SOCIAL MEDIA NEWS: MOTIVATION, PURPOSE AND USAGEijcsit
This paper presents the results of an online survey which was conducted to analyse the use of social web in
the context of daily news. Users’ motivation and habit in the news consumption were focused. Moreover,
users’ news behaviour was distinguished in three purposes such news consumption, news production and
news dissemination to find out if the usage has a passive or active character. In a second step it was
questioned which social software is used for which purpose. In conclusion users appreciate social software
for features such as interactivity and information that traditional media does not provide. Among the social
web platforms users prefer social networking sites as well as videoshare platforms. Social networking sites
also rank first in the news production and dissemination.
SOCIAL MEDIA NEWS: MOTIVATION, PURPOSE AND USAGEijcsit
This paper presents the results of an online survey which was conducted to analyse the use of social web in
the context of daily news. Users’ motivation and habit in the news consumption were focused. Moreover,
users’ news behaviour was distinguished in three purposes such news consumption, news production and
news dissemination to find out if the usage has a passive or active character. In a second step it was
questioned which social software is used for which purpose. In conclusion users appreciate social software
for features such as interactivity and information that traditional media does not provide. Among the social
web platforms users prefer social networking sites as well as videoshare platforms. Social networking sites
also rank first in the news production and dissemination.
This presentation gives insights on social media tools that can be used by libraries. Likewise, it includes points to ponder before delving into this new world (for some it is still) of social media.
A century from now historians may look back on the beginning of the era of ubiquitous computing and note how human behavior fundamentally changed, when access to information and communication became instantaneous for nearly every person across the world.
This 6-page document on Social Networking Sites discusses various topics like : comparison of SNS, working of SNS, uses and disadvantages of social networking sites, etc.
This Microsoft word document is in IEEE 2013 standard format.
In this presentation, we present a framework that defines social media using seven functional building blocks: identity, presence, relationships, conversations, groups, reputations and sharing. As different social media activities are defined by the extent to which they focus on some or all of these blocks, we explain the implications that each block can have for how firms should engage with social media. To conclude we present a number of recommendations for how firms should develop strategies for monitoring, understanding and responding to different social media activities.
The fusion of hardware equipment, precise software, GUI (Graphical User Interface), and effective communication network is the present composition of ICT Network. Perhaps one of the widely used information system today, the World Wide Web, is the product of this fusion. Almost everyday, people go to the World Wide Web for directions, instructions, information, and even entertainment. Furthermore, Internet applications and even Internet browsers work as tools for communication and transmission of information from one point to another.
The social network is a theoretical construct useful in the social sciences to study relationships between individuals, groups, organizations, or even entire societies.
These PowerPoints are for my course called Social Media Marketing Campaigns, which is offered at DCTC. Dakota County Technical College is located south of the Twin Cities, MN. The slides are build from the textbook: Social Media Marketing by Tracy Tuten and Michael Solomon. The course can be taken online or in the classroom.
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-042012-cyber-warfare/
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-bible-12012/
Reference Services & Social Networking - Being on the cutting edge of engagmentAriel Dagan
An analysis of current Reference Services trends in use of Social Networking by libraries in North America and Canada. This is part of a presentation of graduate work in Reference and Information Services at University of Rhode Island with Professor Amanda Izenstark.
This presentation gives insights on social media tools that can be used by libraries. Likewise, it includes points to ponder before delving into this new world (for some it is still) of social media.
A century from now historians may look back on the beginning of the era of ubiquitous computing and note how human behavior fundamentally changed, when access to information and communication became instantaneous for nearly every person across the world.
This 6-page document on Social Networking Sites discusses various topics like : comparison of SNS, working of SNS, uses and disadvantages of social networking sites, etc.
This Microsoft word document is in IEEE 2013 standard format.
In this presentation, we present a framework that defines social media using seven functional building blocks: identity, presence, relationships, conversations, groups, reputations and sharing. As different social media activities are defined by the extent to which they focus on some or all of these blocks, we explain the implications that each block can have for how firms should engage with social media. To conclude we present a number of recommendations for how firms should develop strategies for monitoring, understanding and responding to different social media activities.
