skip to main content
10.1145/2557500.2557502acmconferencesArticle/Chapter ViewAbstractPublication PagesiuiConference Proceedingsconference-collections
research-article

Who will retweet this?: Automatically Identifying and Engaging Strangers on Twitter to Spread Information

Published:24 February 2014Publication History

ABSTRACT

There has been much effort on studying how social media sites, such as Twitter, help propagate information in different situations, including spreading alerts and SOS messages in an emergency. However, existing work has not addressed how to actively identify and engage the right strangers at the right time on social media to help effectively propagate intended information within a desired time frame. To ad-dress this problem, we have developed two models: (i) a feature-based model that leverages peoplesfi exhibited social behavior, including the content of their tweets and social interactions, to characterize their willingness and readiness to propagate information on Twitter via the act of retweeting; and (ii) a wait-time model based on a user's previous retweeting wait times to predict her next retweeting time when asked. Based on these two models, we build a recommender system that predicts the likelihood of a stranger to retweet information when asked, within a specific time window, and recommends the top-N qualified strangers to engage with. Our experiments, including live studies in the real world, demonstrate the effectiveness of our work.

References

  1. Agarwal, N., Liu, H., Tang, L., and Yu, P. S. Identifying the influential bloggers in a community. In.WSDM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bakshy, E., Hofman, J. M., Mason, W. A., and Watts, D. J. Everyone's an influencer: quantifying influence on twitter, In WSDM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bakshy, E., Rosenn, I., Marlow, C., and Adamic, L. The role of social network in information diffusion. In WWW, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Boyd, D., Golder, S., and Lotan, G. Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter. In HICSS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Budak, C., Agrawal, D., and El Abbadi, A. Limiting the spread of misinformation in social networks. In WWW, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Cha, M., Haddadi, H., Benevenuto, F., and Gummadi, K.P. Measuring user influence in twitter: The million follower fallacy. In ICWSM, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  7. Chaoji, V., Ranu, S., Rastogi, R., and Bhatt, R. Recommendations to boost content spread in social networks., In WWW, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chawla, N. V., Bowyer, K. W., Hall, L. O., and Kegelmeyer, W. P. SMOTE: Synthetic Minority Over-sampling Technique. Journal of Artificial Intelligence Research, 16: 321--357, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Chen, J. Cypher, A., Drews, C. and Nichols, J. CrowdE: Filtering Tweets for Direct Customer Engagements. In ICWSM 2013.Google ScholarGoogle Scholar
  10. Costa, P.T., and McCrae, R.R. Revised NEO Personality Inventory (NEO-PI-R) and NEO Five-Factor Inventory (NEOFFI) manual. Psychological Assessment Resources, 1992.Google ScholarGoogle Scholar
  11. Fast, L. A., and Funder, D. C. Personality as manifest in word use: Correlations with self-report, acquaintance report, and behavior. Journal of Personality and Social Psychology, Vol 94(2), 2008.Google ScholarGoogle ScholarCross RefCross Ref
  12. Fawcett, T. An introduction to ROC analysis. Pattern Recogn. Lett., Vol 27( 8), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Gill, A. J., Nowson, S., and Oberlander, J. What Are They Blogging Aboutfi Personality, Topic and Motivation in Blogs, In ICWSM, 2009.Google ScholarGoogle Scholar
  14. Goyal, A., Bonchi, F., and Lakshmanan, L. V.S. Learning influence probabilities in social networks. In WSDM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., and Witten, I. The WEKA data mining software: an update. SIGKDD Explorations Newsletter, 11(1): 10--18, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Hoang, T.-A., and Lim, E.-P. Virality and Susceptibility in Information Diffiusions, In ICWSM 2012.Google ScholarGoogle Scholar
  17. Huang, J., Cheng, X.-Q., Shen, H.-W, Zhou, T., and Jin, X. Exploring social influence via posterior effect of word-ofmouth recommendations. In WSDM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Lee, K., Caverlee, J., and Webb, S. Uncovering social spammers: social honeypots + machine learning. In SIGIR 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Lee, K., Eoff, B. D., and Caverlee, J. Seven Months with the Devils: A Long-Term Study of Content Polluters on Twitter. In ICWSM, 2011.Google ScholarGoogle Scholar
  20. Liu, X.Y., and Zhou, Z.H. The influence of class imbalance on cost-sensitive learning: an empirical study. In ICDM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Macskassy, S. A., and Michelson, M. Why Do People Retweetfi Anti-Homophily Wins the Day!. In ICWSM, 2011Google ScholarGoogle Scholar
  22. Mahmud, J., Zhou, M., Megiddo, N., Nichols, J., and Drews, C. Recommending Targeted Strangers from Whom to Solicit Information in Twitter. In IUI, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Nichols, J., and Kang, J-H. Asking Questions of Targeted Strangers on Social Networks. In CSCW, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Pennebaker, J.W., Francis, M.E., and Booth, R.J. Linguistic Inquiry and Word Count. Erlbaum Publishers, 2001.Google ScholarGoogle Scholar
  25. Romero. D. M., Galuba. W., Asur. S, and Huberman, B. A. Influence and passivity in social media. In ECML/PKDD, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Shannon, C. E., A mathematical theory of communication. Bell system technical journal, Vol 27, 1948.Google ScholarGoogle Scholar
  27. Singer, Y. How to win friends and influence people, truthfully: influence maximization mechanisms for social networks, In WSDM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Starbird, K. and Palen, L. Pass It Onfi: Retweeting in Mass Emergency, In ISCRAM, 2010.Google ScholarGoogle Scholar
  29. Ver Steeg, G. and Galstyan, A. Information transfer in social media. In WWW, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Weng, J. Lim. E.-P., Jiang. J, and He. Q. Twitterrank: Finding topic-sensitive influential twitterers. In WSDM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Yang, Y., and Pedersen, O.J. A Comparative Study on Feature Selection in Text Categorization. In ICML, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Yarkoni, Tal. Personality in 100,000 words: A large-scale analysis of personality and word usage among bloggers. Journal of Research in Personality, 2010.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Who will retweet this?: Automatically Identifying and Engaging Strangers on Twitter to Spread Information

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IUI '14: Proceedings of the 19th international conference on Intelligent User Interfaces
      February 2014
      386 pages
      ISBN:9781450321846
      DOI:10.1145/2557500

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 February 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      IUI '14 Paper Acceptance Rate46of191submissions,24%Overall Acceptance Rate746of2,811submissions,27%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader