SlideShare una empresa de Scribd logo
1 de 72
Mining and Analyzing Social Media: Part 2
                                   Dave King
                              January 7, 2013
Agenda: Part 2

 • Sentiment Analysis & Opinion Mining
    • Defined
    • Business Interest & Software Packages
    • Levels of Analysis
    • Automated Classification
 • Social Network Analysis
    • Defined
    • History
    • Basic techniques and measures
    • Ego and Social-Centric Analysis

                                                                        2
               Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis and Opinion Mining:
Interchangeable Terms

Computational study of opinions, sentiments,
subjectivity, evaluations, attitudes, appraisals,
affects, views, emotions, etc., expressed in
text. (Lui, 2012)




                                                                         3
                Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis and Opinion Mining:
Business Interests
   Service                   Products                                   Marketing




  Response         Issues and Focus                                     Message




                            Company
                                                                                    4
               Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Opinion Mining and Sentiment Analysis:
 Some Sample Questions of Interest

• Is the sentiment towards my X primarily positive,
  neutral, or negative? How does it compare to my
  key competitors? Has it changed overtime?
• What factors are positively and negatively
  influencing my X’s image?
• Are there opportunities and needs my customers
  are identifying for me through their conversations?

                                                                           5
                  Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Opinion Mining and Sentiment Analysis:
An Offshoot of Social CRM

                                              Social CRM
                                              • Social Media services,
                                                techniques and
                                                technology for engaging
                                                customers
                                              • Sometimes synonymous
                                                with Social Media
                                                Monitoring
                                              • Gartner’s Magic Quadrant
                                                has a min of $10M in rev.


                                                                        6
               Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Opinion Mining and Sentiment Analysis:
An Offshoot of Social CRM




                                                                        7
               Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Opinion Mining and Sentiment Analysis:
An Offshoot of Social CRM




                                                                        8
               Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis and Opinion Mining:
Commercial Products – General Operation




                                                                        9
               Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis and Opinion Mining:
Some Examples – What do you see?




                                                                        10
               Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis and Opinion Mining:
    What do you see?
•   Opinion holders: persons who hold the opinions
•   Opinion targets: entities and their features/aspects
•   Sentiments: positive and negative
•   Time: when opinions are expressed




                                                                             11
                    Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis and Opinion Mining:
Opinion Defined
Simply a positive or negative sentiment, view, attitude,
emotion, or appraisal about an entity or an aspect of the entity
from an opinion holder at a particular point in time.

 • Opinion is a quintuple (ej, ajk, soijkl, hi, tl)
 • Sentiment orientation (“so”): +, -, or possibly neutral




                                                                              12
                     Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis and Opinion Mining:
Level of Analysis

• Document Level: +, -, or 0*
• Sentence Level: +, -, or 0*
• Entity and Feature/Aspect Level: +, -, or 0*

                                                         0* ~ possibly neutral




                                                                                 13
                 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis and Opinion Mining:
Example – Document Sentiment Classification

  • Basically a Text Classification Problem
  • Assumptions
     – Each document written by single person
     – About single entity
     – Goal: discover (_,_,so,_,_)




                                                                         14
                Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis and Opinion Mining:
  Example – Document Sentiment Classification



 Collection    Doc-Term                  Automated
of Text Docs    Matrix*                 Classification
                                            ???                            +    Small Set of
                                                                               Predetermined
                                                                                 Sentiment
                                        Unsupervised                       -     Categories
                                        Supervised




                                                                                       15
                  Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis and Opinion Mining:
Example – Document Sentiment Classification
          Real-World
 Reviews with known sentiment                               Training Process
                                                         Reviews with known Classification

             Document
            Consolidation
                                                           Train                 Test        Validate

            Establish the
              Corpus

                                                                            Classification
       Corpus Refinement                                                    Algorithm??
      (Token, Stem, Stop…)


        Feature Selection
          & Weighting
                                                                           -            +
 Doc-Term
  Matrix
                                                                                                        16
                             Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis and Opinion Mining:
Example – Document Sentiment Classification

  Supervised Classification Algorithms
         •   Naïve Bayes
         •   Support Vector Machine
         •   Decision Trees
         •   Nearest Neighbor (k-NN)
         •   Neural Nets (e.g. SOM)
         •   …
                                                                          17
                 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis:
Doing Simple Sentiment Analysis
                P(H/D) = P(D/H) * P(H)/P(D)
                 H is the hypothesis and D is the data

                 P(H) is the prior probability of H: the probability that H is
                 correct before the data D are seen

                 P(D/H) is the conditional probability of seeing the data D
                 given that the hypothesis H is true. This conditional
                 probability is called the likelihood.
 Thomas Bayes
                 P(D) is the marginal probability of D.

                 P(H/D) is the posterior probability: the probability that
                 the hypothesis is true, given the data and the previous
                 state of belief about the hypothesis.



                Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis:
 Doing Simple Sentiment Analysis
                                                               Training Set




P(Positive | Tweet)
compared to
P(Negative | Tweet)                 P(Pos | Word) = P(Pos) * P(W1/Pos) / P(M)
                                    P(Pos| fail) = P(Pos) * P(great/Pos)
                                    P(Pos | fail) = (2/5) * (1/2) = .2

                                    P(Neg | Word) =        P(N) * P(W1/N) / P(M)
                                    P(Neg | fail) = P(Neg) * P(great/Neg)
                                    P(Neg| fail) = (3/5)*(2/3) = .4



                      Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis:
 Doing Simple Sentiment Analysis
                                                            Training Set



P(Positive | Tweet)
compared to
P(Negative | Tweet)

                       P(Pos | Words) = P(Pos) * P(W1/Pos) * P(W2/Pos) * ...
                       P(Pos | poor & fail) = P(Pos) * P(poor/Pos) * P(fail/Pos)
                       P(Pos | poor & fail) = .4 * 0 * .5 = 0

                       P(Neg | Words) =      P(Neg) * P(W1/Neg) * P(W2/Neg) * ...
                       P(Neg | poor & fail) = P(Neg) * P(poor/Neg) * P(fail/Neg)
                       P(Neg | poor & fail) = .6 * .67 * .67 = .27




                      Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis:
Doing Simple Sentiment Analysis
                                                           Confusion Matrix



How do you
know if your
model works?                             Accuracy = (TP + TN)/N
                                         Recall = TP / (TP + FN)
Depends on                               Precision = TP / (TP + FP)
your Goal?                               Error = (FP + FN)/N
                                         F1 = 2*Recall*Precision/(Recall +
                                         Precision)

                                         Where N = TP+FP+FN+TN

             Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis:
Summary
• From one type to the next (classification, features,
  comparisons), it becomes more complex to extract
  the information.
• Once extracted, standard text mining techniques can
  be used to classify and compare the opinions
• Simple techniques (like naïve Bayesian) often
  produce strong results (e.g. 80+% accuracy)


                                                                           22
                  Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Sentiment Analysis:
Comparing Techniques




 Baselines and Bigrams: Simple, Good Sentiment and Topic Classification
 Wang and Manning

                                                                                23
                       Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
What do they have in common?