The fusion of hardware equipment, precise software, GUI (Graphical User Interface), and effective communication network is the present composition of ICT Network. Perhaps one of the widely used information system today, the World Wide Web, is the product of this fusion. Almost everyday, people go to the World Wide Web for directions, instructions, information, and even entertainment. Furthermore, Internet applications and even Internet browsers work as tools for communication and transmission of information from one point to another.
The social network is a theoretical construct useful in the social sciences to study relationships between individuals, groups, organizations, or even entire societies.
These PowerPoints are for my course called Social Media Marketing Campaigns, which is offered at DCTC. Dakota County Technical College is located south of the Twin Cities, MN. The slides are build from the textbook: Social Media Marketing by Tracy Tuten and Michael Solomon. The course can be taken online or in the classroom.
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-042012-cyber-warfare/
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-bible-12012/
Reference Services & Social Networking - Being on the cutting edge of engagmentAriel Dagan
An analysis of current Reference Services trends in use of Social Networking by libraries in North America and Canada. This is part of a presentation of graduate work in Reference and Information Services at University of Rhode Island with Professor Amanda Izenstark.
COMMENTARY
Virtual Boundaries: Ethical Considerations for
Use of Social Media in Social Work
Ericka Kimball and JaeRan Kim
S
ociety has become more interactive through
increased access and use of the Internet and
social media tools. Web 2.0 moved the
Internet beyond information storage to a place
where discourse takes place (Sawmiller, 2010).
Social media, Internet tools that facUitate online
interactions, have the potential to further expand
such discourses. Social networks (for example,
Facebook, Google + , Linkedin), blogs (for exam-
ple, Wordpress, Typepad), and microblogs (for
example. Twitter, Tumblr) are types of social
media tools that allow people to connect and share
infomiation in an onhne space. People use social
media tools to report information, present opin-
ions, and solicit convenation through their own
domains or dedicated websites. All of this online
interaction, enabled further by increases in smart-
phone and networked tablet devise usage, poses
the potential for personal and professional lives to
cross in social media spaces.
Existing literature has focused on the ethical
challenges of social media in professional practice
with clients, use of social media as an expansion of
research, and for online learning (Eccles, 2010;
Giffords, 2009; NASW & Associarion of Social
Work Boards [ASWB], 2005). However, the con-
versation around ethical use of social media, out-
side the client—professional relationship, is missing.
Areas in which greater discussion is needed include
advising students and setting agency pohcies on
ethical uses of social media and on the effects of
personal use of social media among professional
relationships.
This article is about creating virtual boundaries—
the limits social workers place to guide their social
media use—to create intentional online personas
and about the effects of social media use in the
intemiingling of personal and professional lives.
Social workers need to be aware of the identities
they create and maintain in the realm of social
media because of ethical codes and policies. The
various forms and uses of social media are discussed
to provide an understanding of the benefits and
consequences of social media. An overview of eth-
ical considerations is presented along with recom-
mendations on creating virtual boundaries for
personal and professional use of social media.
FORMS AND USES OF SOCIAL MEDIA
Although the forms and uses of social media are
constantly changing, blogs, microblogs, and social
networking sites have proved to be some of the
more popular social media tools over the last sev-
eral years. Other social media tools, such as virtual
world games, photo sharing, and information
management sites, may be lesser-used tools but are
StiU important to consider when setting virtual
boundaries.
Blog and Microblog
A blog (or Weblog) is defined as an online journal of
personal reñections, opinions, and comments.
Microblog content may also include personal reflec-
tions, opin.
COMMENTARY
Virtual Boundaries: Ethical Considerations for
Use of Social Media in Social Work
Ericka Kimball and JaeRan Kim
S
ociety has become more interactive through
increased access and use of the Internet and
social media tools. Web 2.0 moved the
Internet beyond information storage to a place
where discourse takes place (Sawmiller, 2010).
Social media, Internet tools that facUitate online
interactions, have the potential to further expand
such discourses. Social networks (for example,
Facebook, Google + , Linkedin), blogs (for exam-
ple, Wordpress, Typepad), and microblogs (for
example. Twitter, Tumblr) are types of social
media tools that allow people to connect and share
infomiation in an onhne space. People use social
media tools to report information, present opin-
ions, and solicit convenation through their own
domains or dedicated websites. All of this online
interaction, enabled further by increases in smart-
phone and networked tablet devise usage, poses
the potential for personal and professional lives to
cross in social media spaces.
Existing literature has focused on the ethical
challenges of social media in professional practice
with clients, use of social media as an expansion of
research, and for online learning (Eccles, 2010;
Giffords, 2009; NASW & Associarion of Social
Work Boards [ASWB], 2005). However, the con-
versation around ethical use of social media, out-
side the client—professional relationship, is missing.
Areas in which greater discussion is needed include
advising students and setting agency pohcies on
ethical uses of social media and on the effects of
personal use of social media among professional
relationships.
This article is about creating virtual boundaries—
the limits social workers place to guide their social
media use—to create intentional online personas
and about the effects of social media use in the
intemiingling of personal and professional lives.
Social workers need to be aware of the identities
they create and maintain in the realm of social
media because of ethical codes and policies. The
various forms and uses of social media are discussed
to provide an understanding of the benefits and
consequences of social media. An overview of eth-
ical considerations is presented along with recom-
mendations on creating virtual boundaries for
personal and professional use of social media.
FORMS AND USES OF SOCIAL MEDIA
Although the forms and uses of social media are
constantly changing, blogs, microblogs, and social
networking sites have proved to be some of the
more popular social media tools over the last sev-
eral years. Other social media tools, such as virtual
world games, photo sharing, and information
management sites, may be lesser-used tools but are
StiU important to consider when setting virtual
boundaries.
Blog and Microblog
A blog (or Weblog) is defined as an online journal of
personal reñections, opinions, and comments.
Microblog content may also include personal reflec-
tions, opin.
Social media explained and made easy. Definitions of what social media is. Types of social media: bookmarking, networking, forums, aggregators. The benefits of social media for individuals and business.
Social Media and Social Media Marketing: A Literature Reviewiosrjce
Social media and social media marketing are sometimes used interchangeably, but two indeed are
different. The purpose of this research paper is to revisit the literature on both concepts and correlates them in
technical terminologies. We have studied the literature available on Social media first and identified the basic
functionalities of it. Then the literature available on social media marketing helped us in identifying its
dimensions. In conclusion section of the research paper we have correlated the two concepts and redefined
social media marketing in technical terms.
The Influcence of Twitter on Academic EnvironmentMartin Ebner
Draft version of article of the book "Social Media and the New Academic Environment: Pedagogical Challenges" http://www.igi-global.com/book/social-media-new-academic-environment/69841#description
Social media platforms provide a vast audience base, allowing businesses to reach a wider range of potential customers. By creating engaging content and actively participating in social media conversations, companies can enhance their brand visibility and recognition.
Source: https://buysocialpack.net/product/buy-google-reviews/
Social networks have been part of our daily lives for years. It is estimated that more than half of the world’s population uses them, which means more than 4 billion people.
For marketers, social networks are an unbeatable opportunity to publicize a brand among customers and target audiences. But would you know how to define what a social network is and how it differs from social media? How can you choose the best one for your brand? What are the most popular social networks and what are their marketing advantages? We tell you everything in this article!
Literature Review of Information Behaviour on Social MediaDavid Thompson
Using your knowledge about information resource and skills in searching and evaluating information achieved in the first half of the semester, now you are required to choose a specific topic in the area of information research, explore the exisiting literature within this domain and write a literature review.
Social media Marketing Presentation by vaibhavjainVaibhav Jain
This is a Social media Presentation made by me a few months ago with a few Basics inside the PPT. Hope it Helps you to Grow your business. the Images used here are From Search Engine's and i hereby do not Claim to be the owner of the same. This PPT is in the interest of People and the content is wholly Written by me(@followvaibhav).
Esta fue la presentación que finalmente me sirvió de base para el taller introductorio sobre social media del 9 de mayo 2011 en Málaga. A todos los que me ayudaron a prepararla (vía twitter y Linkedin) y a los que me inocularon la pasión por los Social Media, Gracias!!!Se admiten todos los comentarios y sugerencias que queráis hacerme.
