Mining Lurkers in Online Social Networks


Book Description

This SpringerBrief brings order to the wealth of research studies that contribute to shape our understanding of on-line social networks (OSNs) lurking phenomena. This brief also drives the development of computational approaches that can be effectively applied to answer questions related to lurking behaviors, as well as to the engagement of lurkers in OSNs. All large-scale online social networks (OSNs) are characterized by a participation inequality principle, i.e., the crowd of an OSN does not actively contribute, rather it takes on a silent role. Silent users are also referred to as lurkers, since they gain benefit from others' information without significantly giving back to the community. Nevertheless, lurkers acquire knowledge from the OSN, therefore a major goal is to encourage them to more actively participate. Lurking behavior analysis has been long studied in social science and human-computer interaction fields, but it has also matured over the last few years in social network analysis and mining. While the main target audience corresponds to computer, network, and web data scientists, this brief might also help increase the visibility of the topic by bridging different closely related research fields. Practitioners, researchers and students interested in social networks, web search, data mining, computational social science and human-computer interaction will also find this brief useful research material .




Novel & Intelligent Digital Systems: Proceedings of the 3rd International Conference (NiDS 2023)


Book Description

This book summarizes the research findings presented at the 3rd International Conference on Novel & Intelligent Digital Systems (NiDS 2023). NiDS 2023 held in Athens, Greece, during September 28–29, 2023, under the auspices of the Institute of Intelligent Systems. The conference was implemented hybrid, allowing participants to attend it either online or onsite. NiDS 2023 places significant importance on the innovations within intelligent systems and the collaborative research that empowers and enriches artificial intelligence (AI) in software development. It encourages high-quality research, establishing a forum for investigating the obstacles and cutting-edge breakthroughs in AI. The conference is designed for experts, researchers, and scholars in artificial and computational intelligence, as well as computer science in general, offering them the opportunity to delve into relevant, interconnected, and mutually complementary fields. By facilitating the exchange of ideas, the conference strengthens and broadens the network of researchers, academics, and industry representatives.




Trends in Social Network Analysis


Book Description

The book collects contributions from experts worldwide addressing recent scholarship in social network analysis such as influence spread, link prediction, dynamic network biclustering, and delurking. It covers both new topics and new solutions to known problems. The contributions rely on established methods and techniques in graph theory, machine learning, stochastic modelling, user behavior analysis and natural language processing, just to name a few. This text provides an understanding of using such methods and techniques in order to manage practical problems and situations. Trends in Social Network Analysis: Information Propagation, User Behavior Modelling, Forecasting, and Vulnerability Assessment appeals to students, researchers, and professionals working in the field.




The Art of Digital Marketing for Fashion and Luxury Brands


Book Description

This book explores omnichannel fashion and luxury retailing with a particular emphasis on the role of computer-mediated marketing environments in determining a consumer’s purchase and post-purchase trajectories. The fashion industry has evolved rapidly over the last few years with the diffusion of fast fashion and luxury democratization, not to mention the advent of ICT and the development of communication. Today, fashion companies face new challenges, such as how to manage brands and how to choose between marketplaces and digital marketspaces. While some companies focus on one channel selection, others embrace the omnichannel choice and look for a balance between the two environments. Whatever the strategy, it is essential to manage these touch-points in order to create interaction between consumers and brands, provide meaningful customer experiences, and to maximize customers’ engagement. An insightful read for scholars in marketing, fashion and retail, this book investigates the triangulation between branding, marketplace, and marketspace and its impact on the organization.




Cyberspace Safety and Security


Book Description

This book constitutes the proceedings of the 9th International Symposium on Cyberspace Safety and Security, CSS 2017, held in Xi’an, China in October 2017. The 31 full papers and 10 short papers presented in this volume were carefully reviewed and selected from 120 submissions. The papers focus on cyberspace safety and security such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.




Advances in Network Science


Book Description

This book constitutes the refereed proceedings of the 12th International Conference and School of Network Science, NetSci-X 2016, held in Wroclaw, Poland, in January 2016. The 12 full and 6 short papers were carefully reviewed and selected from 59 submissions. The papers deal with the study of network models in domains ranging from biology and physics to computer science, from financial markets to cultural integration, and from social media to infectious diseases.







Intelligence and Security Informatics


Book Description

This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008. The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.




Natural Language Understanding and Intelligent Applications


Book Description

This book constitutes the joint refereed proceedings of the 5th CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2016, and the 24th International Conference on Computer Processing of Oriental Languages, ICCPOL 2016, held in Kunming, China, in December 2016. The 48 revised full papers presented together with 41 short papers were carefully reviewed and selected from 216 submissions. The papers cover fundamental research in language computing, multi-lingual access, web mining/text mining, machine learning for NLP, knowledge graph, NLP for social network, as well as applications in language computing.




Network Role Mining and Analysis


Book Description

This brief presents readers with a summary of classic, modern, and state-of-the-art methods for discovering the roles of entities in networks (including social networks) that range from small to large-scale. It classifies methods by their mathematical underpinning, whether they are driven by implications about entity behaviors in system, or if they are purely data driven. The brief also discusses when and how each method should be applied, and discusses some outstanding challenges toward the development of future role mining methods of each type.