 Introduction to SN&H: Key Concepts and Overview
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Social network analysis intro part I
Social network analysis intro part ISocial network analysis intro part I
Social network analysis intro part I
 
Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011Social network analysis course 2010 - 2011
Social network analysis course 2010 - 2011
 
01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures01 Introduction to Networks Methods and Measures
01 Introduction to Networks Methods and Measures
 
12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC
 
15 Network Visualization and Communities
15 Network Visualization and Communities15 Network Visualization and Communities
15 Network Visualization and Communities
 

Similar to CSE509 Lecture 6

CSE509 Lecture 5
CSE509 Lecture 5CSE509 Lecture 5
Social Web 2.0 Class Week 4: Social Networks, Privacy
Social Web 2.0 Class Week 4: Social Networks, PrivacySocial Web 2.0 Class Week 4: Social Networks, Privacy
Social Web 2.0 Class Week 4: Social Networks, Privacy
Shelly D. Farnham, Ph.D.
 
Attention and Bias in Social Information Networks
Attention and Bias in Social Information NetworksAttention and Bias in Social Information Networks
Attention and Bias in Social Information Networks
Scott Counts
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
eSAT Publishing House
 
The Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisThe Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its Analysis
IJMER
 
DCLA14_Haythornthwaite_Absar_Paulin
DCLA14_Haythornthwaite_Absar_PaulinDCLA14_Haythornthwaite_Absar_Paulin
DCLA14_Haythornthwaite_Absar_Paulin
Simon Buckingham Shum
 
Witness session - Drs Seaman and Elliott
Witness session - Drs Seaman and ElliottWitness session - Drs Seaman and Elliott
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
Marc Smith
 
Running&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docx
Running&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docxRunning&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docx
Running&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docx
anhlodge
 
Information Literacy for the Google Generation
Information Literacy for the Google GenerationInformation Literacy for the Google Generation
Information Literacy for the Google Generation
Teresa S. Welsh
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
gloriakt
 
CFMC NWLC 20100818
CFMC NWLC 20100818CFMC NWLC 20100818
CFMC NWLC 20100818
Janet Shing
 
Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6
jiahao84
 
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOA COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
ijaia
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
editorjournal
 
Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systems
guest77b0cd12
 
Social Network Analytics (SNA)
Social Network Analytics (SNA) Social Network Analytics (SNA)
Social Network Analytics (SNA)
Joseph Asamoah
 
2011 11 4_uci
2011 11 4_uci2011 11 4_uci
2011 11 4_uci
Cliff Lampe
 
Hay network madness lasi14.pptx
Hay network madness lasi14.pptxHay network madness lasi14.pptx
Hay network madness lasi14.pptx
Caroline Haythornthwaite
 
Social implications of social networking sites
Social implications of social networking sitesSocial implications of social networking sites
Social implications of social networking sites
Petter Bae Brandtzæg
 

Similar to CSE509 Lecture 6 (20)

CSE509 Lecture 5
CSE509 Lecture 5CSE509 Lecture 5
CSE509 Lecture 5
 
Social Web 2.0 Class Week 4: Social Networks, Privacy
Social Web 2.0 Class Week 4: Social Networks, PrivacySocial Web 2.0 Class Week 4: Social Networks, Privacy
Social Web 2.0 Class Week 4: Social Networks, Privacy
 
Attention and Bias in Social Information Networks
Attention and Bias in Social Information NetworksAttention and Bias in Social Information Networks
Attention and Bias in Social Information Networks
 
Current trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networksCurrent trends of opinion mining and sentiment analysis in social networks
Current trends of opinion mining and sentiment analysis in social networks
 
The Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisThe Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its Analysis
 
DCLA14_Haythornthwaite_Absar_Paulin
DCLA14_Haythornthwaite_Absar_PaulinDCLA14_Haythornthwaite_Absar_Paulin
DCLA14_Haythornthwaite_Absar_Paulin
 
Witness session - Drs Seaman and Elliott
Witness session - Drs Seaman and ElliottWitness session - Drs Seaman and Elliott
Witness session - Drs Seaman and Elliott
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
Running&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docx
Running&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docxRunning&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docx
Running&head&YIK&YAK&AS&AN&ETHNOGRAPHIC&TOOL& &&&&&& 1&.docx
 
