• Title/Summary/Keyword: Twitter Network

Search Result 281, Processing Time 0.031 seconds

Conversations about Open Data on Twitter

  • Jalali, Seyed Mohammad Jafar;Park, Han Woo
    • International Journal of Contents
    • /
    • v.13 no.1
    • /
    • pp.31-37
    • /
    • 2017
  • Using the network analysis method, this study investigates the communication structure of Open Data on the Twitter sphere. It addresses the communication path by mapping influential activities and comparing the contents of tweets about Open Data. In the years 2015 and 2016, the NodeXL software was applied to collect tweets from the Twitter network, containing the term "opendata". The structural patterns of social media communication were analyzed through several network characteristics. The results indicate that the most common activities on the Twitter network are related to the subjects such as new applications and new technologies in Open Data. The study is the first to focus on the structural and informational pattern of Open Data based on social network analysis and content analysis. It will help researchers, activists, and policy-makers to come up with a major realization of the pattern of Open Data through Twitter.

Framing North Korea on Twitter: Is Network Strength Related to Sentiment?

  • Kang, Seok
    • Journal of Contemporary Eastern Asia
    • /
    • v.20 no.2
    • /
    • pp.108-128
    • /
    • 2021
  • Research on the news coverage of North Korea has been paying less attention to social media platforms than to legacy media. An increasing number of social media users post, retweet, share, interpret, and set agendas on North Korea. The accessibility of international users and North Korea's publicity purposes make social media a venue for expression, news diversity, and framing about the nation. This study examined the sentiment of Twitter posts on North Korea from a framing perspective and the relationship between network strengths and sentiment from a social network perspective. Data were collected using two tools: Jupyter Notebook with Python 3.6 for preliminary analysis and NodeXL for main analysis. A total of 11,957 tweets, 10,000 of which were collected using Python and 1,957 tweets using NodeXL, about North Korea between June 20-21, 2020 were collected. Results demonstrated that there was more negative sentiment than positive sentiment about North Korea in the sampled Twitter posts. Some users belonging to small network sizes reached out to others on Twitter to build networks and spread positive information about North Korea. Influential users tended to be impartial to sentiment about North Korea, while some Twitter users with a small network exhibited high percentages of positive words about North Korea. Overall, marginalized populations with network bonding were more likely to express positive sentiment about North Korea than were influencers at the center of networks.

Decomposing Twitter Network in Tourism Marketing

  • Kim, Wonsik;Kim, Daegeun
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.80-85
    • /
    • 2021
  • This study is to analyze the structure of the networks of tourism marketing on Twitter, identifying the most prominent users, the flow of information about tourism marketing, and the interaction between the users posting tweets. This study employs NodeXL pro as a visualization software package for social network analysis. The number of vertices or nodes is 171, and the number of the unique edges or links is 128, but there are 101 edges with duplicates, so the total links are 229, which means that there are fewer Twitter accounts in the social network on tourism marketing, but they have a few close relationships by sharing information. The research can map the social network of communicators of tourism marketing using Twitter data. The network has a complicated pattern, including one independent network and some connected networks. Some mediators connect each network and can control the information flow of tourism marketing. More communicators are getting the information than the ones providing it, which means that there is likely to be the dependence of information among communicators that can cause an obstacle and distortion of the information flow system, especially in the independent network.

An Extended Work Architecture for Online Threat Prediction in Tweeter Dataset

  • Sheoran, Savita Kumari;Yadav, Partibha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.97-106
    • /
    • 2021
  • Social networking platforms have become a smart way for people to interact and meet on internet. It provides a way to keep in touch with friends, families, colleagues, business partners, and many more. Among the various social networking sites, Twitter is one of the fastest-growing sites where users can read the news, share ideas, discuss issues etc. Due to its vast popularity, the accounts of legitimate users are vulnerable to the large number of threats. Spam and Malware are some of the most affecting threats found on Twitter. Therefore, in order to enjoy seamless services it is required to secure Twitter against malicious users by fixing them in advance. Various researches have used many Machine Learning (ML) based approaches to detect spammers on Twitter. This research aims to devise a secure system based on Hybrid Similarity Cosine and Soft Cosine measured in combination with Genetic Algorithm (GA) and Artificial Neural Network (ANN) to secure Twitter network against spammers. The similarity among tweets is determined using Cosine with Soft Cosine which has been applied on the Twitter dataset. GA has been utilized to enhance training with minimum training error by selecting the best suitable features according to the designed fitness function. The tweets have been classified as spammer and non-spammer based on ANN structure along with the voting rule. The True Positive Rate (TPR), False Positive Rate (FPR) and Classification Accuracy are considered as the evaluation parameter to evaluate the performance of system designed in this research. The simulation results reveals that our proposed model outperform the existing state-of-arts.

Case Study of SNS (Social Networks Service) Application on Fashion Corporate - Focused on Twitter - (패션기업의 SNS (Social Network Service) 활용 현황에 대한 사례연구 - Twitter를 중심으로 -)

  • Sun, Se-Young;Lee, Joo-Hyun;Jung, Ye-Jin;Lee, Seung-Hee
    • Journal of Fashion Business
    • /
    • v.15 no.1
    • /
    • pp.158-170
    • /
    • 2011
  • The purpose of this study was to examine how recently fashion corporate did use SNS applications for their product promotion strategies as case studies, and to provide what kinds of SNS marketing strategies would be developed for fashion corporate. Specifically, this study was focused on Twitter among SNS applications. For this study, Internet webs, news paper, articles, and other press work were used for resources. Five fashion corporate such as Buckaroo, MLB, North Faces, Kolon, and ABC Mart were analyzed. As the results, first, fashion corporate used Twitter as the marketing tool for their product promotion. Second, they tried to make an increase the numbers of Twitter follower from their customers. Third, Twitter was used for making higher customer loyalty by fashion corporate through a variety of program such as special events, game, music, or viral marketing. However, there were still some limitations on fashion corporate's Twitter usage, compared to other non-fashion corporate. Thus, fashion corporate needs to provide more creative and unique Twitter marketing strategies. Therefore, based on these results, fashion brand merchandising marketing strategies of fashion products would be provided from this study.

Twitter and Retweet Context: User Characteristics and Message Attributes of Twitter for PR and Marketing (기업의 홍보 마케팅용 트위터의 리트윗 현황 분석: 이용자 특성과 콘텐츠 속성을 중심으로)

  • Cho, Tae-Jong;Yun, Hae-Jung;Lee, Choong-C.
    • Information Systems Review
    • /
    • v.14 no.1
    • /
    • pp.21-35
    • /
    • 2012
  • The rapid growth and popularity of Twitter have been one of the most influential phenomena in the era of social network system and the mobile internet, which also opens up opportunities for new business strategies; in particular, PR and marketing area. This study analyzed use of Twitter in terms of user characteristics and message attributes. Actual field data from the Twitter for PR and Marketing of a representative Korean IT company (Company "K") was used for this analysis. Research findings show that overall corporate twitter users show passive attitude in retweet behavior. Also, users who have relatively small network size (less than 1,000) are more active in retweet than power twitterians that have big network size(over than 10,000). It is showed that the rate of retweet is higher in the order of recruiting, promotional event, IT information, and general PR message. In the conclusion section, practical implications based on the research finding are thoroughly discussed.

  • PDF

Political Discourse Among Key Twitter Users: The Case Of Sejong City In South Korea

  • Hsu, Chien-leng;Park, Se Jung;Park, Han Woo
    • Journal of Contemporary Eastern Asia
    • /
    • v.12 no.1
    • /
    • pp.65-79
    • /
    • 2013
  • This paper examines communication patterns of key Twitter users by considering the socially and politically controversial Sejong City issue in South Korea. The network and message data were drawn from twtkr.com. Social network-based indicators and visualization methods were used to analyze political discourse among key Twitter users over time and illustrate various types of Tweets by these users and the interconnection between these key users. In addition, the study examines general Twitter users' participation in the discussion on the issue. The results indicate that some Twitter profiles of media outlets tend to be very dominant in terms of their message output, whereas their Tweets are not likely to be circulated by other users. Noteworthy is that Twitter profiles of individuals who are geographically affiliated with the issue are likely to play an important role in the flow of communication.

Quantifying Influence in Social Networks and News Media

  • Yun, Hong-Won
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.2
    • /
    • pp.135-140
    • /
    • 2012
  • Massive numbers of users of social networks share various types of information such as opinions, news, and ideas in real time. As a new form of social network, Twitter is a particularly useful information source. Studying influence can help us better understand the role of social networks. The popularity of social networks like Twitter is primarily measured by the number of followers. The number of followers in Twitter and the number of users exposed to news media are important factors in measuring influence. We chose Twitter and the New York Times as representative media to analyze the influence and present an empirical analysis of these datasets. When the correlation between the number of followers in Twitter and the number of users exposed to the New York Times is computed, the result is moderately high. The correlation between the number of users exposed to the New York Times and the number of sections including the users on it, was found to be very high. We measure the normalized influence score using our proposed expression based on the two correlation coefficients.

Spammer Detection using Features based on User Relationships in Twitter (관계 기반 특징을 이용한 트위터 스패머 탐지)

  • Lee, Chansik;Kim, Juntae
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.785-791
    • /
    • 2014
  • Twitter is one of the most famous SNS(Social Network Service) in the world. Twitter spammer accounts that are created easily by E-mail authentication deliver harmful content to twitter users. This paper presents a spammer detection method that utilizes features based on the relationship between users in twitter. Relationship-based features include friends relationship that represents user preferences and type relationship that represents similarity between users. We compared the performance of the proposed method and conventional spammer detection method on a dataset with 3% to 30% spammer ratio, and the experimental results show that proposed method outperformed conventional method in Naive Bayesian Classification and Decision Tree Learning.