Matching Items (9)
Filtering by

Clear all filters

153339-Thumbnail Image.png
Description
A myriad of social media services are emerging in recent years that allow people to communicate and express themselves conveniently and easily. The pervasive use of social media generates massive data at an unprecedented rate. It becomes increasingly difficult for online users to find relevant information or, in other words,

A myriad of social media services are emerging in recent years that allow people to communicate and express themselves conveniently and easily. The pervasive use of social media generates massive data at an unprecedented rate. It becomes increasingly difficult for online users to find relevant information or, in other words, exacerbates the information overload problem. Meanwhile, users in social media can be both passive content consumers and active content producers, causing the quality of user-generated content can vary dramatically from excellence to abuse or spam, which results in a problem of information credibility. Trust, providing evidence about with whom users can trust to share information and from whom users can accept information without additional verification, plays a crucial role in helping online users collect relevant and reliable information. It has been proven to be an effective way to mitigate information overload and credibility problems and has attracted increasing attention.

As the conceptual counterpart of trust, distrust could be as important as trust and its value has been widely recognized by social sciences in the physical world. However, little attention is paid on distrust in social media. Social media differs from the physical world - (1) its data is passively observed, large-scale, incomplete, noisy and embedded with rich heterogeneous sources; and (2) distrust is generally unavailable in social media. These unique properties of social media present novel challenges for computing distrust in social media: (1) passively observed social media data does not provide necessary information social scientists use to understand distrust, how can I understand distrust in social media? (2) distrust is usually invisible in social media, how can I make invisible distrust visible by leveraging unique properties of social media data? and (3) little is known about distrust and its role in social media applications, how can distrust help make difference in social media applications?

The chief objective of this dissertation is to figure out solutions to these challenges via innovative research and novel methods. In particular, computational tasks are designed to {\it understand distrust}, a innovative task, i.e., {\it predicting distrust} is proposed with novel frameworks to make invisible distrust visible, and principled approaches are develop to {\it apply distrust} in social media applications. Since distrust is a special type of negative links, I demonstrate the generalization of properties and algorithms of distrust to negative links, i.e., {\it generalizing findings of distrust}, which greatly expands the boundaries of research of distrust and largely broadens its applications in social media.
ContributorsTang, Jiliang (Author) / Liu, Huan (Thesis advisor) / Xue, Guoliang (Committee member) / Ye, Jieping (Committee member) / Aggarwal, Charu (Committee member) / Arizona State University (Publisher)
Created2015
150382-Thumbnail Image.png
Description
This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate

This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate between each two users. The whole trust checking process is divided into two steps: local checking and remote checking. Local checking directly contacts the email server to calculate the trust rate based on user's own email communication history. Remote checking is a distributed computing process to get help from user's social network friends and built the trust rate together. The email-based trust model is built upon a cloud computing framework called MobiCloud. Inside MobiCloud, each user occupies a virtual machine which can directly communicate with others. Based on this feature, the distributed trust model is implemented as a combination of local analysis and remote analysis in the cloud. Experiment results show that the trust evaluation model can give accurate trust rate even in a small scale social network which does not have lots of social connections. With this trust model, the security in both social network services and email communication could be improved.
ContributorsZhong, Yunji (Author) / Huang, Dijiang (Thesis advisor) / Dasgupta, Partha (Committee member) / Syrotiuk, Violet (Committee member) / Arizona State University (Publisher)
Created2011
156735-Thumbnail Image.png
Description
The popularity of social media has generated abundant large-scale social networks, which advances research on network analytics. Good representations of nodes in a network can facilitate many network mining tasks. The goal of network representation learning (network embedding) is to learn low-dimensional vector representations of social network nodes that capture

The popularity of social media has generated abundant large-scale social networks, which advances research on network analytics. Good representations of nodes in a network can facilitate many network mining tasks. The goal of network representation learning (network embedding) is to learn low-dimensional vector representations of social network nodes that capture certain properties of the networks. With the learned node representations, machine learning and data mining algorithms can be applied for network mining tasks such as link prediction and node classification. Because of its ability to learn good node representations, network representation learning is attracting increasing attention and various network embedding algorithms are proposed.

Despite the success of these network embedding methods, the majority of them are dedicated to static plain networks, i.e., networks with fixed nodes and links only; while in social media, networks can present in various formats, such as attributed networks, signed networks, dynamic networks and heterogeneous networks. These social networks contain abundant rich information to alleviate the network sparsity problem and can help learn a better network representation; while plain network embedding approaches cannot tackle such networks. For example, signed social networks can have both positive and negative links. Recent study on signed networks shows that negative links have added value in addition to positive links for many tasks such as link prediction and node classification. However, the existence of negative links challenges the principles used for plain network embedding. Thus, it is important to study signed network embedding. Furthermore, social networks can be dynamic, where new nodes and links can be introduced anytime. Dynamic networks can reveal the concept drift of a user and require efficiently updating the representation when new links or users are introduced. However, static network embedding algorithms cannot deal with dynamic networks. Therefore, it is important and challenging to propose novel algorithms for tackling different types of social networks.

