Access the full text.
Sign up today, get DeepDyve free for 14 days.
Claudia Peersman, Walter Daelemans, L. Vaerenbergh (2011)
Predicting age and gender in online social networks
A. Lotka
The frequency distribution of scientific productivityJournal of Architectural and Planning Research, 15
Claudia Wagner, S. Asur, J. Hailpern (2013)
Religious Politicians and Creative Photographers: Automatic User Categorization in Twitter2013 International Conference on Social Computing
Rong-En Fan, Kai-Wei Chang, Cho-Jui Hsieh, Xiang-Rui Wang, Chih-Jen Lin (2008)
LIBLINEAR: A Library for Large Linear ClassificationJ. Mach. Learn. Res., 9
M. Maia, J. Almeida, V. Almeida (2008)
Identifying user behavior in online social networks
Rob Thomson, T. Murachver (2001)
Predicting gender from electronic discourse.The British journal of social psychology, 40 Pt 2
J. Golbeck, Derek Hansen (2014)
A method for computing political preference among Twitter followersSoc. Networks, 36
Na Cheng, R. Chandramouli, K.P. Subbalakshmi (2011)
Author gender identification from textDigit. Investig., 8
Cynthia Murphy (2011)
The Role of Perception in Age Estimation
Morgane Ciot, Morgan Sonderegger, D. Ruths (2013)
Gender Inference of Twitter Users in Non-English Contexts
Yair Amichai-Hamburger, Gideon Vinitzky (2010)
Social network use and personalityComput. Hum. Behav., 26
L. Gyarmati, T. Trinh (2010)
Measuring user behavior in online social networksIEEE Network, 24
L Jin, Y Chen, T Wang, P Hui, AV Vasilakos (2013)
Understanding user behavior in online social networks: a surveyCommun Mag, 51
Kung-Keat Teoh, Tahereh Pourshafie, V. Balakrishnan (2014)
A gender lens perspective of the use of social network in higher education in Malaysia and Australia
AJ Lotka (1926)
The frequency distribution of scientific productivityJ Wash Acad Sci, 16
Sibel Adali, J. Golbeck (2012)
Predicting Personality with Social Behavior2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
(2018)
The Scientific and Technological Research Council of TurkeyThe Grants Register 2019
Zhiyuan Cheng, James Caverlee, Kyumin Lee (2010)
You are where you tweet: a content-based approach to geo-locating twitter usersProceedings of the 19th ACM international conference on Information and knowledge management
Terrorist' troll pretended to be isis, white supremacist, and jewish lawyer (2015). URL www.thedailybeast.com/articles/2015/09/11/ terrorist-troll-pretended-to-be-isis-white-supremacist-and-jew html
L. Grimaudo, H. Song, M. Baldi, M. Mellia, M. Munafò (2013)
TUCAN: Twitter User Centric ANalyzer2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)
Eva Zangerle, Günther Specht (2014)
"Sorry, I was hacked": a classification of compromised twitter accountsProceedings of the 29th Annual ACM Symposium on Applied Computing
池田 和史, 服部 元, 松本 一則, 小野 智弘, 東野 輝夫 (2012)
Demographic Estimation of Twitter Users for Marketing Analysis, 2
W. Winkler (1990)
String Comparator Metrics and Enhanced Decision Rules in the Fellegi-Sunter Model of Record Linkage.