                                                                       24
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Here’s a hint




                                                                         25
                Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
…and the answer is
their Erdos-Bacon Number equals
 3+3


                                                                         4.65




          5+1
                                                                  = +
 4+2                                                                     2.957

                                                                                 26
                Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Suppose I started with this.
What would you have guessed?




                                                                       27
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Six Degrees of Separation
      Frigyes Karinthy                                         Stanley Milgram




                1929                                            1967




                                        6
                1990                                            1998



        John Guare                                                Duncan Watts
                                                                                 28
                  Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Six Degrees of Separation

 A fascinating game grew out of this discussion. One of us suggested performing
 the following experiment to prove that the population of the Earth is closer
 together now than they have ever been before. We should select any person from
 the 1.5 billion inhabitants of the Earth—anyone, anywhere at all. He bet us that,
 using no more than five individuals, one of whom is a personal acquaintance, he
 could contact the selected individual using nothing except the network of
 personal acquaintances.

                                                                    Frigyes Karninthy , Chains, 1929


  A             1            2                     3                      4         5

       Degrees of separation ~ average path length ~ distance


                                                                                                       29
                           Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis
Definitions

Network – Collection of things and their
relationships to one another.

Social Network – Collection of humans, roles,
groups, and/or institutions and their relationships
with one another.
Social Network Analysis (SNA) – Application of
Graph Theory or Network Science to the study of
social relationships and connections.

                                                                          30
                 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis
Main Purpose

Detecting and interpreting patterns of social
ties among actors. A pattern is meaningful if
it expresses:

  • Choices by social actors

  • Impact of the social system on actors’
    behaviors and attitudes

                                                                        31
               Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Brief Highlights




                                                                       32
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Early Efforts




                                                                       33
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Visualization/Analysis Libraries




                                        © 1973




                                                                       34
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Growing Interest
                                ―Ten years ago, the field of
                                Social Network Analysis was
                                a scientific backwater. We
                                were the misfits, rejected
                                from both mainstream
                                sociology and mainstream
                                computer science… The
                                advent of the Social Internet
                                changed everything.‖
                                                                         35
                Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Growing Interest




                                                                         36
                Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Growing Interest

                            … the availability of
                            massive amounts of data
                            in an online setting has
                            given a new impetus
                            towards a scientifically
                            and statistically robust
                            study of the field of social
                            networks

                                                                         37
                Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Growing Interest
   Dining Table Partners                  World Trade                                US Political Blogs
   N=26                          N=80                                               N~1400




   Russian LiveJournal            Egyptian Revolution                                 Mobile Phones
   N~3.5K                        N~90K                                              N=20M




                                     Facebook Friends
                                 N = 721M




                           Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
                                                                                                          38
Social Network Analysis:
Types of Structural Analysis

                                •      Social Influence Analysis
                                •      Expert Discovery
                                •      Node Classification
                                •      Link Prediction
                                •      Community, Subgroup & Clique
                                       Detection in Social Networks
                                •      Evolution in dynamic Social Networks
                                •      Statistical Analysis and Comparison –
                                       Small Worlds, Weak Ties, and Random
                                       Models
                                •      Visualization


                                                                               39
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Introduction




                                                                       40
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
 Key Elements
Graph or Network                                                           Graph
The set of
                                                                          [ V,E, f ]
vertices/nodes,                                          A
edges/links and the
relationship/function
connecting them.                                                                     B

Vertices or Nodes                                                                        Edge
                                                     C                                   (Link)
The “things”
                                                                                 D
                                               Vertex
Edges or Links
                                               (Node)
The “relationships”

                                                                                                  41
                        Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Alternative Representations

   Graph                   Edge                                        Adjacency
                           List                                         Matrix




                                                                                   42
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Types of Edges or Links
    Undirected,                                          Directed,
    Unweighted                                          Unweighted
A                 B                       A                  Twitter
                                                                            B
     Facebook
      Friends                                               Followers


        C                                                          C
    Undirected,                                 Directed, Weighted
     Weighted                                                  100

A    Facebook
                  B                       A                     60          B
                                                       5       Email 70
      Friends
                                                              Network      20
                                             10

        C                                                          C

                                                                                43
                  Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Alternative Representations

   Graph                   Edge                                        Adjacency
                           List                                         Matrix




                                                                                   44
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
 Types of Networks & Approaches
    Ego-Centered Approach                                          Socio-centered Approach
        ―Ego-Network‖                                                 ―Whole‖ Network

       P4            P5                                                           P6


     Ego      P1      Alters
                                                                            P4         P5


       P2           P3                                                            P1

Vertex (Ego), Neighbors (Alters) &
  all lines among the Neighbors                                              P2        P3

                                                                                             45
                         Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
   Centrality – Who is key?
Measure       Definition                             Interpretation                           Reasoning
Degree        Number of edges or links. In           How connected is a node? How             Higher probability of receiving and transmitting
              degree- links in, Out-degree - links   many people can this person reach        information flows in the network. Nodes considered to
              out                                    directly?                                have influence over larger number of nodes and or are
                                                                                              capable of communicating quickly with the nodes in
                                                                                              their neighborhood.
Betweenness   Number of times node or vertex         How important is a node in terms         Degree to which node controls flow of information in
              lies on shortest path between 2        of connecting other nodes? How           the network. Those with high betweenness function as
              nodes divided by number of all the     likely is this person to be the most     brokers. Useful where a network is vulnerable.
              shortest paths                         direct route between two people
                                                     in the network?
Closeness     1 over the average distance            How easily can a node reach other   Measure of reach. Importance based on how close a
              between a node and every other         nodes? How fast can this person     node is located with respect to every other node in the
              node in the network                    reach everyone in the network?      network. Nodes able to reach most or be reached by
                                                                                         most all other nodes in the network through geodesic
                                                                                         paths.
Eigenvector   Proporational to the sum of the        How important, central, or          Evaluates a player's popularity. Identifies centers of
              eigenvector centralities of all the    influential are a node’s neighbors? large cliques. Node with more connections to higher
              nodes directly connected to it.        How well is this person connected scoring nodes is more important.
                                                     to other well-connected people?