In this dissertation, we investigate network representation learning in social media. In particular, we study representative social networks, which includes attributed network, signed networks, dynamic networks and document networks. We propose novel frameworks to tackle the challenges of these networks and learn representations that not only capture the network structure but also the unique properties of these social networks.
ContributorsWang, Suhang (Author) / Liu, Huan (Thesis advisor) / Aggarwal, Charu (Committee member) / Sen, Arunabha (Committee member) / Tong, Hanghang (Committee member) / Arizona State University (Publisher)
Created2018
136409-Thumbnail Image.png
Description
Twitter, the microblogging platform, has grown in prominence to the point that the topics that trend on the network are often the subject of the news and other traditional media. By predicting trends on Twitter, it could be possible to predict the next major topic of interest to the public.

Twitter, the microblogging platform, has grown in prominence to the point that the topics that trend on the network are often the subject of the news and other traditional media. By predicting trends on Twitter, it could be possible to predict the next major topic of interest to the public. With this motivation, this paper develops a model for trends leveraging previous work with k-nearest-neighbors and dynamic time warping. The development of this model provides insight into the length and features of trends, and successfully generalizes to identify 74.3% of trends in the time period of interest. The model developed in this work provides understanding into why par- ticular words trend on Twitter.
ContributorsMarshall, Grant A (Author) / Liu, Huan (Thesis director) / Morstatter, Fred (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2015-05
134432-Thumbnail Image.png
Description
Binge drinking has clear consequences but subtle influences among undergraduate students. While theories of perceived drinking norms and social identity have been determined to be predictive of binge drinking behavior, few studies have tested these influences outside of fraternities, sororities, and athletic teams and little research exists employing social network

Binge drinking has clear consequences but subtle influences among undergraduate students. While theories of perceived drinking norms and social identity have been determined to be predictive of binge drinking behavior, few studies have tested these influences outside of fraternities, sororities, and athletic teams and little research exists employing social network analysis (SNA) to quantify social ties. In this study, a small, undergraduate dance team was identified to test social identity theory using social network analysis in a peripheral social group. Each member was interviewed for demographic information, personal drinking habits, personal network structure, perceptions of peer drinking within both the personal network and the whole-network (the dance team), and sociometric position within the dance team. Personal network characteristics, whole-network dynamics and perceptions of peer drinking were tested for predictive value of individual binge drinking behavior utilizing binary logistic regression analysis. Results for predictor variables were weakened due to the small sample size (n = 13) and low variability within some constant variables, returning no statistically significant (p < 0.05) independent variables. However, while odds ratios could not be used to construct regression equations, four models were statistically significant overall. Each model was tested again without the constants; no models nor variables were statistically significant. These models indicated, within this sample, that 1) the proportion of a group that adopts binge drinking behavior is predictive of that behavior for the interviewee (in terms of the overall personal network as well as the triads within the personal network); and 2) the perception of the average team member's maximum alcohol intake along with the proportion of the personal network composed of team members is predictive of individual binge drinking behavior. Low variance in the variables and the small sample size warrant further research to test the viability of targeting anti-binge drinking campaigns toward peripheral social groups.
ContributorsOlivas, Elijah (Author) / Schaefer, David (Thesis director) / Stotts, Rhian (Committee member) / Barrett, The Honors College (Contributor)
Created2017-05
134809-Thumbnail Image.png
Description
Social media has become a direct and effective means of transmitting personal opinions into the cyberspace. The use of certain key-words and their connotations in tweets portray a meaning that goes beyond the screen and affects behavior. During terror attacks or worldwide crises, people turn to social media as a

