scholarly journals Classification of Arabic Twitter Users: A Study Based on User Behaviour and Interests

2016 ◽  
Vol 2016 ◽  
pp. 1-11 ◽  
Author(s):  
Abdullatif Alabdullatif ◽  
Basit Shahzad ◽  
Esam Alwagait

Social networks are among the most popular interactive media today due to their simplicity and their ability to break down the barriers of community rules and their speed and because of the increasing pressures of work environments that make it more difficult for people to visit or call friends. There are many social networking products available and they are widely used for social interaction. As the amount of threading data is growing, producing analysis from this large volume of communications is becoming increasingly difficult for public and private organisations. One of the important applications of this work is to determine the trends in social networks that depend on identifying relationships between members of a community. This is not a trivial task as it has numerous challenges. Information shared between social members does not have a formal data structure but is transmitted in the form of texts, emoticons, and multimedia. The inspiration for addressing this area is that if a company is advertising a sports product, for example, it has a difficulty in identifying targeted samples of Arab people on social networks who are interested in sports. In order to accomplish this, an experiment oriented approach is adopted in this study. A goal for this company is to discover users who have been interacting with other users who have the same interests, so they can receive the same type of message or advertisement. This information will help a company to determine how to develop advertisements based on Arab people’s interests. Examples of such work include the timely advertisement of the utilities that can be effectively marketed to increase the audience; for example, on the weekend days, the effective market approaches can yield considerable results in terms of increasing the sales and profits. In addition, finding an efficient way to recommend friends to a user based on interest similarity, celebrity degree, and online behaviour is of interest to social networks themselves. This problem is explored to establish and apply an efficient and easy way to classify a social network of Arab users based on their interests using available types of information, whether textual or nontextual, and to try to increase the accuracy of interest classification. Since most of the social networking is done from the mobiles nowadays, the efficient and reliable algorithm can help in developing a robust app that can perform the tweet classification on mobile phones.

Online users create their profiles on numerous social platforms to get benefits of various types of social media content. During online profile creation, the user selects a username and feeds his/her personal details like name, location, email, etc. As different social networking services acquire common personal attributes of the same user and present them in a variety of formats. To understand the availability and similarity of personal attributes across various social networking services, we propose a method that uses the different distance measuring algorithms to determine the display-name similarity across social networks. From the experimental results, it is found that at least twenty percent GooglePlus-Facebook and Facebook-Twitter users select the same display name, while forty five percent Google and Twitter user select identical name across both the social networks.


Author(s):  
Mamata Rath

A social network is a portrayal of the social structure between actors, mostly individuals or organizations. It indicates the ways in which they are connected through various social familiarities ranging from casual acquaintance to close familiar bonds. This chapter exhibits an exhaustive review of various security and protection issues in social networks that directly or indirectly affect the individual member of the network. Furthermore, different threats in social networks have been focused on that appear because of the sharing of interactive media content inside a social networking site. Additionally, the chapter also reports current cutting-edge guard arrangements that can shield social network clients from these dangers.


2017 ◽  
Vol 1 (9) ◽  
pp. 45
Author(s):  
Aleksandrs Larionovs ◽  
Sandra Murinska ◽  
Anda Zvaigzne

In the era of information, the global network has become one of the ways for expanding entrepreneurship and, consequently, various kinds of network services have emerged as well. Social networks provide the spread of information, the positioning of a company and the company’s communication with its clients. There is competition among such service providers, their services are diverse and the social networking opportunities offered are increasing; accordingly, the present research analyses opportunities to raise the competitiveness of social network services. The research aim is to perform an examination of the features of social networks in Latvia for ensuring the competitiveness of the social networks.The research focused on the social networking features of and the opportunities offered by the following social networks: draugiem.lv, facebook.com, ok.ru, vk.com.The research employed the following methods: analysis and synthesis, induction and deduction, the monographic method, document analysis, the graphic method and the sociological method – a survey.The competitiveness of social networks is mainly determined by the functional diversity and innovations of the social networks. Any social network company has to use innovations to outperform its competitors in an oversaturated market by means of providing new networking features.


2013 ◽  
Vol 15 (1) ◽  
Author(s):  
Stephen M. Mutula

Background: With the growing adoption and acceptance of social networking, there are increased concerns about the violation of the users’ legitimate rights such as privacy, confidentiality, trust, security, safety, content ownership, content accuracy, integrity, access and accessibility to computer and digital networks amongst others.Objectives: The study sought to investigate the following research objectives to: (1) describe the types of social networks, (2) examine global penetration of the social networks, (3) outline the users’ legitimate rights that must be protected in the social networking sites (SNS), (4) determine the methods employed by SNS to protect the users’ legitimate rights and (5) identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS.Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively.Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate.Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.