Here is the presentation that finally became the basis for the introductory workshop on social media on 9 May 2011 in Malaga. To all who helped to prepare it (also via Twitter and LinkedIn) and inoculated in me the passion for Social Media, Thanks!
All comments and suggestions are welcome!!
More info at: https://aprendoylocuento.wordpress.com/2011/05/14/taller-muy-introdutorio-sobre-social-media-9-de-mayo-en-malaga/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
U180203134138
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. III (Mar-Apr. 2016), PP 134-138
www.iosrjournals.org
DOI: 10.9790/0661-180203134138 www.iosrjournals.org 134 | Page
Review on Comment Volume Prediction
Mandeep Kaur1,
Prince Verma2
Computer Science engg.CTIEM Jalandhar,Punjab
Abstract: In this paper we present the concept of social media and its various functional building blocks.
Social media has become an ubiquitous part of social networking and content sharing. Social media make use of
mobile and web to create the platforms with which individuals and communities share, discuss, and modify
user-generated content. This is examined that social media user’s comments are also very much influential in
order to make or change people’s perception and to bring some topic in trending. Different techniques have
been proposed for comment volume prediction which are discussed in the literature survey.
Keywords: Social media, Conversations, Sharing, Reputation, Comment volume.
I. INTRODUCTION
Initially Internet was explored for limited purposes as for reading, watching or shopping only. But
today‟s consumers are more intelligent and are utilizing platforms such as blogs, content sharing sites, wikipedia
and social networking to create, converse and share Internet content. SixDegrees.com was the first social
network site, launched in 1997. It allowed the users to create their profiles, list their contacts and surf the
Friends lists only.
But now, there exists a rich ecology of social media sites, that vary in terms of their functionality and
scope. Some of them are for the general purposes, like Facebook, Hi5, and Friendster, where MySpace,
YouTube are media sharing sites which focus on shared videos and photos. While other sites such as LinkedIn
are meant for professional networks. Even weblogs after a slow progress in the late 1990s have become very
popular, as they are easy to create and manage. The authors of weblogs range from a normal person to
professional writers and celebrities. Now a days, the „blogosphere‟ has become a significant source of public
opinion with more than 100 million blogs and their interconnections. Even there are search engines, i.e.
Technorati, that are dedicated to searching blogs[20]. Twitter is also getting popular as there more than 300
million active users are available on twitter by 2016.
Social networking sites have become a popular platform for people to share information and
communicate with others, which can significantly affect a firm‟s reputation, survival and sale‟s revenues. These
services are acting as a multi-tool with routine applications e.g. news, advertisements, communication,
commenting, banking, marketing etc.
Facebook is getting the position of being most popular social networking site, as in Facebook, the daily data
ingested into the databases, is beyond 500 terabytes, In one of the FB‟s largest Hadoop clusters there is 100 plus
petabytes of disk space and the content items shared per day is about 2.5 billion [1].
Fig. 1. Number of active users in millions and social networks
Figure 1. gives the information on the most popular networks worldwide as of January 2016, ranked
by the number of active accounts. Active users are those which have logged in during the last 30 days. With a
constant presence in the lives of their users, social networks have a strong social impact.
II. SOCIAL MEDIA FUNCTIONAL BLOCKS
2. Review On Comment Volume Prediction
DOI: 10.9790/0661-180203134138 www.iosrjournals.org 135 | Page
Different levels of social media functionalities are mainly constructed from these basic seven blocks:
Fig. 2. Social media functionality constructs
Identity: It is the extent to which users reveal themselves to others. The information that user disclosed can be
name, gender, age, location, profession or the information that portrays him in certain ways. There are many
different social media platforms which are built around identity and require users to set up profiles like
Facebook. As identity is the core to different social media sites, the major issue that needs attention is privacy.
Though users willingly make public their identities on various social media sites, but they also have serious
concerns about how other firms view and use their information for data mining and the extent to which social
media platforms passively or actively encourage such activities. This has resulted in initiating various class-
action lawsuits by different users and government agencies, in order to keep privacy of a user.