Social media has become a direct and effective means of transmitting personal opinions into the cyberspace. The use of certain key-words and their connotations in tweets portray a meaning that goes beyond the screen and affects behavior. During terror attacks or worldwide crises, people turn to social media as a means of managing their anxiety, a mechanism of Terror Management Theory (TMT). These opinions have distinct impacts on the emotions that people express both online and offline through both positive and negative sentiments. This paper focuses on using sentiment analysis on twitter hash-tags during five major terrorist attacks that created a significant response on social media, which collectively show the effects that 140-character tweets have on perceptions in social media. The purpose of analyzing the sentiments of tweets after terror attacks allows for the visualization of the effect of key-words and the possibility of manipulation by the use of emotional contagion. Through sentiment analysis, positive, negative and neutral emotions were portrayed in the tweets. The keywords detected also portray characteristics about terror attacks which would allow for future analysis and predictions in regards to propagating a specific emotion on social media during future crisis.
ContributorsHarikumar, Swathikrishna (Author) / Davulcu, Hasan (Thesis director) / Bodford, Jessica (Committee member) / Computer Science and Engineering Program (Contributor) / Department of Information Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
134225-Thumbnail Image.png
Description
My aims with this research project were to conduct a network analysis on collaborators in the ¡Viva Maryvale! project, a diabetes prevention program in Maryvale, AZ. The goals of the social network analysis were to measure the connections that collaborating organizations have to each other, the strength of these connections,

My aims with this research project were to conduct a network analysis on collaborators in the ¡Viva Maryvale! project, a diabetes prevention program in Maryvale, AZ. The goals of the social network analysis were to measure the connections that collaborating organizations have to each other, the strength of these connections, and the activities that connected organizations collaborate on. I hypothesized that performing a network analysis would inform me of the strengths and weaknesses of the ¡Viva Maryvale! project in order to advise the next steps of a targeted approach to diabetes prevention among vulnerable populations, thus affecting public health outcomes in the greater Phoenix Valley.
ContributorsKellog, Anna (Author) / Shaibi, Gabriel (Thesis director) / Soltero, Erica (Committee member) / School of Public Affairs (Contributor) / School of Human Evolution and Social Change (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
131992-Thumbnail Image.png
Description
Astrobiology, as it is known by official statements and agencies, is “the study of the origin, evolution, distribution, and future of life in the universe” (NASA Astrobiology Insitute , 2018). This definition should suit a dictionary, but it may not accurately describe the research and motivations of practicing astrobiologists. Furthermore,

Astrobiology, as it is known by official statements and agencies, is “the study of the origin, evolution, distribution, and future of life in the universe” (NASA Astrobiology Insitute , 2018). This definition should suit a dictionary, but it may not accurately describe the research and motivations of practicing astrobiologists. Furthermore, it does little to characterize the context in which astrobiologists work. The aim of this project is to explore various social network structures within a large body of astrobiological research, intending to both further define the current motivations of astrobiological research and to lend context to these motivations. In this effort, two Web of Science queries were assembled to search for two contrasting corpora related to astrobiological research. The first search, for astrobiology and its close synonym, exobiology, returned a corpus of 3,229 journal articles. The second search, which includes the first and supplements it with further search terms (see Table 1) returned a corpus of 19,017 journal articles. The metadata for these articles were then used to construct various networks. The resulting networks describe an astrobiology that is well entrenched in other related fields, showcasing the interdisciplinarity of astrobiology in its emergence. The networks also showcase the entrenchment of astrobiology in the sociological context in which it is conducted—namely, its relative dependence on the United States government, which should prompt further discussion amongst astrobiology researchers.
ContributorsBromley, Megan Rachel (Author) / Manfred, Laubichler (Thesis director) / Sara, Walker (Committee member) / School of Mathematical and Statistical Sciences (Contributor) / School of Earth and Space Exploration (Contributor) / Department of English (Contributor) / Barrett, The Honors College (Contributor)
Created2019-12
Description
Nations censor specific information in accordance with their political, legal, and cultural standards. Each country adopts unique approaches and regulations for censorship, whether it involves moderating online content or prohibiting protests. This paper seeks to study the underlying motivations for the disparate behaviors exhibited by authorities and individuals. To achieve

Nations censor specific information in accordance with their political, legal, and cultural standards. Each country adopts unique approaches and regulations for censorship, whether it involves moderating online content or prohibiting protests. This paper seeks to study the underlying motivations for the disparate behaviors exhibited by authorities and individuals. To achieve this, we develop a mathematical model designed to understand the dynamics between authority figures and individuals, analyzing their behaviors under various conditions. We argue that individuals essentially act in three phases - compliance, self-censoring, and defiance when faced with different situations under their own desires and the authority's parameters. We substantiate our findings by conducting different simulations on the model and visualizing the outcomes. Through these simulations, we realize why individuals exhibit behaviors falling into one of three categories, who are influenced by factors such as the level of surveillance imposed by the authority, the severity of punishments, the tolerance for dissent, or the individuals' boldness. This also helped us to understand why certain populations in a country exhibit defiance, self-censoring behavior, or compliance as they interact with each other and behave under specific conditions within a small network world.
ContributorsNahar, Anish Ashish (Author) / Daymude, Joshua (Thesis director) / Forrest, Stephanie (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2024-05