請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/6800
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 李瑞庭(Anthony J.T. Lee) | |
dc.contributor.author | Hsin-Chieh Tsai | en |
dc.contributor.author | 蔡忻潔 | zh_TW |
dc.date.accessioned | 2021-05-17T09:18:23Z | - |
dc.date.available | 2015-07-19 | |
dc.date.available | 2021-05-17T09:18:23Z | - |
dc.date.copyright | 2012-07-19 | |
dc.date.issued | 2012 | |
dc.date.submitted | 2012-07-16 | |
dc.identifier.citation | [1] N. Agarwal, H. Liu, L. Tang, and P. S. Yu. 2008. Identifying the influential bloggers in a community. In Proceedings of the 1st ACM International Conference on Web Search and Data Mining, 207–218.
[2] M.A. Akaka and J. D. Chandler. 2011. Roles as resources: A social roles perspective of change in value networks. Marketing Theory, vol. 11, no. 3, 243–260. [3] F. Benevenuto, T. Rodrigues, M. Cha, V. Almeida. 2009. Characterizing user behavior in online social networks. In Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, 49–62. [4] F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, M. Goncalves. 2009. Detecting spammers and content promoters in online video social networks. In Proceedings of the 32nd international ACM Conference on Research and Development in Information Retrieval, 620–627. [5] J.C. Bezdeck, R. Ehrlich, and W. Full. 1984. FCM: Fuzzy C-Means Algorithm. Computers and Geoscience, vol. 10, no. 2–3, 191–203. [6] J.R. Blau, N. Goodman. 1991. Social Roles and Social Institutions: Essays in Honor of Rose Laub Coser. Westview Press: Boulder. [7] F. Bodendorf, C. Kaiser. 2009. Detecting opinion leaders and trends in online social networks. In Proceedings of the 2nd ACM Workshop on Social Web Search and Mining, 65–68. [8] M. M. Bradley and P. J. Lang. 1999. Affective norms for English words (ANEW): Instruction manual and affective ratings. Technical Report C-1. The Center for Research in Psychophysiology, University of Florida. [9] P.L. Callero. 1994. From role-playing to role-using. Understanding role as a resource. Social Psychology Quarterly, vol. 57, 247–256. [10] M. Fazeen, R. Dantu, P. Guturu. 2011. Identification of leaders, lurkers, associates and spammers in a social network: Context-dependent and context-independent approaches. Social Network Analysis and Mining, vol. 1, 241–254. [11] D. Fisher, M. Smith, and H.T. Welser. 2006. You are who you talk to: Detecting roles in Usenet newsgroups. In Proceedings of the 39th Hawaii International Conference on System Sciences, 59–68. [12] S. Fournier and L. Lee. 2009. Getting brand communities right. Harvard Business Review, April, 105–111. [13] N.P. Garg, S. Favre, H. Salamin, D.H. Tur, A. Vinciarelli. 2008. Role recognition for meeting participants: An approach based on lexical information and social network analysis. In Proceedings of the 16th ACM International Conference on Multimedia, 693–696. [14] E. Gleave, H. T. Welser, T. M. Lento, and M. A. Smith. 2009. A conceptual and operational definition of ‘social role’ in online community. In Proceedings of the 42nd Hawaii International Conference on System Sciences, 1–11. [15] S.A. Golder. 2003. A Typology of Social Roles in Usenet. Master Thesis, Department of Linguistics, Harvard University. [16] A. Goyal, F. Bonchi, and L. V.S. Lakshmanan. 2008. Discovering leaders from community actions. In Proceeding of the 17th ACM Conference on Information and Knowledge Management, 499–508. [17] InsightXplorer: http://news.ixresearch.com/. [18] S. Jamali and H. Rangwala. 