SlideShare a Scribd company logo
The social analytics, analyzes and interprets the data referring to social media and in
this specific chapter emphasis is placed on social networks and some advantages
and disadvantages that are presented in them.
In the part of the analytics allows and facilitates companies to analyze unstructured
data in different portals whether they are web or text messages, using different
software tools to obtain information in real time, social analytics is nowadays very
useful in the business or business sector as it helps companies analyze, calculate
and explain social networks in a better way to a specific business object, since this
branch is based on the general theory of networks in the field of communications.
Social analysis allows organizations to use key indicators of performance through
tools such as social metrics (which allow quantifying, measuring and doing a proper
statistical and reporting on the activity of social media, these have a meaning and
commercial context representing their functionality for the organization) and another
tool are the key performance indicators (they have a metric to be able to quantify
data regarding the objectives of the web portal).
It also provides the necessary data, but it is not so easy with the saturation of
information that they have to deal with every day, thanks to the fact that too much
information is disseminated on social networks and the data that can be extracted
can not be properly collected. to obtain certain information, for that a methodical
approach is needed to avoid avoiding the information overload and in such a way not
to have the correct data that was wished to obtain.

More Related Content

Similar to Social analytics

Data Visualization Tools and Techniques for Datasets in Big Data
Data Visualization Tools and Techniques for Datasets in Big DataData Visualization Tools and Techniques for Datasets in Big Data
Data Visualization Tools and Techniques for Datasets in Big Data
IRJET Journal
 
Big Data Analytics : Existing Systems and Future Challenges – A Review
Big Data Analytics : Existing Systems and Future Challenges – A ReviewBig Data Analytics : Existing Systems and Future Challenges – A Review
Big Data Analytics : Existing Systems and Future Challenges – A Review
IRJET Journal
 
Web analytics
Web analyticsWeb analytics
Web analytics
santiagojimenez89
 
Web a
Web aWeb a
Social analytic
Social analyticSocial analytic
Social analytic
DIEGOFERNANDO214
 
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
IJET - International Journal of Engineering and Techniques
 
IRJET- Virtual Business Analyst using a Progressive Web Application
IRJET- Virtual Business Analyst using a Progressive Web ApplicationIRJET- Virtual Business Analyst using a Progressive Web Application
IRJET- Virtual Business Analyst using a Progressive Web Application
IRJET Journal
 
IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET -  	  Sentiment Analysis of Posts and Comments of OSNIRJET -  	  Sentiment Analysis of Posts and Comments of OSN
IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET Journal
 
Sentiment analysis and classification of tweets using rapid miner tool
Sentiment analysis and classification of tweets using rapid miner toolSentiment analysis and classification of tweets using rapid miner tool
Sentiment analysis and classification of tweets using rapid miner tool
Valarmathi Srinivasan
 
Hypersoft Social Network Analysis
Hypersoft Social Network AnalysisHypersoft Social Network Analysis
Hypersoft Social Network AnalysisDavidHypersoft
 
Bsa 411 preview full class
Bsa 411 preview full classBsa 411 preview full class
Bsa 411 preview full class
fasthomeworkhelpdotcome
 
Product Analyst Advisor
Product Analyst AdvisorProduct Analyst Advisor
Product Analyst Advisor
IRJET Journal
 
Strategic thinking for a digital age
Strategic thinking for a digital ageStrategic thinking for a digital age
Strategic thinking for a digital age
Omar Khan
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
Journal For Research
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paper
Firas Husseini
 
Strategy for Social Engagement & Monitoring
Strategy for Social Engagement & MonitoringStrategy for Social Engagement & Monitoring
Strategy for Social Engagement & Monitoring
C.Y Wong
 
Thebigdatastrategyusingsocialmedia 140126142538-phpapp01
Thebigdatastrategyusingsocialmedia 140126142538-phpapp01Thebigdatastrategyusingsocialmedia 140126142538-phpapp01
Thebigdatastrategyusingsocialmedia 140126142538-phpapp01聪 徐
 
Effects of business intelligence techniques on enterprise
Effects of business intelligence techniques on enterpriseEffects of business intelligence techniques on enterprise
Effects of business intelligence techniques on enterprise
Chethan H Amaresh reddy
 