Information Literacy for the Google Generation
Information Literacy for the Google GenerationInformation Literacy for the Google Generation
Information Literacy for the Google Generation
 
Studying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & BiasStudying Cybercrime: Raising Awareness of Objectivity & Bias
Studying Cybercrime: Raising Awareness of Objectivity & Bias
 
CFMC NWLC 20100818
CFMC NWLC 20100818CFMC NWLC 20100818
CFMC NWLC 20100818
 
Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6
 
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBOA COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
A COMPREHENSIVE STUDY ON DATA EXTRACTION IN SINA WEIBO
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
 
Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systems
 
Social Network Analytics (SNA)
Social Network Analytics (SNA) Social Network Analytics (SNA)
Social Network Analytics (SNA)
 
2011 11 4_uci
2011 11 4_uci2011 11 4_uci
2011 11 4_uci
 
Hay network madness lasi14.pptx
Hay network madness lasi14.pptxHay network madness lasi14.pptx
Hay network madness lasi14.pptx
 
Social implications of social networking sites
Social implications of social networking sitesSocial implications of social networking sites
Social implications of social networking sites
 

More from Web Science Research Group at Institute of Business Administration, Karachi, Pakistan

ReThinking CS Curriculum for Pakistan
ReThinking CS Curriculum for PakistanReThinking CS Curriculum for Pakistan
Information Retrieval
Information RetrievalInformation Retrieval
Social Media Mining and Analytics
Social Media Mining and AnalyticsSocial Media Mining and Analytics
CSE509 Lecture 4
CSE509 Lecture 4CSE509 Lecture 4
CSE509 Lecture 3
CSE509 Lecture 3CSE509 Lecture 3
CSE509 Lecture 2
CSE509 Lecture 2CSE509 Lecture 2
CSE509 Lecture 1
CSE509 Lecture 1CSE509 Lecture 1

More from Web Science Research Group at Institute of Business Administration, Karachi, Pakistan (7)

ReThinking CS Curriculum for Pakistan
ReThinking CS Curriculum for PakistanReThinking CS Curriculum for Pakistan
ReThinking CS Curriculum for Pakistan
 
Information Retrieval
Information RetrievalInformation Retrieval
Information Retrieval
 
Social Media Mining and Analytics
Social Media Mining and AnalyticsSocial Media Mining and Analytics
Social Media Mining and Analytics
 
CSE509 Lecture 4
CSE509 Lecture 4CSE509 Lecture 4
CSE509 Lecture 4
 
CSE509 Lecture 3
CSE509 Lecture 3CSE509 Lecture 3
CSE509 Lecture 3
 
CSE509 Lecture 2
CSE509 Lecture 2CSE509 Lecture 2
CSE509 Lecture 2
 
CSE509 Lecture 1
CSE509 Lecture 1CSE509 Lecture 1
CSE509 Lecture 1
 

Recently uploaded

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 

Recently uploaded (20)

Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 

CSE509 Lecture 6

  • 1. CSE509: Introduction to Web Science and Technology Lecture 6: Social Information Retrieval ArjumandYounus Web Science Research Group Institute of Business Administration (IBA)
  • 2. Last Time… Transition from Web 1.0 to Web 2.0 Social Media Characteristics Part I: Theoretical Aspects Social Networks as a Graph Properties of Social Networks Part II: Getting Hands-On Experience on Social Media Analytics Twitter Data Hacks Part III: Example Researches August 13, 2011
  • 3. Today Role of Today’s Web: Changing the way Information Needs are Satisfied Social Search Research Case by Microsoft Research: What do People Ask their Social Networks Techniques for Influence Analysis in Social Networks August 13, 2011
  • 4. Role of Today’s Web August 13, 2011 Marketing Tool Information Finding Tool Media Tool
  • 5. New Dimensions in Search with The Social Web Information Overload Search engines don’t always hold answers that users are looking for Smart Search (CNN Money) “The Web, they say, is leaving the era of search and entering one of discovery. What’s the difference? Search is what you do when you’re looking for something. Discovery is when something wonderful that you didn’t know existed, or didn’t know how to ask for, finds you.” August 13, 2011 What does that mean for search engines? Will they be left behind?
  • 6. Role of Today’s Web August 13, 2011 Marketing Tool Information Finding Tool Media Tool
  • 7. Social Search Takes into account the “social graph” of the person initiating the query Search activity in which users pose a question to their social networks Search systems using statistical analytics over traces left behind by others Conducting a search over an existing database of content previously provided by other users such as searching over the collection of public Twitter posts or searching through an archive of questions and answers August 13, 2011
  • 8. Social Search Benefits Reduced impact of link spamby lesser reliance on link structure of Web pages Increased relevance due to each result being selected by users Web pages relevance judged from reader’s perspective rather than author’s perspective More current results through constant feedback August 13, 2011 Improvements achieved by social search have not been quantified so far
  • 9. What Do People Ask Social Networks? Meredith Ringel Morris, MSR Jaime Teevan, MSR Katrina Panovich, MIT August 13, 2011
  • 10. Questions about People’s Questions What questions do people ask? How are the questions phrased? What are the question types and topics? Who asks which questions and why? Which questions get answered? How is answer speed and utility perceived? What are people’s motivations for answering? August 13, 2011
  • 11. Survey of Asking via Status Messages Survey content Used a status message to ask a question? Frequency of asking, question type, responses received Provide an example Answered a status message question? Why or why not? Provide an example 624 participants Focus on Facebook and Twitter behavior August 13, 2011
  • 13. Questions: Topics Missing: Health, Religion Politics, Dating, and Finance August 13, 2011
  • 14. Questions: Who Asks What August 13, 2011 men old Twitter women Facebook young
  • 15. Questions: Motives for Asking August 13, 2011
  • 16. Questions About People’s Questions What questions do people ask? How are the questions phrased? What are the question types and topics? Who asks which questions and why? Which questions get answered? How is answer speed and utility perceived? What are people’s motivations for answering? August 13, 2011
  • 17. Answers: Speed and Utility 94% of questions received an answer Answer speed A quarter in 30 minutes, almost all in a day People expected faster, but satisfied with speed Shorter questions got more useful responses Answer utility 69% of responses helpful August 13, 2011
  • 18. Answers: Speed and Utility Fast No correlation Unhelpful August 13, 2011
  • 19. Answers: Motives for Answering Motives for Not Answering - Don’t know the answer - Private topic - Question impersonal August 13, 2011
  • 20. Answers About People’s Questions The questions people ask Short, directed to “anyone” Subjective questions on acceptable topics Social relationships important motivators The questions that get answered Fast, helpful responses, related to length and type Answers motivated by altruism and expertise August 13, 2011
  • 21. Enhancing Search using Social Network Features Recency Crawling and Ranking Identification of Hot Topics on Social Web [YQG+11] News in the Making Trend analysis Event detection Real-Time Search Information Diffusion and Influence Analysis Community Detection Opinion Mining August 13, 2011
  • 22. August 13, 2011 Nodes, Ties and Influence
  • 23. Importance of Nodes Not all nodes are equally important Centrality Analysis Find out the most important nodes in one network Commonly-used Measures Degree Centrality Closeness Centrality Betweenness Centrality Eigenvector Centrality August 13, 2011
  • 24. Degree Centrality The importance of a node is determined by the number of nodes adjacent to it The larger the degree, the more import the node is Only a small number of nodes have high degrees in many real-life networks Degree Centrality Normalized Degree Centrality: For node 1, degree centrality is 3; Normalized degree centrality is 3/(9-1)=3/8. August 13, 2011
  • 25. Closeness Centrality “Central” nodes are important, as they can reach the whole network more quickly than non-central nodes Importance measured by how close a node is to other nodes Average Distance Closeness Centrality August 13, 2011
  • 26. Closeness Centrality Example Node 4 is more central than node 3 August 13, 2011
  • 27. Betweenness Centrality Node betweenness counts the number of shortest paths that pass one node Nodes with high betweenness are important in communication and information diffusion Betweenness Centrality The number of shortest paths between s and t The number of shortest paths between s and t that pass vi 26 August 13, 2011
  • 28. Betweenness Centrality Example The number of shortest paths between s and t The number of shortest paths between s and t that pass vi August 13, 2011
  • 29. Eigenvector Centrality One’s importance is determined by his friends’ If one has many important friends, he should be important as well. The centrality corresponds to the top eigenvector of the adjacency matrix A. A variant of this eigenvector centrality is the PageRank score. August 13, 2011
  • 30. Weak and Strong Ties In practice, connections are not of the same strength Interpersonal social networks are composed of strong ties (close friends) and weak ties (acquaintances) Strong ties and weak ties play different roles for community formation and information diffusion Strength of Weak Ties (Granovetter, 1973) Occasional encounters with distant acquaintances can provide important information about new opportunities for job search August 13, 2011
  • 31.
  • 32. Learning from Network Topology Bridges connecting two different communities are weak ties An edge is a bridge if its removal results in disconnection of its terminal nodes e(2,5) is a bridge e(2,5) is NOT a bridge August 13, 2011
  • 33. “shortcut” Bridge Bridges are rare in real-life networks Alternatively, one can relax the definition by checking if the distance between two terminal nodes increases if the edge is removed The larger the distance, the weaker the tie is d(2,5) = 4 if e(2,5) is removed d(5,6) = 2 if e(5,6) is removed e(5,6) is a stronger tie than e(2,5) August 13, 2011
  • 34. Neighborhood Overlap Tie Strength can be measured based on neighborhood overlap; the larger the overlap, the stronger the tie is -2 in the denominator is to exclude vi and vj August 13, 2011
  • 35. Neighborhood Overlap Tie Strength can be measured based on neighborhood overlap; the larger the overlap, the stronger the tie is -2 in the denominator is to exclude vi and vj August 13, 2011
  • 36. Learning from Profiles and Interactions Twitter: one can follow others without followee’s confirmation The real friendship network is determined by the frequency two users talk to each other, rather than the follower-followee network The real friendship network is more influential in driving Twitter usage Strengths of ties can be predicted accurately based on various information from Facebook Friend-initiated posts, message exchanged in wall post, number of mutual friends, etc. Learning numeric link strength by maximum likelihood estimation User profile similarity determines the strength Link strength in turn determines user interaction Maximize the likelihood based on observed profiles and interactions 35 August 13, 2011

Editor's Notes

  1. The past decade has witnessed the emergence of participatory Web and social media, bringing peopletogether in many creative ways. Millions of users are playing, tagging, working, and socializingonline, demonstrating new forms of collaboration, communication, and intelligence that were hardlyimaginable just a short time ago. Social media also helps reshape business models, sway opinions andemotions, and opens up numerous possibilities to study human interaction and collective behavior inan unparalleled scale. This lecture, from a data mining perspective, introduces characteristics of socialmedia, reviews representative tasks of computing with social media, and illustrates associated challenges.
  2. Term social search refers broadly to the process of finding info online with the assistance of social resources, such as by asking friends, reference librarians or unknown persons online for assistance.
  3. What Do People Ask Their Social Networks, and Why? A Survey Study of Status Message Q&A BehaviorMeredith Ringel Morris, Microsoft Research, USAJaime Teevan, Microsoft Research, USAKatrina Panovich, Massachusetts Institute of Technology, USAExplores the phenomenon of using social network status messages to ask questions, including the frequency of the behavior, the question types and topics, and people's motivation for asking and answering.[Survey people: Eaten at a restaurant in Atlanta? Chose the restaurant?]
  4. Understanding for what question types and topics people turn to a social network, rather than a search engine, and their motivations for doing so can help in designing next-generation search tools that integrate both search engine and social functionality
  5. Demographics:- Actively recruited interns – represented 27% of study population 26% female 40% 26-35 years old.- 98.1% have FB accounts. 71% have Twitter. Thus analysis focuses on these systems.
  6. Similar in some ways to popular search engine queries, although technology heavy.But some topics are missing: health and pornographyOther topics people said they wouldn’t ask about: religion, politics, dating, finance
  7. Recommendations fastest responses, then Opinion, then Factual
  8. WaelGhonim’s tweets shown on Google during Egypt uprising.
  9. “A small number of nodes have high degrees” thanks to the power law
  10. involves the computation of the average distance of one node to all the other nodes