Abstract
There has been much effort on studying how social media sites, such as Twitter, help propagate information in different situations, including spreading alerts and SOS messages in an emergency. However, existing work has not addressed how to actively identify and engage the right strangers at the right time on social media to help effectively propagate intended information within a desired time frame. To address this problem, we have developed three models: (1) a feature-based model that leverages people's exhibited social behavior, including the content of their tweets and social interactions, to characterize their willingness and readiness to propagate information on Twitter via the act of retweeting; (2) a wait-time model based on a user's previous retweeting wait times to predict his or her next retweeting time when asked; and (3) a subset selection model that automatically selects a subset of people from a set of available people using probabilities predicted by the feature-based model and maximizes retweeting rate. Based on these three models, we build a recommender system that predicts the likelihood of a stranger to retweet information when asked, within a specific time window, and recommends the top-N qualified strangers to engage with. Our experiments, including live studies in the real world, demonstrate the effectiveness of our work.
- Nitin Agarwal, Huan Liu, Lei Tang, and Philip S. Yu. 2008. Identifying the influential bloggers in a community. In WSDM. Google ScholarDigital Library
- Eytan Bakshy, Jake M. Hofman, Winter A. Mason, and Duncan J. Watts. 2011. Everyone's an influencer: Quantifying influence on Twitter. In WSDM. Google ScholarDigital Library
- Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. 2012. The role of social networks in information diffusion. In WWW. Google ScholarDigital Library
- Danah Boyd, Scott Golder, and Gilad Lotan. 2010. Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. In HICSS. Google ScholarDigital Library
- Ceren Budak, Divyakant Agrawal, and Amr El Abbadi. 2011. Limiting the spread of misinformation in social networks. In WWW. Google ScholarDigital Library
- Meeyoung Cha, Hamed Haddadi, Fabricio Benevenuto, and Krishna P. Gummadi. 2010. Measuring user influence in twitter: The million follower fallacy. In ICWSM.Google Scholar
- Vineet Chaoji, Sayan Ranu, Rajeev Rastogi, and Rushi Bhatt. 2012. Recommendations to boost content spread in social networks. In WWW. Google ScholarDigital Library
- Nitesh V. Chawla, Kevin W. Bowyer, Lawrence O. Hall, and W. Philip Kegelmeyer. 2002. SMOTE: Synthetic minority over-sampling technique. J. Artif. Int. Res. 16, 1 (June 2002), 321--357. Google ScholarDigital Library
- Jilin Chen, Allen Cypher, Clemens Drews, and Jeffrey Nichols. 2013. CrowdE: Filtering tweets for direct customer engagements. In ICWSM.Google Scholar
- Kailong Chen, Tianqi Chen, Guoqing Zheng, Ou Jin, Enpeng Yao, and Yong Yu. 2012. Collaborative personalized tweet recommendation. In SIGIR. Google ScholarDigital Library
- Paul T. Costa and Robert R. McCrae. 1992. Revised NEO Personality Inventory (NEO PI-R) and NEP Five-factor Inventory (NEO-FFI): Professional Manual. Psychological Assessment Resources.Google Scholar
- Lisa A. Fast and David C. Funder. 2008. Personality as manifest in word use: Correlations with self-report, acquaintance report, and behavior. J. Personality Social Psychol. 94, 2 (2008), 334.Google ScholarCross Ref
- Tom Fawcett. 2006. An introduction to ROC analysis. Pattern Recogn. Lett. 27, 8 (June 2006), 861--874. Google ScholarDigital Library
- Wei Feng and Jianyong Wang. 2013. Retweet or not? Personalized tweet re-ranking. In WSDM. Google ScholarDigital Library
- Alastair J. Gill, Scott Nowson, and Jon Oberlander. 2009. What are they blogging about? Personality, topic and motivation in blogs. In ICWSM.Google Scholar
- Amit Goyal, Francesco Bonchi, and Laks V. S. Lakshmanan. 2010. Learning influence probabilities in social networks. In WSDM. Google ScholarDigital Library
- Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H. Witten. 2009. The WEKA data mining software: An update. SIGKDD Explor. Newsl. 11, 1 (Nov. 2009), 10--18. Google ScholarDigital Library
- Tuan-Anh Hoang and Ee-Peng Lim. 2012. Virality and susceptibility in information diffusions. In ICWSM.Google Scholar