Business modeling with UML Eriksson-Penker Notation
Business modeling with UML Eriksson-Penker NotationBusiness modeling with UML Eriksson-Penker Notation
Business modeling with UML Eriksson-Penker Notation
Massimo Talia
 

Similar to Social analytics (20)

Data Visualization Tools and Techniques for Datasets in Big Data
Data Visualization Tools and Techniques for Datasets in Big DataData Visualization Tools and Techniques for Datasets in Big Data
Data Visualization Tools and Techniques for Datasets in Big Data
 
Big Data Analytics : Existing Systems and Future Challenges – A Review
Big Data Analytics : Existing Systems and Future Challenges – A ReviewBig Data Analytics : Existing Systems and Future Challenges – A Review
Big Data Analytics : Existing Systems and Future Challenges – A Review
 
Web analytics
Web analyticsWeb analytics
Web analytics
 
Web a
Web aWeb a
Web a
 
Social analytic
Social analyticSocial analytic
Social analytic
 
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
 
IRJET- Virtual Business Analyst using a Progressive Web Application
IRJET- Virtual Business Analyst using a Progressive Web ApplicationIRJET- Virtual Business Analyst using a Progressive Web Application
IRJET- Virtual Business Analyst using a Progressive Web Application
 
IRJET - Sentiment Analysis of Posts and Comments of OSN
IRJET -  	  Sentiment Analysis of Posts and Comments of OSNIRJET -  	  Sentiment Analysis of Posts and Comments of OSN
IRJET - Sentiment Analysis of Posts and Comments of OSN
 
Sentiment analysis and classification of tweets using rapid miner tool
Sentiment analysis and classification of tweets using rapid miner toolSentiment analysis and classification of tweets using rapid miner tool
Sentiment analysis and classification of tweets using rapid miner tool
 
Hypersoft Social Network Analysis
Hypersoft Social Network AnalysisHypersoft Social Network Analysis
Hypersoft Social Network Analysis
 
Bsa 411 preview full class
Bsa 411 preview full classBsa 411 preview full class
Bsa 411 preview full class
 
Product Analyst Advisor
Product Analyst AdvisorProduct Analyst Advisor
Product Analyst Advisor
 
Strategic thinking for a digital age
Strategic thinking for a digital ageStrategic thinking for a digital age
Strategic thinking for a digital age
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paper
 
Strategy for Social Engagement & Monitoring
Strategy for Social Engagement & MonitoringStrategy for Social Engagement & Monitoring
Strategy for Social Engagement & Monitoring
 
Thebigdatastrategyusingsocialmedia 140126142538-phpapp01
Thebigdatastrategyusingsocialmedia 140126142538-phpapp01Thebigdatastrategyusingsocialmedia 140126142538-phpapp01
Thebigdatastrategyusingsocialmedia 140126142538-phpapp01
 
Effects of business intelligence techniques on enterprise
Effects of business intelligence techniques on enterpriseEffects of business intelligence techniques on enterprise
Effects of business intelligence techniques on enterprise
 
Business modeling with UML Eriksson-Penker Notation
Business modeling with UML Eriksson-Penker NotationBusiness modeling with UML Eriksson-Penker Notation
Business modeling with UML Eriksson-Penker Notation
 
vishwas
vishwasvishwas
vishwas
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Social analytics

  • 1. The social analytics, analyzes and interprets the data referring to social media and in this specific chapter emphasis is placed on social networks and some advantages and disadvantages that are presented in them. In the part of the analytics allows and facilitates companies to analyze unstructured data in different portals whether they are web or text messages, using different software tools to obtain information in real time, social analytics is nowadays very useful in the business or business sector as it helps companies analyze, calculate and explain social networks in a better way to a specific business object, since this branch is based on the general theory of networks in the field of communications. Social analysis allows organizations to use key indicators of performance through tools such as social metrics (which allow quantifying, measuring and doing a proper statistical and reporting on the activity of social media, these have a meaning and commercial context representing their functionality for the organization) and another tool are the key performance indicators (they have a metric to be able to quantify data regarding the objectives of the web portal). It also provides the necessary data, but it is not so easy with the saturation of information that they have to deal with every day, thanks to the fact that too much information is disseminated on social networks and the data that can be extracted can not be properly collected. to obtain certain information, for that a methodical approach is needed to avoid avoiding the information overload and in such a way not to have the correct data that was wished to obtain.