Shruti Kohli, Ankit Gupta (2014)
Modeling anonymous human behavior using social mediaThe 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014)
David Darmon, Jared Sylvester, M. Girvan, W. Rand (2013)
Predictability of User Behavior in Social Media: Bottom-Up v. Top-Down Modeling2013 International Conference on Social Computing
(2011)
Aygun with twitter
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, I. Witten (2009)
The WEKA data mining software: an updateSIGKDD Explor., 11
Andrea Tagarelli, R. Interdonato (2013)
“Who's out there?” Identifying and ranking lurkers in social networks2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)
A. Orebaugh, J. Allnutt (2009)
Classification of Instant Messaging Communications for Forensics Analysis
William Deitrick, Zachary Miller, Benjamin Valyou, Brian Dickinson, Timothy Munson, Wei-Gang Hu (2012)
Gender Identification on Twitter Using the Modified Balanced WinnowCommunications and Network, 4
D. Blei, A. Ng, Michael Jordan (2009)
Latent Dirichlet Allocation
Rick Wash, E. Rader (2011)
Influencing mental models of security: a research agenda
ES Lee (1966)
A theory of migrationDemography, 3
David Holmes, David Holmes (2002)
Improving precision and recall for Soundex retrievalProceedings. International Conference on Information Technology: Coding and Computing
Jim Blythe, L. Camp (2012)
Implementing Mental Models2012 IEEE Symposium on Security and Privacy Workshops
L. Breiman (2001)
Random ForestsMachine Learning, 45
O. Laere, S. Schockaert, B. Dhoedt (2011)
Finding locations of flickr resources using language models and similarity searchProceedings of the 1st ACM International Conference on Multimedia Retrieval
Emilio Ferrara, Onur Varol, Clayton Davis, F. Menczer, A. Flammini (2014)
The rise of social botsCommunications of the ACM, 59
Yong Wang, R. Nepali (2013)
Privacy Measurement for Social Network Actor Model2013 International Conference on Social Computing
Jan Vosecky, Dan Hong, V. Shen (2009)
User identification across multiple social networks2009 First International Conference on Networked Digital Technologies
James Coleman (1988)
Social Capital in the Creation of Human CapitalAmerican Journal of Sociology, 94
Niels Landwehr, M. Hall, E. Frank (2003)
Logistic Model TreesMachine Learning, 59
J. Friedman (2000)
Special Invited Paper-Additive logistic regression: A statistical view of boostingAnnals of Statistics, 28
(2007)
screw blackboard... do it on facebook!: an investigation of students educational use of facebook
Nadine Tamburrini, M. Cinnirella, Vincent Jansen, J. Bryden (2015)
Twitter users change word usage according to conversation-partner social identitySoc. Networks, 40
Class 3: Users stating that their account has been hacked and they immediately apologized for any un-solicited direct messages
Anisha Mazumder, Arun Das, Nyunsu Kim, Sedat Gokalp, Arunabha Sen, H. Davulcu (2013)
Spatio-temporal Signal Recovery from Political Tweets in Indonesia2013 International Conference on Social Computing
Jalal Alowibdi, U. Buy, Philip Yu, Leon Stenneth (2014)
Detecting deception in Online Social Networks2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)
Evelien Otte, R. Rousseau (2002)
Social network analysis: a powerful strategy, also for the information sciencesJournal of Information Science, 28
J Friedman, T Hastie, R Tibshirani (2000)
Additive logistic regression: a statistical view of boosting (with discussion and a rejoinder by the authors)Ann Stat, 28
Grant Stafford, L. Yu (2013)
An Evaluation of the Effect of Spam on Twitter Trending Topics2013 International Conference on Social Computing
D. Moskowitz, D. Zuroff, Moskowitz Or
Personality Processes and Individual Differences Flux, Pulse, and Spin: Dynamic Additions to the Personality Lexicon
Vaibhav Garg, Shirin Nilizadeh (2013)
Craigslist Scams and Community Composition: Investigating Online Fraud Victimization2013 IEEE Security and Privacy Workshops
D. Lewis, Yiming Yang, T. Rose, Fan Li (2004)
RCV1: A New Benchmark Collection for Text Categorization ResearchJ. Mach. Learn. Res., 5
Chao Yang, Jialong Zhang, G. Gu (2014)
A taste of tweets: reverse engineering Twitter spammersProceedings of the 30th Annual Computer Security Applications Conference
C. Friedman, R. Sideli (1992)
Tolerating spelling errors during patient validation.Computers and biomedical research, an international journal, 25 5
L. Backstrom, J. Kleinberg, Ravi Kumar, Jasmine Novak (2008)
Spatial variation in search engine queries
S. Raghavan (2013)
Digital forensic research: current state of the artCSI Transactions on ICT, 1
Y. Freund, R. Schapire (1996)
Experiments with a New Boosting Algorithm
Bulent Ozel (2012)
Link and Node Analysis of Gender Based Collaborations in Turkish Social Sciences
A. Squicciarini, C. Griffin (2014)
Why and how to deceive: game results with sociological evidenceSocial Network Analysis and Mining, 4
J. Golbeck, Cristina Robles, Karen Turner (2011)
Predicting personality with social mediaCHI '11 Extended Abstracts on Human Factors in Computing Systems