Author(s):  
Khalid Abdulkareem Al-Enezi ◽  
Imad Fakhri Taha Al Shaikhli ◽  
Sufyan Salim Mahmood AlDabbagh

<span>This research aims to measure the role of social networks in influencing purchasing decisions among consumers in Kuwait; the research used the quantitative methods, and analytical the technique to get the results, and the research developed a measure to study the relationship between the variables to the study and selection of a sample of consumers of (100). The results indicated that the social networking variables (exchange of information, evaluation of product) possess influence on purchasing decisions. Furthermore, the results indicate that majority of respondents do their digital scanning more often before intend to go to the store. The unexpected results came from the question “traditional advertising (TV, Newspaper, Magazine, Billboards) are more effective than the social networking; 23% agreed, 36% said no, and 41% said sometimes. In light of these findings, the study made a series of recommendations; the most important are; The executives and sales representatives need to understand the benefits offered by social networks, and understand the advantages and functions and tools of social communication, and knowing how to apply them effectively and efficiently, and then use the appropriate social networking tool.</span>


2014 ◽  
pp. 1717-1730
Author(s):  
Joanne Kuzma

The growth of Online Social Networking sites has brought new services and communication methods to consumers. However, along with benefits, serious problems such as online cyber harassment have recently come to the forefront of the electronic media. This behavior can have significant negative effect on individuals, businesses and the social networks. Some sites have begun to provide some levels of protection and create specific anti-harassment policies in their terms of service along with implementing protection technologies. However, these protective measures are not consistent among social media, leaving some consumers at greater risk. This study analyzed 60 worldwide social sites and determined the level of cyber-harassment protection. It reviewed statistical differences among geographical-based social networks. The results showed significant gaps among various social networks, but suggests methods for improving consumer safeguards to provide consistent levels of protection.


Author(s):  
Emad Abu-Shanab ◽  
Mushera Frehat

Social networks are virtual communication sites that allow its participants to connect, building relationships, and collaborate on social issues. It became part of our lives and spread rapidly among youth. Young people join these sites to keep strong relationships with friends and to make new ones. Therefore, it is important to investigate the factors that influence the intention to use social networking sites (SNSs) to gain better position in the social reform among young people. This study developed an integrated theoretical model which has five major factors that predict the intention to use SNSs. An empirical test was conducted, where a sample of 302 university students and an instrument containing 27 items was used. The results provide consistent evidence that all hypothesized positive associations exist except for the isolation variable. After taking into account different demographic and attitudinal variables, Facebook use still predicted respondents' social reform. The future work might focus on a specific context such as the effects of using social networks on education, and focus on students' environment in education and the influence of social network. Detailed results, conclusions and future work are stated in later sections.


Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequate for the high value of the published information. For all these reasons, online social networks suffer more and more attacks by sophisticated crackers and scammers. To make things worse, the information gathered from social web sites can trigger attacks to even more sensible targets. This work reviews some typical social attacks that are conducted on social networking systems, describing real-world examples of such violations and analyzing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


2011 ◽  
pp. 1286-1297
Author(s):  
Malcolm Shore

This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the evolution of hacking as a form of social networking, from its roots in Bulletin Board systems to the current attacks on Second Life, and considers the motivation for hacking. Ajzen’s Theory of Planned Behavior and Beveren’s Flow Theory model are, when considered together, found to explain many of the observed characteristics of early hacker activity. The place of social networks in motivating hacking is explored, and some observations are made in relation to hacking and the Second Life environment. A number of control variables are identified which can be used to reduce the likelihood of people engaging in the hacking activity. Addressing the social network factors which motivate hacking provides an important early step in addressing cybercrime.


Author(s):  
Mehmet Ferhat Sönmez

Identity emerges as a flexible, multidimensional, variable, and slippery concept that cannot be defined through the processes of discussion and understanding. The new construction area of this concept, which is regarded as a process constructed on the social plane, is the social networking platforms. This is because these platforms are the most common communication environments where people and their lifestyles are presented to the outside world, in addition to the cheap and rapid satisfaction of their needs for information and entertainment. Face-to-face communication and language practices are not sufficient enough in the identity presentation anymore. Individuals choose to design and update their identities through social networks and to perform an image-based identity manifestation. This chapter examines how identity was established and manifested through social networks, and analyzes the identities the popular people in these networks designed and exhibited.


Sign in / Sign up

Export Citation Format

Share Document