Conversations: It is the extent to which users converse or communicate with each other. The prime purpose of
many social media sites is to facilitate conversations among individuals and groups. Different kinds of
conversations can happen for different reasons as people tweet, blog or update status to remain in touch of new
ideas or current topics or to meet new like-minded people. In this way, people see social media as a platform of
making their message heard and impacting environmental problems, humanitarian causes, economic issues, or
political debates. For instance, Twitter is focused around exchanging small messages which are mostly the
updates of real-time statuses, to create an „ambient awareness‟ of issues. On the other side, Blogs offer lengthy
conversations which can be traced back by staying connected asynchronously. The firms view the „conversation
velocity‟ by examining the rate and the direction of change in a conversation. By the rate of change of
conversation is the count of new conversations over a specific period of time, while the direction of change
refers to the continuity or discontinuity of the conversation.
1) Sharing: It is the extent to which users send, receive or exchange data. Sharing provides a way for
interaction on social media platforms, but it depends on the functional objectives of the social media platforms,
whether sharing leads users further to converse or build relationships with each other. Different sites have
different objects of sociality as Indie music for MySpace, pictures for Flickr and careers for LinkedIn. For
instance, YouTube as a social media platform allow the users to upload and share videos, so object medium is
video. But this requires users to get registered themselves and agree the conditional terms in order to upload a
video which includes a content management system that makes the content owners able to identify and manage
their content, even there are number of employs who are engaged in monitoring and removing content from You
Tube in case of violation of the terms.
2) Presence: It is the extent to which users know about the existence of others as if others are available or
accessible. Presence-focused platforms center on geographical spaces as Friends Around Me facility allow users
to share their updates and check-ins of their current location, across the networks i.e. Facebook, Foursquare,
Twitter, and displays where friends are and which of them are nearby. But this function is not important for all
social media platforms as for instance, in LinkedIn, knowing which users are online or where they are located
does not make any difference.
3) Relationships: It is the extent to which users are related to each other i.e. form of association among
users that leads them to share objects, converse or simply to be in each other‟s friend list. There are some
relationships which are formal, regulated, and in structured way as in LinkedIn allows users to find how they
3. Review On Comment Volume Prediction
DOI: 10.9790/0661-180203134138 www.iosrjournals.org 136 | Page
are linked to each other and how many degrees they are away from a target user, possibly an employer who
would like to meet an employee. On the other hand, there are platforms in which relationships are informal and
without any specific structure as in Blogs, which allow users to develop a relationship, without any formal rules
of how much information they should share with each other. In other cases like Twitter and YouTube in which
relationships hardly matter.
4) Reputation: It is the extent to which users know about the social standing of each others. The meaning
of Reputation varies with the different social media platforms, for instance, LinkedIn builds the reputation of
one user based on endorsements from other users. And on YouTube, the reputation is based on count of views,
of videos while on Facebook, this depends on „number of likes‟ but on Twitter it depends on the „number of
followers‟.
5) Groups: It is the extent to which users can build communities and upto which levels these are formed.
More social a network, the bigger the group of friends and followers is. There are two types of groups mainly
i.e. first, „self-created groups‟ in which individuals sort their contacts and place their followers, friends or fans
into the groups like lists in Twitter. Secondly, groups with administrators who create/manage, invite and
approve applicants in the group, which can be open to anyone, closed i.e. user need to request to join group, or
secret group in which only invited members are allowed as in Facebook and Flickr.
III. SOCIAL MEDIA COMMENTS
Comments are the opinions of social media users about a document. These are usually short textual
messages referring to the main text of the document or to other feedbacks.
A. Importance of User’s comments
The nature and valence of user‟s comments on various social media platforms plays a significant role in
building or changing the one‟s perceptions regarding some specific topic or to making it popular. Even, in
today‟s era, it has an important place in various fields whether it is education, sales or predictions etc.
Perceptions--The paper[15] examined that the perception of people is influenced by the comments of users
on social media. The findings were explored in the context of relationship status, in which a person made an
announcement about the formation or breakup of a real-world relationships on Facebook. The results
suggested that the comments from different users affects the perceptions of a Facebook relationship status
update. It showed that the positive comments lead to favourable attitudes whereas negative comments lead
to poorer attitudes towards the status. And also the observer‟s attitude towards a relationship status are more
driven by the count of the comments than the real nature of the status, as positive facebook status can be
seen as negative if the associated comments are negative in nature.
Education-This work[16] investigated the effects of using a social media web application to assist learning
and teaching in classrooms on learners‟ performance. By examining the ratio of number of Facebook posts
and comments for educational purposes to the one for non-educational purposes, a conclusion is drawn that
the use of Facebook does have an impact on student‟s learning performances, as the students who spent
more time on education-related posting and commenting earned better grades.
Predicting the future-This paper[17] demonstrate that the contents of social media can be used for the
predictions of real-world outcomes. Predictions were performed on platform Twitter.com, using almost 3
million tweets. It predicted the box-office revenues of movies by constructing a linear regression model, in
advance of their release dates. The results outperformed in terms of accuracy and concluded that a topic‟s
rank in future is strongly correlated with the amount of attention it receives on social media.
Driving force in s/w evolution- User feedback is important in improving software Quality. Many software
companies collect data on user satisfaction through various means. The user‟s feedback available on the
sites thereby supply software companies with a rich source of information that can be used to improve
future releases. Even Apple‟s App Store stated that the newest release addresses many of the issues raised
by users. Therefore, user feedback can be and has been the driving force in software evolution [13].
Trending- It shows a list of topics that have recently spiked in popularity which is evaluated based on the
volume of the response towards a particular topic/issue or product.
Sales and Marketing- McDonald‟s Australia is serving over 1.7 million people across more than 940
Australian restaurants each day. This global fast food chain has used Facebook video ads to share its unique
Australian story, connecting with more than 5 million people in just 5 weeks[18]. And even Coca-Cola
Korea has used age group targeting and video ads to connect with 4.5 million young consumers, in order to
promote a new pineapple beverage, Sunny 10, which increased its purchase intent for the product by 2
points.
IV. COMMENT VOLUME PREDICTION
4. Review On Comment Volume Prediction
DOI: 10.9790/0661-180203134138 www.iosrjournals.org 137 | Page
Comment Volume on social media can be measured as the count of words in the comment section, the
number of comments, the number of distinct users who leave comments, or a variety of other ways. These
measures can be affected by various factors like main text of document/post, link to other documents/posts, the
time of day the post appears, a side conversation, Page likes, page check-ins, page talking about or page
category etc.
For Comment Volume Prediction(CVP), the user comment patterns are modeled over the
posts/documents appeared in the past and based on it, predictions are made on the number of comments that the
posts/documents are expected to receive in next coming hours. Number of researches are being done in
comment volume prediction field, using different social media platforms.
Different Regressor Models as Reduced Error Pruning tree, M5P tree, Multi Layer Perceptron and RBF
network can be used to predict the user‟s comment volume. As paper [1] has worked on facebook, using neural
networks and decision trees and developed a software prototype demonstrating the comment volume prediction.
It has made evaluations using various dataset variants and concluded that the Decision trees performed well
than the Neural Networks in comment volume predictions. Similarly, paper [2] has developed an industrial
proof-of-concept demonstrating the automatic analysis of the documents on Hungarian Blogs. In this paper,
author has trained various regressor models by considering various features of the blogs and evaluated the
results using Hits@10 and AUC@10 measures. The result shows that the regression models outperform than
naive models.
Even, classifiers can be used to categorize the comment volumes in specific classes like paper [3].It
reports on predicting the comment volume of news articles before their publication using Random Forest
Classifier based on the set of five features i.e. surface, cumulative, textual, semantic, and real-world features .It
addresses the task in two steps- first binary classification of articles with the potential to receive comments and
second to classify articles with „low volume‟ and „high volume‟. Outcomes show better results for binary
classification and evaluated that the Textual and semantic features are strong performers among others. In the
similar way, paper [7] has made analysis on the content and publish time of online news agencies, to detect
effective factors of diffusing contents in public. It has also used the Random Forest Classifier to classify articles
in three categories i.e. without commented, moderately commented(1-6) and highly commented(>6).The
proposed model has made predictions with more than 70% accuracy and reports that the publish date and a
weight introduced for content measure, were most informative features. The results can be refined by
considering important days (i.e. elections, festivals, holidays ) and geographical features in prediction. While
paper [5] has shown the dynamics of user generated comments on seven different news websites, using the log-
normal and the negative binomial distributions and predicted the comment volume using Linear model and
enable comparison across various news sites. The results showed that prediction of long term comment volume
is possible with small error after 10 source-hours observations.