                                                                                                                                             46
                                                Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Centrality – Who is most important?
    B                   E
                                        Eigen

            D
A                           G


                F
C
                                        Betw
                    H
                                        Close
R
                    I           N
        P                               Deg
                        J
                                    O
    K
                            M
                L


                            Q


                            S

                                                                                                         47
                                                Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Cohesion – Overall structure




                                                                       48
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Cohesion – How well connected?
    B                   E


            D
A                           G


                F
C


                    H

R
                    I           N
        P
                        J
                                    O
    K
                            M
                L


                            Q


                            S

                                                                                                 49
                                        Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Ego Centered – Simple Example




          http://apps.facebook.com/touchgraph/
                                                                        50
               Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Ego Centered – Another Example




                                                                     51
            Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Ego-Centered – Simple Example




                                                                     52
            Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Ego Analysis – Simple Example
     Netvizz7.0                                          .gdf (GUESS) file format




                                                                               53
                  Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Some Analytical Alternatives
 GUESS       Gephi                                     NodeXL          NetViz




 Pajek      SocVNet                           UCINet/NetDraw           Visone




          Visual/Analytical Packages
                                                                                54
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Some Analytical Alternatives

• igraph (R, Python, C): Creating and manipulating
  graphs
• libSNA (Python): Open-source library for social
  network analysis (2008 last update)
• NetworkX (Python): Package for complex networks
• SNA (R): Social Network Analysis tools

         Visual/Analytical Libraries/Modules
                                                                          55
                 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Some Analytical Alternatives




                                                                       56
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Ego Analysis – Simple Example




                                                                      57
             Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Ego Analysis – Simple Example




                                                                      58
             Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
  Ego Analysis – Simple Example
N = 67                       L = 235




                                                                        59
               Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Ego Analysis – Simple Example
                        Skewed                                              Furthest
                                                                            Distance
                          Power
                          Law?




                                                   Males=76%
     Strong                  Weak
     Within                  .11
     Clusters                Overall




   PL = N(N-1)/2 = 2211 Ego Density = L/PL = 235/2211 =.11

                                                                                       60
                   Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Large Scale Networks
                                The emergence of online social networking services over
                                the past decade has revolutionized how social scientists
                                study the structure of human … previously invisible social
                                structures are being captured at tremendous scale and with
                                unprecedented detail.




                                         Accessed within 28 days of May ’11
                                                At least one friend
                                               Over 13 years of age

                                                                                      61
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Large Scale Networks


                                                                              14% for 100




         Assortativity                                                                      P(F|F) = .52
                                                                                            P(F|M) = .51




                                                                                                           62
                     Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Is it a Small World after all?

                                        Average                                Average
                                          4.7                                    4.3




                                                                        World 92% 99.6%
                                                                        US    96% 99.7%




                                                                                          63
               Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Second Example
                                      • Single day snapshot of a
                                        Snowball Sample of
                                        Political Blogs (N=1490)
                                      • Manually assigned as
                                        Liberal or Conservative
                                      • Focus on Blogrolls and
                                        front page citations
                                      • Primary question: Cyber-
                                        balkanization?
                                                                       64
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Balkanization (regular kind)




  Process of fragmentation or division of a region or
  state into smaller regions or states that are often
  hostile or non-cooperative with each other.
                                                                          65
                 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Cyber-balkanization?




 Proliferation of specialized online news sources allows people with
 different political leanings to be exposed only to information in
 agreement with their previously held views.
                                                                               66
                      Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Cyber-balkanization?
                                         N=1490
                                      Edges = 16715




          N=758                                                                     N=732
       Edges = 7301                                                              Edges = 7839




         Liberals                                                              Conservatives



                                                                                                67
                      Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Political Blogs – Cyberbalkanization?




                                                                       68
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Networks:
Political Blogs - Metrics




                                                                        69
               Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Statistical Network Models
                       A Statistical Network Model
                       - Assumes that part of the structure
                         of an observed network is random
                       - Mathematical description of a
                         collection of possible networks and
                         a probability distribution on this set
                       - Informs us about which network
                         characteristics to expect if lines
                         assigned to pairs of vertices at
                         random
                                                                       70
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Statistical Network Models


                -      Classic Bernouilli
                -      Conditional Uniform
                -      Small-World
                -      Preferential Attachment

                                                                       71
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
Social Network Analysis:
Political Blogs - Comparisons




                                                                       72
              Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL

Más contenido relacionado

La actualidad más candente

IBM Cognos - Vad handlar egentligen prediktiv analys om?
IBM Cognos - Vad handlar egentligen prediktiv analys om?IBM Cognos - Vad handlar egentligen prediktiv analys om?
IBM Cognos - Vad handlar egentligen prediktiv analys om?IBM Sverige
 
IBM Business Analytics and Optimization - Introduktion till Prediktiv Analys
IBM Business Analytics and Optimization - Introduktion till Prediktiv AnalysIBM Business Analytics and Optimization - Introduktion till Prediktiv Analys
IBM Business Analytics and Optimization - Introduktion till Prediktiv AnalysIBM Sverige
 
New Analytical Architectures for Big Data
New Analytical Architectures for Big DataNew Analytical Architectures for Big Data
New Analytical Architectures for Big DataCasey Kiernan
 
Knowledge management for analytic teams jaime fitzgerald and alex hasha - p...
Knowledge management for analytic teams   jaime fitzgerald and alex hasha - p...Knowledge management for analytic teams   jaime fitzgerald and alex hasha - p...
Knowledge management for analytic teams jaime fitzgerald and alex hasha - p...Fitzgerald Analytics, Inc.
 
Recommendations and Feedback - The user-experience of a recommender system
Recommendations and Feedback - The user-experience of a recommender systemRecommendations and Feedback - The user-experience of a recommender system
Recommendations and Feedback - The user-experience of a recommender systemBart Knijnenburg
 

La actualidad más candente (9)

IBM Cognos - Vad handlar egentligen prediktiv analys om?
IBM Cognos - Vad handlar egentligen prediktiv analys om?IBM Cognos - Vad handlar egentligen prediktiv analys om?
IBM Cognos - Vad handlar egentligen prediktiv analys om?
 
Data Warehouse: Basics
Data Warehouse: BasicsData Warehouse: Basics
Data Warehouse: Basics
 
Disney Field Study
Disney Field StudyDisney Field Study
Disney Field Study
 
IBM Business Analytics and Optimization - Introduktion till Prediktiv Analys
IBM Business Analytics and Optimization - Introduktion till Prediktiv AnalysIBM Business Analytics and Optimization - Introduktion till Prediktiv Analys
IBM Business Analytics and Optimization - Introduktion till Prediktiv Analys
 
PhD Plan of Analysis Seminar_apurva_pandya 29feb2012
PhD Plan of Analysis Seminar_apurva_pandya 29feb2012PhD Plan of Analysis Seminar_apurva_pandya 29feb2012
PhD Plan of Analysis Seminar_apurva_pandya 29feb2012
 
New Analytical Architectures for Big Data
New Analytical Architectures for Big DataNew Analytical Architectures for Big Data
New Analytical Architectures for Big Data
 
Knowledge management for analytic teams jaime fitzgerald and alex hasha - p...
Knowledge management for analytic teams   jaime fitzgerald and alex hasha - p...Knowledge management for analytic teams   jaime fitzgerald and alex hasha - p...
Knowledge management for analytic teams jaime fitzgerald and alex hasha - p...
 