2009. Digging digg: Comment mining, popularity prediction, and social network analysis. In Proceedings of International Conference on Web Information Systems and Mining, 32–38. [19] D. Kempe, J. Kleinberg, and E. Tardos. 2003. Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 137–146. [20] D. Kempe, J. Kleinberg, and E. Tardos. 2005. Influential nodes in a diffusion model for social networks. In Proceedings of the 32nd International Colloquium on Automata, Languages and Programming, 1127–1138. [21] V.I. Levenshtein. 1966. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady, vol. 10, 707–710. [22] M. Maia, J. Almeida, and V. Almeida. 2008. Identifying user behavior in online social networks. In Proceedings of the 1st Workshop on Social Network Systems, 1–6. [23] A. McCallum, A. Corrada-Emmanuel, X. Wang. 2005. Topic and role discovery in social networks. In Proceedings of the 19th International Joint Conference on Artificial Intelligence, 786–791. [24] J.C. Mitchell. 1969. Social Networks in Urban Situations: Analyses of Personal Relationships in Central African Towns. Manchester U. P: Manchester. [25] M. Morzy. 2009. On mining and social role discovery in Internet forums. In Proceedings of International Workshop on Social Informatics (SOCINFO), 74–79. [26] M. Naaman, J. Boase, C. Lai. 2010. Is it really about me? Message content in social awareness streams. In Proceedings of the ACM Conference on Computer Supported Cooperative Work, 189–192. [27] F. Nielsen. 2011. A new ANEW: Evaluation of a word list for sentiment analysis in microblogs. In Proceedings of the ESWC2011 Workshop on Making Sense of Microposts, CoRR, 93–98. [28] T. Parsons.1951. The Social System. Glencoe, IL: Free Press. [29] J. Pei, J. Han, B. Mortazavi-Asl, H. Pinto, Q. Chen, U. Dayal, and M. C. Hsu. 2001. PrefixSpan: Mining sequential patterns efficiently by prefix-projected pattern growth. In Proceedings of International Conference on Data Engineering, 215–224. [30] F. Skopik, H.L. Truong, S. Dustdar. 2009. Trust and reputation mining in professional virtual communities. In Proceedings of International Conference on Web Engineering. Lecture Notes in Computer Science (LNCS), vol. 5648, 76–90. [31] M. Trusov, A. V. Bodapati, and R. E. Bucklin. 2010. Determining influential users in Internet social networks. Journal of Marketing Research, vol. 47, no. 4, 643–658. [32] T.C. Turner, M. Smith, D. Fisher, and H.T. Welser. 2005. Picturing Usenet: Mapping computer-mediated collective action. Journal of Computer Mediated Communication, vol. 10, no. 4, article 7. [33] P. Velardi, R. Navigli, A. Cucchiarelli, F.D. Antonio. 2008. A new content-based model for social network analysis. In Proceedings of the IEEE International Conference on Semantic Computing, 18–25. [34] H.T. Welser, D. Cosley, G. Kossinets, A. Lin, F. Dokshin, G. Gay, M. Smith. 2011. Finding social roles in Wikipedia. In Proceedings of the iConference, 122–129. [35] H.T. Welser, E. Gleave, D. Fisher, and M. Smith. 2007. Visualizing the signatures of social roles in online discussion groups. The Journal of Social Structure, vol. 8, no. 2, 1–32. [36] H.T. Welser, E. Gleave, V. Barash, M. Smith, J. Meckes. 2009. Whither the experts? Social affordances and the cultivation of experts in community Q&A systems. In Proceedings of International Conference on Computational Science and Engineering, 450–455. [37] Z. Wu and C. Chen. 2011. User classification and relationship detecting on social network site. In Proceedings of International Conference on Control, Automation and Systems Engineering, 1–4. [38] T. Zhu, B. Wang, B. Wu, and C. Zhu. 2011. Role defining using behavior-based clustering in telecommunication network. Expert Systems with Applications, vol. 38, 3902–3908. | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/6800 | - |
dc.description.abstract | 社群網路如Facebook、Google+、Twitter,對使用者的互動模式產生極大的影響,角色分析可協助我們了解使用者的互動模式,但前人所提出的方法較著重於結構分析。就我們所知,目前並沒有方法使用內涵式特徵與行為特徵分析社群網路的角色,也沒有方法探討角色轉換的樣式。因此,在本篇論文中,我們提出一個內涵式的方法分析社群網路中的角色與角色轉換的樣式,我們的方法不須事先定義角色型態就能找出所有的角色,且允許使用者扮演多重角色。我們的方法可更有彈性地分析社群網路中的角色與角色轉換的樣式。實驗結果顯示我們所提出來的方法能有效地找出在不同社群中不同的內涵式行為角色,並可以找出未知的新角色,也可以找出有意義的角色轉換樣式。這些結果可協助我們更了解社群網路的發展以及未來趨勢,也可協助我們研擬更有效的管理策略。 | zh_TW |
dc.description.abstract | Social networks such as Facebook, Google+, and Twitter have made a significant impact on the interactions among users. Role analysis helps us to characterize users’ interactions on a social network. However, previously proposed methods are mainly based on structural analysis of social networks rather than content-based behavior analysis. To the best of our knowledge, there is no method using content-based behavioral features extracted from user-generated content and behavior patterns to identify users’ roles and to explore role change patterns in social networks. Therefore, in this thesis, we propose a content-based method to identify users’ roles and find the role change patterns in a social network. The proposed method doesn’t need to define role types in advance and allow a user to play multiple roles on a social network. Our method provides a more general and flexible way to perform role analyses in social networks. The experimental results show that the proposed method can find various roles in a social network and additional roles that haven’t been previously aware of. It can also discover some interesting role change patterns in different groups. The results may help us better understand the trends and future growth of the social network, and formulate more effective management strategies. | en |
dc.description.provenance | Made available in DSpace on 2021-05-17T09:18:23Z (GMT). No. of bitstreams: 1 ntu-101-R99725005-1.pdf: 345940 bytes, checksum: 0f5b411699789ef54a3976c0b35390de (MD5) Previous issue date: 2012 | en |
dc.description.tableofcontents | Table of Contents i
List of Figures ii List of Tables iii Chapter 1 Introduction 1 Chapter 2 Related Work 4 Chapter 3 The Proposed Framework 7 3.1 Problem Definition 7 3.2 Proposed Framework 8 3.3 Discovering Multiple Roles in a Social Network 9 3.4 Discovering Role Change Patterns 16 Chapter 4 Experiment Setup and Results 19 4.1 Data Collection 19 4.2 Finding Roles in Social Network 21 4.3 Finding Role Change Patterns 27 4.4 Comparing with the Previously Proposed Method 28 4.5 Evaluation of Distance Measure 31 Chapter 5 Conclusions and Future Work 32 References 34 | |
dc.language.iso | en | |
dc.title | 探勘社群網路中內涵式行為角色 | zh_TW |
dc.title | Discovering Content-based Behavioral Roles in Social Networks | en |
dc.type | Thesis | |
dc.date.schoolyear | 100-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 魏志平(Chih-Ping Wei),陳建錦(Chien-Chin Chen),盧信銘(Hsin-Min Lu) | |
dc.subject.keyword | 社群網路,資料探勘,內涵式行為角色,角色轉換樣式, | zh_TW |
dc.subject.keyword | social network,data mining,content-based behavioral role,role change pattern, | en |
dc.relation.page | 38 | |
dc.rights.note | 同意授權(全球公開) | |
dc.date.accepted | 2012-07-17 | |
dc.contributor.author-college | 管理學院 | zh_TW |
dc.contributor.author-dept | 資訊管理學研究所 | zh_TW |
顯示於系所單位: | 資訊管理學系 |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-101-1.pdf | 337.83 kB | Adobe PDF | 檢視/開啟 |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。