Loading…
The power of comments: fostering social interactions in microblog networks
Today's ubiquitous online social networks serve multiple purposes, including social communication (Face- book, Renren), and news dissemination (Twitter). But how does a social network's design define its functionality? An- swering this would need social network providers to take a proactive role in...
Saved in:
Published in: | Frontiers of Computer Science 2016-10, Vol.10 (5), p.889-907 |
---|---|
Main Authors: | , , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Today's ubiquitous online social networks serve multiple purposes, including social communication (Face- book, Renren), and news dissemination (Twitter). But how does a social network's design define its functionality? An- swering this would need social network providers to take a proactive role in defining and guiding user behavior. In this paper, we first take a step to answer this question with a data-driven approach, through measurement and anal- ysis of the Sina Weibo microblogging service. Often com- pared to Twitter because of its format, Weibo is interesting for our analysis because it serves as a social communication tool and a platform for news dissemination, too. While similar to Twitter in functionality, Weibo provides a distinguishing feature, comments, allowing users to form threaded con- versations around a single tweet. Our study focuses on this feature, and how it contributes to interactions and improves social engagement. We use analysis of comment interactions to uncover their role in social interactivity, and use comment graphs to demonstrate the structure of Weibo users interac- tions. Finally, we present a case study that shows the impact of comments in malicious user detection, a key application on microblogging systems. That is, using properties of com- ments significantly improves the accuracy in both modeling and detection of malicious users. |
---|---|
ISSN: | 2095-2228 2095-2236 |
DOI: | 10.1007/s11704-016-5198-y |