Mds customer insight tools
Mds customer insight toolsMds customer insight tools
Mds customer insight tools
 
Recommendations and Feedback - The user-experience of a recommender system
Recommendations and Feedback - The user-experience of a recommender systemRecommendations and Feedback - The user-experience of a recommender system
Recommendations and Feedback - The user-experience of a recommender system
 

Destacado

The colourful friends
The colourful friendsThe colourful friends
The colourful friendsAlka Rao
 
сексембаева ш.и.
сексембаева ш.и.сексембаева ш.и.
сексембаева ш.и.skatelal
 
20110216テクマトリックス講演資料(配布版)
20110216テクマトリックス講演資料(配布版)20110216テクマトリックス講演資料(配布版)
20110216テクマトリックス講演資料(配布版)Koki Uchiyama
 
Marketing Talks - Marketing Digital (Luciano Palma) ADVP/Sinapro-PA
Marketing Talks - Marketing Digital (Luciano Palma) ADVP/Sinapro-PAMarketing Talks - Marketing Digital (Luciano Palma) ADVP/Sinapro-PA
Marketing Talks - Marketing Digital (Luciano Palma) ADVP/Sinapro-PALuciano Palma
 
20120509 hsa business-week
20120509 hsa business-week20120509 hsa business-week
20120509 hsa business-weekDimitris Tsingos
 
Holokausti ohvrite mälestuspäev
Holokausti ohvrite mälestuspäevHolokausti ohvrite mälestuspäev
Holokausti ohvrite mälestuspäevGrete
 
Hadoop Enterprise Readiness
Hadoop Enterprise ReadinessHadoop Enterprise Readiness
Hadoop Enterprise Readinessad17633
 
iGaming Business Social Monitor solution
iGaming Business Social Monitor solutioniGaming Business Social Monitor solution
iGaming Business Social Monitor solutionJoakim Nilsson
 
Pharma: Sky’s the Limit if You Have an ‘Entrepreneurial’ Mindset
Pharma: Sky’s the Limit if You Have an ‘Entrepreneurial’ MindsetPharma: Sky’s the Limit if You Have an ‘Entrepreneurial’ Mindset
Pharma: Sky’s the Limit if You Have an ‘Entrepreneurial’ MindsetAnup Soans
 
Brite Conference Presentation 4 1 10
Brite Conference Presentation 4 1 10Brite Conference Presentation 4 1 10
Brite Conference Presentation 4 1 10SheSpeaks Inc.
 
Bloco K: Entenda as mudanças e prepare-se
Bloco K: Entenda as mudanças e prepare-seBloco K: Entenda as mudanças e prepare-se
Bloco K: Entenda as mudanças e prepare-seSenior Sistemas
 
James Metcalfe's Real Estate Update August 2012
James Metcalfe's Real Estate Update August 2012James Metcalfe's Real Estate Update August 2012
James Metcalfe's Real Estate Update August 2012James Metcalfe
 
2011 UniServ Skills: Harnessing Social Media
2011 UniServ Skills: Harnessing Social Media2011 UniServ Skills: Harnessing Social Media
2011 UniServ Skills: Harnessing Social MediaNEA
 
Trend2014del1 slut.key
Trend2014del1 slut.keyTrend2014del1 slut.key
Trend2014del1 slut.keyGoran Adlen
 

Destacado (20)

The colourful friends
The colourful friendsThe colourful friends
The colourful friends
 
сексембаева ш.и.
сексембаева ш.и.сексембаева ш.и.
сексембаева ш.и.
 
20110216テクマトリックス講演資料(配布版)
20110216テクマトリックス講演資料(配布版)20110216テクマトリックス講演資料(配布版)
20110216テクマトリックス講演資料(配布版)
 
Gjensidige
GjensidigeGjensidige
Gjensidige
 
Pile 2 sessió 7
Pile 2 sessió 7Pile 2 sessió 7
Pile 2 sessió 7
 
Marketing Talks - Marketing Digital (Luciano Palma) ADVP/Sinapro-PA
Marketing Talks - Marketing Digital (Luciano Palma) ADVP/Sinapro-PAMarketing Talks - Marketing Digital (Luciano Palma) ADVP/Sinapro-PA
Marketing Talks - Marketing Digital (Luciano Palma) ADVP/Sinapro-PA
 
20120509 hsa business-week
20120509 hsa business-week20120509 hsa business-week
20120509 hsa business-week
 
Holokausti ohvrite mälestuspäev
Holokausti ohvrite mälestuspäevHolokausti ohvrite mälestuspäev
Holokausti ohvrite mälestuspäev
 
Hadoop Enterprise Readiness
Hadoop Enterprise ReadinessHadoop Enterprise Readiness
Hadoop Enterprise Readiness
 
iGaming Business Social Monitor solution
iGaming Business Social Monitor solutioniGaming Business Social Monitor solution
iGaming Business Social Monitor solution
 
Pharma: Sky’s the Limit if You Have an ‘Entrepreneurial’ Mindset
Pharma: Sky’s the Limit if You Have an ‘Entrepreneurial’ MindsetPharma: Sky’s the Limit if You Have an ‘Entrepreneurial’ Mindset
Pharma: Sky’s the Limit if You Have an ‘Entrepreneurial’ Mindset
 
eFront e-Learning
eFront e-LearningeFront e-Learning
eFront e-Learning
 
Problem solving
Problem solvingProblem solving
Problem solving
 
Brite Conference Presentation 4 1 10
Brite Conference Presentation 4 1 10Brite Conference Presentation 4 1 10
Brite Conference Presentation 4 1 10
 
Bloco K: Entenda as mudanças e prepare-se
Bloco K: Entenda as mudanças e prepare-seBloco K: Entenda as mudanças e prepare-se
Bloco K: Entenda as mudanças e prepare-se
 
Navigating the Dining Halls in College
Navigating the Dining Halls in CollegeNavigating the Dining Halls in College
Navigating the Dining Halls in College
 
Gps4b
Gps4bGps4b
Gps4b
 
James Metcalfe's Real Estate Update August 2012
James Metcalfe's Real Estate Update August 2012James Metcalfe's Real Estate Update August 2012
James Metcalfe's Real Estate Update August 2012
 
2011 UniServ Skills: Harnessing Social Media
2011 UniServ Skills: Harnessing Social Media2011 UniServ Skills: Harnessing Social Media
2011 UniServ Skills: Harnessing Social Media
 
Trend2014del1 slut.key
Trend2014del1 slut.keyTrend2014del1 slut.key
Trend2014del1 slut.key
 

Similar a Social media mining hicss 46 part 2

The MarkeTech Group - Scientific Method Webinar
The MarkeTech Group - Scientific Method WebinarThe MarkeTech Group - Scientific Method Webinar
The MarkeTech Group - Scientific Method WebinarThe MarkeTech Group
 
Information Management and Analytics
Information Management and Analytics Information Management and Analytics
Information Management and Analytics AKAGroup
 
Mesh Labs Introduction June 2012
Mesh Labs Introduction June 2012Mesh Labs Introduction June 2012
Mesh Labs Introduction June 2012Umesh Ramalingachar
 