The paper [4] has worked on Social bookmarking website Digg.com. By using comment information, it
defined a co-participation network between users and studied the behavioral characteristics of users. It measured
the entropy and inferred that the users at Digg are interested in wide range of topics. Using a classification and
regression framework, it has predicted the popularity of online content based on comment data and social
network derived features. It reported a one to four percent loss in classification accuracy while predicting the
popularity metric by using only first few hours of comment data as compare to all the available comment data.
The results can further be improved by analyzing the polarity of the comments.
Various topic models can be used to extract the hidden topics in post‟s content. The paper [6] has
worked on political blogs using Latent Variable topic model and analyzed the relationship between the content
and comment volume. It has also used Naïve Bayes model for binary prediction task i.e. high volume or low
volume and evaluated the prediction under the light of precision, recall and F1 measure. It concluded that the
modeling topics can improve recall while predicting high volume posts. Even paper [8] has predicted the
formation of user-to-content links in Flickr Groups to predict the chance that a user will comment or like an
image updated by another user. It has taken into account both the community effect using Transactional Mixed
Membership Stochastic Block (TMMSB) model and content effect using Latent Dirichlet Allocation(LDA) for
predicting user-to-content links. The time zone effects can be used in future in order to make results more
accurate.
Most popular social networking site, facebook is used in paper[9] and presented a data mining
architecture to collect social data. This paper has collected different attributes such as about me, comments, wall
post and age from facebook using facebook API key, then mined the knowledge to perform the comparison
on age group basis for various usages as human behavior prediction, job responsibility distribution, pattern
recognition, decision making and product promoting. It has used the K-nearest neighbor algorithm to classify
numeric and textual attributes and range value attributes such as wall count, age count, music count and interest
count to classify them into various class levels.
5. Review On Comment Volume Prediction
DOI: 10.9790/0661-180203134138 www.iosrjournals.org 138 | Page
Summarization of the user‟s comments is even more difficult task as these are usually mixed with
different opinions, specifically in case of restaurants where different opinions refer to different dishes but
evaluated as an overall score of restaurants. Paper [10] has presented a new approach for comment
summarization in the context of restaurants. It used the real-world comments, crawled from Yelp and Dianping,
the most popular English and Chinese restaurant review web sites. Using the attributes of the dishes and the
user‟s remarks on the attributes as two independent dimensions in the latent space, it constructed a bilateral
topic model which is combined with the opinionated word extraction and clustering-based selection algorithms,
it provides a high-quality summary on the restaurants as well as the dishes served by the restaurants. This
concept can be further used for wider applications like for various selling goods or services.
V. Conclusion
In this paper, the importance of social media is discussed and it is shown that how it is getting popular
day by day. By analyzing the seven building blocks, one can understand how social media platforms vary in
terms of their functionalities, in order to develop a good social media strategy by balancing the various building
blocks for their community. Different proposed techniques in the literature have been discussed for user‟s
comment volume prediction in order to get the idea of popularity of a topic before its publication. Many
researches are being proposed in social media field, but yet there is a huge content left untouched. So the stage
is set for social media research to flourish.
References
[1]. Singh Kamaljot, Kaur Ranjeet and Kumar Dinesh, “Comment Volume Prediction using Neural Networks and Decision Trees”,
2015 17th UKSIM-AMSS International Conference on Modelling and Simulation, IEEE, pp. 15-20, 2015.
[2]. Buza Krisztian, “Feedback Prediction for Blogs”, Springer International Publishing on Data Analysis, Machine Learning and
Knowledge Discovery,2014, pp. 145-152. doi:10.1007/978-3-319-01595-8 16.
[3]. M.Tsagkias, W. Weerkamp, M. de Rijke, “Predicting the Volume of Comments on Online News Stories”,CIKM‟09 Proceedings of
the 18th ACM conference on Information and knowledge management , pp.1765-1768, 2009.