- Nathan O. Hodas and Kristina Lerman. 2014. The simple rules of social contagion. Sci. Rep. 4 (2014). http://www.nature.com/srep/2014/140311/srep04343/full/srep04343.html.Google Scholar
- Junming Huang, Xue-Qi Cheng, Hua-Wei Shen, Tao Zhou, and Xiaolong Jin. 2012. Exploring social influence via posterior effect of word-of-mouth recommendations. In WSDM. Google ScholarDigital Library
- Kyumin Lee, James Caverlee, and Steve Webb. 2010. Uncovering social spammers: Social honeypots + machine learning. In SIGIR. Google ScholarDigital Library
- Kyumin Lee, Brian David Eoff, and James Caverlee. 2011. Seven months with the devils: A long-term study of content polluters on Twitter. In ICWSM.Google Scholar
- Kyumin Lee, Jalal Mahmud, Jilin Chen, Michelle Zhou, and Jeffrey Nichols. 2014. Who will retweet this? Automatically identifying and engaging strangers on twitter to spread information. In IUI. Google ScholarDigital Library
- Xu-Ying Liu and Zhi-Hua Zhou. 2006. The influence of class imbalance on cost-sensitive learning: An empirical study. In ICDM. Google ScholarDigital Library
- Sofus A. Macskassy and Matthew Michelson. 2011. Why do people retweet? Anti-homophily wins the day! In ICWSM.Google Scholar
- Jalal Mahmud, Michelle X. Zhou, Nimrod Megiddo, Jeffrey Nichols, and Clemens Drews. 2013. Recommending targeted strangers from whom to solicit information on social media. In IUI. Google ScholarDigital Library
- Jeffrey Nichols and Jeon-Hyung Kang. 2012. Asking questions of targeted strangers on social networks. In CSCW. Google ScholarDigital Library
- James W. Pennebaker, Martha E. Francis, and Roger J. Booth. 2001. Linguistic Inquiry and Word Count. Lawrence Erlbaum Associates.Google Scholar
- Daniel M. Romero, Wojciech Galuba, Sitaram Asur, and Bernardo A. Huberman. 2011. Influence and passivity in social media. In ECML/PKDD. Google ScholarDigital Library
- Claude Shannon. 1948. A mathematical theory of communication. Bell Syst. Tech. J. 27 (July, October 1948), 379--423, 623--656.Google ScholarCross Ref
- Yaron Singer. 2012. How to win friends and influence people, truthfully: Influence maximization mechanisms for social networks. In WSDM. Google ScholarDigital Library
- Kate Starbird and Leysia Palen. 2010. Pass It On? Retweeting in Mass Emergency. International Community on Information Systems for Crisis Response and Management.Google Scholar
- Greg Ver Steeg and Aram Galstyan. 2012. Information transfer in social media. In WWW. Google ScholarDigital Library
- Jianshu Weng, Ee-Peng Lim, Jing Jiang, and Qi He. 2010. TwitterRank: Finding topic-sensitive influential twitterers. In WSDM. Google ScholarDigital Library
- Yiming Yang and Jan O. Pedersen. 1997. A comparative study on feature selection in text categorization. In ICML. Google ScholarDigital Library
- Tal Yarkoni. 2010. Personality in 100,000 words: A large-scale analysis of personality and word use among bloggers. J. Res. Personality 44, 3 (2010), 363--373.Google ScholarCross Ref
Index Terms
- Who Will Retweet This? Detecting Strangers from Twitter to Retweet Information
Recommendations
Who will retweet me?: finding retweeters in twitter
SIGIR '13: Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrievalAn important aspect of communication in Twitter (and other Social Network is message propagation -- people creating posts for others to share. Although there has been work on modelling how tweets in Twitter are propagated (retweeted), an untackled ...
Who will retweet this?: Automatically Identifying and Engaging Strangers on Twitter to Spread Information
IUI '14: Proceedings of the 19th international conference on Intelligent User InterfacesThere has been much effort on studying how social media sites, such as Twitter, help propagate information in different situations, including spreading alerts and SOS messages in an emergency. However, existing work has not addressed how to actively ...
Retweet Behavior Prediction in Twitter
ISCID '14: Proceedings of the 2014 Seventh International Symposium on Computational Intelligence and Design - Volume 02Retweet, as a main way to spread information in twitter, has been researched in a number of works. Recently research focuses on analyzing the factors of retweet behavior. However, the prediction on retweet behavior is a new challenge which is not well ...
Comments