Predictive analytics km chicago
Predictive analytics km chicagoPredictive analytics km chicago
Predictive analytics km chicagoKM Chicago
 
Perceptor English
Perceptor EnglishPerceptor English
Perceptor EnglishErwan de
 
Evaluating Big Data Predictive Analytics Platforms
Evaluating Big Data Predictive Analytics PlatformsEvaluating Big Data Predictive Analytics Platforms
Evaluating Big Data Predictive Analytics PlatformsTeradata Aster
 
Singapore - "Talent Mapping Intelligence"
Singapore - "Talent Mapping Intelligence"Singapore - "Talent Mapping Intelligence"
Singapore - "Talent Mapping Intelligence"Dave Mendoza
 
7 dee finding the right methodologies marshall sponder - 9-12-12 - submitted
7 dee finding the right methodologies   marshall sponder - 9-12-12 - submitted7 dee finding the right methodologies   marshall sponder - 9-12-12 - submitted
7 dee finding the right methodologies marshall sponder - 9-12-12 - submittedMarshall Sponder
 
Jean-Marc Lazard d'Exalead - Pioneering hypermedia - SEO Campus 2011
Jean-Marc Lazard d'Exalead - Pioneering hypermedia - SEO Campus 2011Jean-Marc Lazard d'Exalead - Pioneering hypermedia - SEO Campus 2011
Jean-Marc Lazard d'Exalead - Pioneering hypermedia - SEO Campus 2011SEO CAMP
 
The New Normal: Predictive Power on the Front Lines
The New Normal: Predictive Power on the Front LinesThe New Normal: Predictive Power on the Front Lines
The New Normal: Predictive Power on the Front LinesInside Analysis
 
Social media mining hicss 46 part 1
Social media mining   hicss 46 part 1Social media mining   hicss 46 part 1
Social media mining hicss 46 part 1Dave King
 
Basic web analytics for news organizations
Basic web analytics for news organizationsBasic web analytics for news organizations
Basic web analytics for news organizationsDana Chinn
 
Webinar Audience Insight in the Real-time Era
Webinar Audience Insight in the Real-time EraWebinar Audience Insight in the Real-time Era
Webinar Audience Insight in the Real-time EraiCrossing
 
Innovate Analytics with Oracle Data Mining & Oracle R
Innovate Analytics with Oracle Data Mining & Oracle RInnovate Analytics with Oracle Data Mining & Oracle R
Innovate Analytics with Oracle Data Mining & Oracle RCapgemini
 
When SharePoint Isn't Enough - Adding Enterprise Class Search for Better Coll...
When SharePoint Isn't Enough - Adding Enterprise Class Search for Better Coll...When SharePoint Isn't Enough - Adding Enterprise Class Search for Better Coll...
When SharePoint Isn't Enough - Adding Enterprise Class Search for Better Coll...Helen Mitchell
 
DigitalMR social media research sept 2011
DigitalMR social media research sept 2011DigitalMR social media research sept 2011
DigitalMR social media research sept 2011Michalis A. Michael
 
Customer Insights Summit Toronto 2012
Customer Insights Summit Toronto 2012Customer Insights Summit Toronto 2012
Customer Insights Summit Toronto 2012Fabiana Pereira
 
Laurie Dillon-Schalk - Developing a Digital Strategy & Roadmap
Laurie Dillon-Schalk - Developing a Digital Strategy & RoadmapLaurie Dillon-Schalk - Developing a Digital Strategy & Roadmap
Laurie Dillon-Schalk - Developing a Digital Strategy & RoadmapCanadaHelps / MyCharityConnects
 

Similar a Social media mining hicss 46 part 2 (20)

The MarkeTech Group - Scientific Method Webinar
The MarkeTech Group - Scientific Method WebinarThe MarkeTech Group - Scientific Method Webinar
The MarkeTech Group - Scientific Method Webinar
 
Information Management and Analytics
Information Management and Analytics Information Management and Analytics
Information Management and Analytics
 
Mesh Labs Introduction June 2012
Mesh Labs Introduction June 2012Mesh Labs Introduction June 2012
Mesh Labs Introduction June 2012
 
Predictive analytics km chicago
Predictive analytics km chicagoPredictive analytics km chicago
Predictive analytics km chicago
 
Perceptor English
Perceptor EnglishPerceptor English
Perceptor English
 
Evaluating Big Data Predictive Analytics Platforms
Evaluating Big Data Predictive Analytics PlatformsEvaluating Big Data Predictive Analytics Platforms
Evaluating Big Data Predictive Analytics Platforms
 
Singapore - "Talent Mapping Intelligence"
Singapore - "Talent Mapping Intelligence"Singapore - "Talent Mapping Intelligence"
Singapore - "Talent Mapping Intelligence"
 
7 dee finding the right methodologies marshall sponder - 9-12-12 - submitted
7 dee finding the right methodologies   marshall sponder - 9-12-12 - submitted7 dee finding the right methodologies   marshall sponder - 9-12-12 - submitted
7 dee finding the right methodologies marshall sponder - 9-12-12 - submitted
 
Jean-Marc Lazard d'Exalead - Pioneering hypermedia - SEO Campus 2011
Jean-Marc Lazard d'Exalead - Pioneering hypermedia - SEO Campus 2011Jean-Marc Lazard d'Exalead - Pioneering hypermedia - SEO Campus 2011
Jean-Marc Lazard d'Exalead - Pioneering hypermedia - SEO Campus 2011
 
The New Normal: Predictive Power on the Front Lines
The New Normal: Predictive Power on the Front LinesThe New Normal: Predictive Power on the Front Lines
The New Normal: Predictive Power on the Front Lines
 
Social media mining hicss 46 part 1
Social media mining   hicss 46 part 1Social media mining   hicss 46 part 1
Social media mining hicss 46 part 1
 
Evoke final 2013 berkeley
Evoke final 2013 berkeleyEvoke final 2013 berkeley
Evoke final 2013 berkeley
 
Basic web analytics for news organizations
Basic web analytics for news organizationsBasic web analytics for news organizations
Basic web analytics for news organizations
 
Webinar Audience Insight in the Real-time Era
Webinar Audience Insight in the Real-time EraWebinar Audience Insight in the Real-time Era
Webinar Audience Insight in the Real-time Era
 
Search2012 ibm vf
Search2012 ibm vfSearch2012 ibm vf
Search2012 ibm vf
 
Innovate Analytics with Oracle Data Mining & Oracle R
Innovate Analytics with Oracle Data Mining & Oracle RInnovate Analytics with Oracle Data Mining & Oracle R
Innovate Analytics with Oracle Data Mining & Oracle R
 
When SharePoint Isn't Enough - Adding Enterprise Class Search for Better Coll...
When SharePoint Isn't Enough - Adding Enterprise Class Search for Better Coll...When SharePoint Isn't Enough - Adding Enterprise Class Search for Better Coll...
When SharePoint Isn't Enough - Adding Enterprise Class Search for Better Coll...
 
DigitalMR social media research sept 2011
DigitalMR social media research sept 2011DigitalMR social media research sept 2011
DigitalMR social media research sept 2011
 
Customer Insights Summit Toronto 2012
Customer Insights Summit Toronto 2012Customer Insights Summit Toronto 2012
Customer Insights Summit Toronto 2012
 
Laurie Dillon-Schalk - Developing a Digital Strategy & Roadmap
Laurie Dillon-Schalk - Developing a Digital Strategy & RoadmapLaurie Dillon-Schalk - Developing a Digital Strategy & Roadmap
Laurie Dillon-Schalk - Developing a Digital Strategy & Roadmap
 

Más de Dave King

Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Mining and analyzing social media   part 2 - hicss47 tutorial - dave kingMining and analyzing social media   part 2 - hicss47 tutorial - dave king
Mining and analyzing social media part 2 - hicss47 tutorial - dave kingDave King
 
Mining and analyzing social media part 1 - hicss47 tutorial - dave king
Mining and analyzing social media   part 1 - hicss47 tutorial - dave kingMining and analyzing social media   part 1 - hicss47 tutorial - dave king
Mining and analyzing social media part 1 - hicss47 tutorial - dave kingDave King
 
Mining and analyzing social media facebook w gephi - hicss47 tutorial - dav...
Mining and analyzing social media   facebook w gephi - hicss47 tutorial - dav...Mining and analyzing social media   facebook w gephi - hicss47 tutorial - dav...
Mining and analyzing social media facebook w gephi - hicss47 tutorial - dav...Dave King
 
Mining and analyzing social media bollywood w pajek - hicss47 tutorial - da...
Mining and analyzing social media   bollywood w pajek - hicss47 tutorial - da...Mining and analyzing social media   bollywood w pajek - hicss47 tutorial - da...
Mining and analyzing social media bollywood w pajek - hicss47 tutorial - da...Dave King
 
Mining and analyzing social media sample network w ora - hicss47 tutorial -...
Mining and analyzing social media   sample network w ora - hicss47 tutorial -...Mining and analyzing social media   sample network w ora - hicss47 tutorial -...
Mining and analyzing social media sample network w ora - hicss47 tutorial -...Dave King
 
Mining and analyzing social media hicss 45 tutorial – part 1
Mining and analyzing social media hicss 45 tutorial – part 1Mining and analyzing social media hicss 45 tutorial – part 1
Mining and analyzing social media hicss 45 tutorial – part 1Dave King
 
Text mining and analytics v6 - p1
Text mining and analytics   v6 - p1Text mining and analytics   v6 - p1
Text mining and analytics v6 - p1Dave King
 
Text mining and analytics v6 - p2
Text mining and analytics   v6 - p2Text mining and analytics   v6 - p2
Text mining and analytics v6 - p2Dave King
 
Digital Trails Dave King 1 5 10 Part 2 D3
Digital Trails   Dave King   1 5 10   Part 2   D3Digital Trails   Dave King   1 5 10   Part 2   D3
Digital Trails Dave King 1 5 10 Part 2 D3Dave King
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3Dave King
 

Más de Dave King (10)

Mining and analyzing social media part 2 - hicss47 tutorial - dave king
Mining and analyzing social media   part 2 - hicss47 tutorial - dave kingMining and analyzing social media   part 2 - hicss47 tutorial - dave king
Mining and analyzing social media part 2 - hicss47 tutorial - dave king
 
Mining and analyzing social media part 1 - hicss47 tutorial - dave king
Mining and analyzing social media   part 1 - hicss47 tutorial - dave kingMining and analyzing social media   part 1 - hicss47 tutorial - dave king
Mining and analyzing social media part 1 - hicss47 tutorial - dave king
 
Mining and analyzing social media facebook w gephi - hicss47 tutorial - dav...
Mining and analyzing social media   facebook w gephi - hicss47 tutorial - dav...Mining and analyzing social media   facebook w gephi - hicss47 tutorial - dav...
Mining and analyzing social media facebook w gephi - hicss47 tutorial - dav...
 
Mining and analyzing social media bollywood w pajek - hicss47 tutorial - da...
Mining and analyzing social media   bollywood w pajek - hicss47 tutorial - da...Mining and analyzing social media   bollywood w pajek - hicss47 tutorial - da...
Mining and analyzing social media bollywood w pajek - hicss47 tutorial - da...
 
Mining and analyzing social media sample network w ora - hicss47 tutorial -...
Mining and analyzing social media   sample network w ora - hicss47 tutorial -...Mining and analyzing social media   sample network w ora - hicss47 tutorial -...
Mining and analyzing social media sample network w ora - hicss47 tutorial -...
 
Mining and analyzing social media hicss 45 tutorial – part 1
Mining and analyzing social media hicss 45 tutorial – part 1Mining and analyzing social media hicss 45 tutorial – part 1
Mining and analyzing social media hicss 45 tutorial – part 1
 
Text mining and analytics v6 - p1
Text mining and analytics   v6 - p1Text mining and analytics   v6 - p1
Text mining and analytics v6 - p1
 
Text mining and analytics v6 - p2
Text mining and analytics   v6 - p2Text mining and analytics   v6 - p2
Text mining and analytics v6 - p2
 
Digital Trails Dave King 1 5 10 Part 2 D3
Digital Trails   Dave King   1 5 10   Part 2   D3Digital Trails   Dave King   1 5 10   Part 2   D3
Digital Trails Dave King 1 5 10 Part 2 D3
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 

Último

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Último (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Social media mining hicss 46 part 2