[4]. Jamali, S. and Rangwala, H., “Digging Digg: Comment Mining, Popularity Prediction, and Social Network Analysis”, Web
Information Systems and Mining, IEEE International Conference,2009, pp. 32-38. doi: 10.1109/WISM.2009.15.
[5]. M. Tsagkias, W. Weerkamp, M. de Rijke, “News Comments: Exploring, Modeling, and Online Prediction", ECIR'2010 Proceedings
of the 32nd European conference on Advances in Information Retrieval, Springer, pp.191-203,2010.
[6]. Yano, Tae, and Noah A. Smith. “What's Worthy of Comment? Content and Comment Volume in Political Blogs” In 4th
International AAAI Conference on Weblogs and Social Media, 2010.
[7]. Balali, A. and Rajabi, A. and Ghassemi, S. and Asadpour, M. and Faili, H., “Content diffusion prediction in social networks”,
Information and Knowledge Technology (IKT), 5th IEEE Conference,2013, pp. 467-471. doi: 10.1109/IKT.2013.6620114.
[8]. Negi, S. and Chaudhury, S., “Predicting User-to-content Links in Flickr Groups”, Advances in Social Networks Analysis and
Mining (ASONAM), IEEE/ACM International Conference, 2012 pp. 124-131. doi: 10.1109/ASONAM.2012.31.
[9]. Rahman, M.M. , “Intellectual knowledge extraction from online social data”, Informatics, Electronics Vision (ICIEV), IEEE
International Conference, 2012, pp. 205-210. doi:10.1109/ICIEV.2012.6317392
[10]. [Rong Zhang, Zhenjie Zhang, Xiaofeng He, Aoying Zhou, “Dish Comment Summarization Based on Bilateral Topic Analysis”
Data Engineering (ICDE), 31st
IEEE International Conference, 2015, pp. 483 – 494. doi: 10.1109/ICDE.2015.7113308
[11]. S. M. Tan, P.N, V. Kumar, Introduction to data mining, Pearson Addison Wesley Boston, 2006.
[12]. Z.C. Khan , Thulani Mashiane, “An analysis of Facebook's Graph Search”, Information Security for South Africa(ISSA), IEEE,
pp.1-8, 2014.
[13]. Laura V. Galvis Carreno, Kristina Winbladh “Analysis of User Comments: An Approach for Software Requirements
Evolution”,35th
International Conference on software Engineering ,USA, IEEE, 2013, pp. 582-591. doi:
10.1109/ICSE.2013.6606604.
[14]. Yu-Hsiu, Hsueh-Yi Lai “Effects of Facebook Like and Conflicting Aggregate Rating and Customer Comment on Purchase
Intentions”, Springer International Publishing in Universal Access in Human-Computer Interaction. Access to Today's
Technologies, 2015,pp.193-200.doi: 10.1007/978-3-319-20678-3_19.
[15]. Paul W. Ballantine , Yongjia Lin, Ekant Veer, “The influence of user comments on perceptions of Facebook relationship status
updates”, Computers in Human Behavior, Elsevier 2015, Volume- 49, pp.50–55. doi:10.1016/j.chb.2015.02.055
[16]. N. Leelathakul, K. Chaipah, “Quantitative Effects of using Facebook as a Learning Tool on Students‟ Performance” 10th
International Joint Conference on Computer Science and Software Engineering (JCSSE),IEEE 2013, pp.87 – 92.
doi: 10.1109/JCSSE.2013.6567325.
[17]. Sitaram Asur, Bernardo A. Huberman, “Predicting the Future With Social Media” Web Intelligence and Intelligent Agent
Technology (WI-IAT), 2010 IEEE/WIC/ACM International Conference, pp. 492 – 499. doi: 10.1109/WI-IAT.2010.63
[18]. https://www.facebook.com/business/success
[19]. http://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/
[20]. Jan H. Kietzmann , K.Hermkens, Ian P. McCarthy, B. S. Silvestre, “Social media? Get serious! Understanding the functional
building blocks of social media” Business Horizons, Elsevier 2011, Volume- 54, Issue 3, pp. 241-251.
doi:10.1016/j.bushor.2011.01.005