  • 1. Mining and Analyzing Social Media: Part 2 Dave King January 7, 2013
  • 2. Agenda: Part 2 • Sentiment Analysis & Opinion Mining • Defined • Business Interest & Software Packages • Levels of Analysis • Automated Classification • Social Network Analysis • Defined • History • Basic techniques and measures • Ego and Social-Centric Analysis 2 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 3. Sentiment Analysis and Opinion Mining: Interchangeable Terms Computational study of opinions, sentiments, subjectivity, evaluations, attitudes, appraisals, affects, views, emotions, etc., expressed in text. (Lui, 2012) 3 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 4. Sentiment Analysis and Opinion Mining: Business Interests Service Products Marketing Response Issues and Focus Message Company 4 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 5. Opinion Mining and Sentiment Analysis: Some Sample Questions of Interest • Is the sentiment towards my X primarily positive, neutral, or negative? How does it compare to my key competitors? Has it changed overtime? • What factors are positively and negatively influencing my X’s image? • Are there opportunities and needs my customers are identifying for me through their conversations? 5 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 6. Opinion Mining and Sentiment Analysis: An Offshoot of Social CRM Social CRM • Social Media services, techniques and technology for engaging customers • Sometimes synonymous with Social Media Monitoring • Gartner’s Magic Quadrant has a min of $10M in rev. 6 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 7. Opinion Mining and Sentiment Analysis: An Offshoot of Social CRM 7 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 8. Opinion Mining and Sentiment Analysis: An Offshoot of Social CRM 8 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 9. Sentiment Analysis and Opinion Mining: Commercial Products – General Operation 9 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 10. Sentiment Analysis and Opinion Mining: Some Examples – What do you see? 10 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 11. Sentiment Analysis and Opinion Mining: What do you see? • Opinion holders: persons who hold the opinions • Opinion targets: entities and their features/aspects • Sentiments: positive and negative • Time: when opinions are expressed 11 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 12. Sentiment Analysis and Opinion Mining: Opinion Defined Simply a positive or negative sentiment, view, attitude, emotion, or appraisal about an entity or an aspect of the entity from an opinion holder at a particular point in time. • Opinion is a quintuple (ej, ajk, soijkl, hi, tl) • Sentiment orientation (“so”): +, -, or possibly neutral 12 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 13. Sentiment Analysis and Opinion Mining: Level of Analysis • Document Level: +, -, or 0* • Sentence Level: +, -, or 0* • Entity and Feature/Aspect Level: +, -, or 0* 0* ~ possibly neutral 13 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 14. Sentiment Analysis and Opinion Mining: Example – Document Sentiment Classification • Basically a Text Classification Problem • Assumptions – Each document written by single person – About single entity – Goal: discover (_,_,so,_,_) 14 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 15. Sentiment Analysis and Opinion Mining: Example – Document Sentiment Classification Collection Doc-Term Automated of Text Docs Matrix* Classification ??? + Small Set of Predetermined Sentiment Unsupervised - Categories Supervised 15 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 16. Sentiment Analysis and Opinion Mining: Example – Document Sentiment Classification Real-World Reviews with known sentiment Training Process Reviews with known Classification Document Consolidation Train Test Validate Establish the Corpus Classification Corpus Refinement Algorithm?? (Token, Stem, Stop…) Feature Selection & Weighting - + Doc-Term Matrix 16 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 17. Sentiment Analysis and Opinion Mining: Example – Document Sentiment Classification Supervised Classification Algorithms • Naïve Bayes • Support Vector Machine • Decision Trees • Nearest Neighbor (k-NN) • Neural Nets (e.g. SOM) • … 17 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 18. Sentiment Analysis: Doing Simple Sentiment Analysis P(H/D) = P(D/H) * P(H)/P(D) H is the hypothesis and D is the data P(H) is the prior probability of H: the probability that H is correct before the data D are seen P(D/H) is the conditional probability of seeing the data D given that the hypothesis H is true. This conditional probability is called the likelihood. Thomas Bayes P(D) is the marginal probability of D. P(H/D) is the posterior probability: the probability that the hypothesis is true, given the data and the previous state of belief about the hypothesis. Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 19. Sentiment Analysis: Doing Simple Sentiment Analysis Training Set P(Positive | Tweet) compared to P(Negative | Tweet) P(Pos | Word) = P(Pos) * P(W1/Pos) / P(M) P(Pos| fail) = P(Pos) * P(great/Pos) P(Pos | fail) = (2/5) * (1/2) = .2 P(Neg | Word) = P(N) * P(W1/N) / P(M) P(Neg | fail) = P(Neg) * P(great/Neg) P(Neg| fail) = (3/5)*(2/3) = .4 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 20. Sentiment Analysis: Doing Simple Sentiment Analysis Training Set P(Positive | Tweet) compared to P(Negative | Tweet) P(Pos | Words) = P(Pos) * P(W1/Pos) * P(W2/Pos) * ... P(Pos | poor & fail) = P(Pos) * P(poor/Pos) * P(fail/Pos) P(Pos | poor & fail) = .4 * 0 * .5 = 0 P(Neg | Words) = P(Neg) * P(W1/Neg) * P(W2/Neg) * ... P(Neg | poor & fail) = P(Neg) * P(poor/Neg) * P(fail/Neg) P(Neg | poor & fail) = .6 * .67 * .67 = .27 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 21. Sentiment Analysis: Doing Simple Sentiment Analysis Confusion Matrix How do you know if your model works? Accuracy = (TP + TN)/N Recall = TP / (TP + FN) Depends on Precision = TP / (TP + FP) your Goal? Error = (FP + FN)/N F1 = 2*Recall*Precision/(Recall + Precision) Where N = TP+FP+FN+TN Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 22. Sentiment Analysis: Summary • From one type to the next (classification, features, comparisons), it becomes more complex to extract the information. • Once extracted, standard text mining techniques can be used to classify and compare the opinions • Simple techniques (like naïve Bayesian) often produce strong results (e.g. 80+% accuracy) 22 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 23. Sentiment Analysis: Comparing Techniques Baselines and Bigrams: Simple, Good Sentiment and Topic Classification Wang and Manning 23 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 24. What do they have in common? 24 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 25. Here’s a hint 25 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 26. …and the answer is their Erdos-Bacon Number equals 3+3 4.65 5+1 = + 4+2 2.957 26 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 27. Suppose I started with this. What would you have guessed? 27 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 28. Six Degrees of Separation Frigyes Karinthy Stanley Milgram 1929 1967 6 1990 1998 John Guare Duncan Watts 28 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 29. Six Degrees of Separation A fascinating game grew out of this discussion. One of us suggested performing the following experiment to prove that the population of the Earth is closer together now than they have ever been before. We should select any person from the 1.5 billion inhabitants of the Earth—anyone, anywhere at all. He bet us that, using no more than five individuals, one of whom is a personal acquaintance, he could contact the selected individual using nothing except the network of personal acquaintances. Frigyes Karninthy , Chains, 1929 A 1 2 3 4 5 Degrees of separation ~ average path length ~ distance 29 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 30. Social Network Analysis Definitions Network – Collection of things and their relationships to one another. Social Network – Collection of humans, roles, groups, and/or institutions and their relationships with one another. Social Network Analysis (SNA) – Application of Graph Theory or Network Science to the study of social relationships and connections. 30 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 31. Social Network Analysis Main Purpose Detecting and interpreting patterns of social ties among actors. A pattern is meaningful if it expresses: • Choices by social actors • Impact of the social system on actors’ behaviors and attitudes 31 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 32. Social Network Analysis: Brief Highlights 32 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 33. Social Network Analysis: Early Efforts 33 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 34. Social Network Analysis: Visualization/Analysis Libraries © 1973 34 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 35. Social Network Analysis: Growing Interest ―Ten years ago, the field of Social Network Analysis was a scientific backwater. We were the misfits, rejected from both mainstream sociology and mainstream computer science… The advent of the Social Internet changed everything.‖ 35 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 36. Social Network Analysis: Growing Interest 36 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 37. Social Network Analysis: Growing Interest … the availability of massive amounts of data in an online setting has given a new impetus towards a scientifically and statistically robust study of the field of social networks 37 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 38. Social Network Analysis: Growing Interest Dining Table Partners World Trade US Political Blogs N=26 N=80 N~1400 Russian LiveJournal Egyptian Revolution Mobile Phones N~3.5K N~90K N=20M Facebook Friends N = 721M Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL 38
  • 39. Social Network Analysis: Types of Structural Analysis • Social Influence Analysis • Expert Discovery • Node Classification • Link Prediction • Community, Subgroup & Clique Detection in Social Networks • Evolution in dynamic Social Networks • Statistical Analysis and Comparison – Small Worlds, Weak Ties, and Random Models • Visualization 39 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 40. Social Network Analysis: Introduction 40 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 41. Social Network Analysis: Key Elements Graph or Network Graph The set of [ V,E, f ] vertices/nodes, A edges/links and the relationship/function connecting them. B Vertices or Nodes Edge C (Link) The “things” D Vertex Edges or Links (Node) The “relationships” 41 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 42. Social Network Analysis: Alternative Representations Graph Edge Adjacency List Matrix 42 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 43. Social Network Analysis: Types of Edges or Links Undirected, Directed, Unweighted Unweighted A B A Twitter B Facebook Friends Followers C C Undirected, Directed, Weighted Weighted 100 A Facebook B A 60 B 5 Email 70 Friends Network 20 10 C C 43 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 44. Social Network Analysis: Alternative Representations Graph Edge Adjacency List Matrix 44 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 45. Social Network Analysis: Types of Networks & Approaches Ego-Centered Approach Socio-centered Approach ―Ego-Network‖ ―Whole‖ Network P4 P5 P6 Ego P1 Alters P4 P5 P2 P3 P1 Vertex (Ego), Neighbors (Alters) & all lines among the Neighbors P2 P3 45 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 46. Social Network Analysis: Centrality – Who is key? Measure Definition Interpretation Reasoning Degree Number of edges or links. In How connected is a node? How Higher probability of receiving and transmitting degree- links in, Out-degree - links many people can this person reach information flows in the network. Nodes considered to out directly? have influence over larger number of nodes and or are capable of communicating quickly with the nodes in their neighborhood. Betweenness Number of times node or vertex How important is a node in terms Degree to which node controls flow of information in lies on shortest path between 2 of connecting other nodes? How the network. Those with high betweenness function as nodes divided by number of all the likely is this person to be the most brokers. Useful where a network is vulnerable. shortest paths direct route between two people in the network? Closeness 1 over the average distance How easily can a node reach other Measure of reach. Importance based on how close a between a node and every other nodes? How fast can this person node is located with respect to every other node in the node in the network reach everyone in the network? network. Nodes able to reach most or be reached by most all other nodes in the network through geodesic paths. Eigenvector Proporational to the sum of the How important, central, or Evaluates a player's popularity. Identifies centers of eigenvector centralities of all the influential are a node’s neighbors? large cliques. Node with more connections to higher nodes directly connected to it. How well is this person connected scoring nodes is more important. to other well-connected people? 46 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 47. Social Network Analysis: Centrality – Who is most important? B E Eigen D A G F C Betw H Close R I N P Deg J O K M L Q S 47 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 48. Social Network Analysis: Cohesion – Overall structure 48 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 49. Social Network Analysis: Cohesion – How well connected? B E D A G F C H R I N P J O K M L Q S 49 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 50. Social Network Analysis: Ego Centered – Simple Example http://apps.facebook.com/touchgraph/ 50 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 51. Social Network Analysis: Ego Centered – Another Example 51 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 52. Social Network Analysis: Ego-Centered – Simple Example 52 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 53. Social Network Analysis: Ego Analysis – Simple Example Netvizz7.0 .gdf (GUESS) file format 53 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 54. Social Network Analysis: Some Analytical Alternatives GUESS Gephi NodeXL NetViz Pajek SocVNet UCINet/NetDraw Visone Visual/Analytical Packages 54 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 55. Social Network Analysis: Some Analytical Alternatives • igraph (R, Python, C): Creating and manipulating graphs • libSNA (Python): Open-source library for social network analysis (2008 last update) • NetworkX (Python): Package for complex networks • SNA (R): Social Network Analysis tools Visual/Analytical Libraries/Modules 55 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 56. Social Network Analysis: Some Analytical Alternatives 56 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 57. Social Network Analysis: Ego Analysis – Simple Example 57 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 58. Social Network Analysis: Ego Analysis – Simple Example 58 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 59. Social Network Analysis: Ego Analysis – Simple Example N = 67 L = 235 59 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 60. Social Network Analysis: Ego Analysis – Simple Example Skewed Furthest Distance Power Law? Males=76% Strong Weak Within .11 Clusters Overall PL = N(N-1)/2 = 2211 Ego Density = L/PL = 235/2211 =.11 60 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 61. Social Network Analysis: Large Scale Networks The emergence of online social networking services over the past decade has revolutionized how social scientists study the structure of human … previously invisible social structures are being captured at tremendous scale and with unprecedented detail. Accessed within 28 days of May ’11 At least one friend Over 13 years of age 61 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 62. Social Network Analysis: Large Scale Networks 14% for 100 Assortativity P(F|F) = .52 P(F|M) = .51 62 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 63. Social Network Analysis: Is it a Small World after all? Average Average 4.7 4.3 World 92% 99.6% US 96% 99.7% 63 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 64. Social Network Analysis: Second Example • Single day snapshot of a Snowball Sample of Political Blogs (N=1490) • Manually assigned as Liberal or Conservative • Focus on Blogrolls and front page citations • Primary question: Cyber- balkanization? 64 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 65. Social Network Analysis: Balkanization (regular kind) Process of fragmentation or division of a region or state into smaller regions or states that are often hostile or non-cooperative with each other. 65 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 66. Social Network Analysis: Cyber-balkanization? Proliferation of specialized online news sources allows people with different political leanings to be exposed only to information in agreement with their previously held views. 66 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 67. Social Network Analysis: Cyber-balkanization? N=1490 Edges = 16715 N=758 N=732 Edges = 7301 Edges = 7839 Liberals Conservatives 67 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 68. Social Network Analysis: Political Blogs – Cyberbalkanization? 68 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 69. Social Networks: Political Blogs - Metrics 69 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 70. Social Network Analysis: Statistical Network Models A Statistical Network Model - Assumes that part of the structure of an observed network is random - Mathematical description of a collection of possible networks and a probability distribution on this set - Informs us about which network characteristics to expect if lines assigned to pairs of vertices at random 70 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 71. Social Network Analysis: Statistical Network Models - Classic Bernouilli - Conditional Uniform - Small-World - Preferential Attachment 71 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL
  • 72. Social Network Analysis: Political Blogs - Comparisons 72 Copyright 2011 JDA Software Group, Inc. - CONFIDENTIAL