Class 5: Users who have been hacked and stated that they now changed their password
C. Griffin, A. Squicciarini (2012)
Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results2012 IEEE Symposium on Security and Privacy Workshops
Michael Fire, Dima Kagan, Aviad Elyashar, Y. Elovici (2013)
Friend or foe? Fake profile identification in online social networksSocial Network Analysis and Mining, 4
(2016)
A (2016) Does political elites represent their followers? Quantitative text analysis of Turkish tweets
Class 4: Users who stated that they were hacked and they moved to a new account
M. Fazeen, R. Dantu, P. Guturu (2011)
Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approachesSocial Network Analysis and Mining, 1
(2008)
The Journal of Machine Learning Research
Jun Ito, Takahide Hoshide, Hiroyuki Toda, Tadasu Uchiyama, Kyosuke Nishida (2013)
What is he/she like?: Estimating Twitter user attributes from contents and social neighbors2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)
D. Savage, Xiuzhen Zhang, Xinghuo Yu, P. Chou, Qingmai Wang (2014)
Anomaly detection in online social networksArXiv, abs/1608.00301
D. Moskowitz, D. Zuroff (2005)
Robust predictors of flux, pulse, and spinJournal of Research in Personality, 39
D. Quercia, Michal Kosinskihttps://www.semanticscholar.org/me/account, D. Stillwell, J. Crowcroft (2011)
Our Twitter Profiles, Our Selves: Predicting Personality with Twitter2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
Andrew Perrin (2015)
Social Media Usage: 2005-2015
Yuta Sakakura, T. Amagasa, H. Kitagawa (2012)
Detecting Social Bookmark Spams Using Multiple User Accounts2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Sharon Paradesi, O. Seneviratne, Lalana Kagal (2012)
Policy Aware Social Miner2012 IEEE Symposium on Security and Privacy Workshops
C. Delbruck, B. Raffelhuschen (1993)
[The theory of migration].Jahrbucher fur Nationalokonomie und Statistik, 212 3-4
G. Navarro (2001)
A guided tour to approximate string matchingACM Comput. Surv., 33
G. Stringhini, Christopher Krügel, G. Vigna (2010)
Detecting spammers on social networks
D. Burt, D. Perrett (1995)
Perception of age in adult Caucasian male faces: computer graphic manipulation of shape and colour informationProceedings of the Royal Society of London. Series B: Biological Sciences, 259
Jalal Alowibdi, U. Buy, Philip Yu (2013)
Empirical Evaluation of Profile Characteristics for Gender Classification on Twitter2013 12th International Conference on Machine Learning and Applications, 1
Olga Peled, Michael Fire, L. Rokach, Y. Elovici (2013)
Entity Matching in Online Social Networks2013 International Conference on Social Computing
A. Orebaugh, J. Allnutt (2009)
Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations
Hyun-Je Song, J. Son, Seong-Bae Park (2013)
Identifying user attributes through non-i.i.d. multi-instance learning2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)
Hau-Wen Chang, Dongwon Lee, Mohammed Eltaher, JeongKyu Lee (2012)
@Phillies Tweeting from Philly? Predicting Twitter User Locations with Spatial Word Usage2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Juan Diez, L. Kuncheva, C. Alonso (2006)
Rotation Forest: A New Classifier Ensemble MethodIEEE Transactions on Pattern Analysis and Machine Intelligence, 28
Jiangchuan Zheng, Siyuan Liu, L. Ni (2014)
User characterization from geographic topic analysis in online social media2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)
(2008)
interactive public relations research. a study of social networks scams
J. Burger, John Henderson, George Kim, Guido Zarrella (2011)
Discriminating Gender on Twitter
Fabrício Benevenuto, Tiago Rodrigues, M. Cha, Virgílio Almeida (2009)
Characterizing user behavior in online social networks
Long Jin, Yang Chen, Tianyi Wang, P. Hui, A. Vasilakos (2013)
Understanding user behavior in online social networks: a surveyIEEE Communications Magazine, 51
P. Serdyukov, Vanessa Murdock, R. Zwol (2009)
Placing flickr photos on a mapProceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval
(1991)
The big five inven-toryversions 4a and 54
Bruce Moon (1995)
Paradigms in migration research: exploring 'moorings' as a schemaProgress in Human Geography, 19
Bülent Özel (2012)
Link and Node Analysis of Gender Based Collaborations in Turkish Social Sciences2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
DS Moskowitz, DC Zuroff (2004)
Flux, pulse, and spin: dynamic additions to the personality lexiconJ Pers Soc Psychol, 86
(2016)
Statista: Leading social networks worldwide as of january 2016, ranked by number of active users (in millions)
De Wang, Danesh Irani, C. Pu (2014)
SPADE: a social-spam analytics and detection frameworkSocial Network Analysis and Mining, 4
F. Johansson, Lisa Kaati, A. Shrestha (2013)
Detecting multiple aliases in social media2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)
Jalal Alowibdi, U. Buy, Philip Yu (2013)
Language independent gender classification on Twitter2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)
Nisha Bhaskaran, Ifeoma Nwogu, M. Frank, V. Govindaraju (2011)
Lie to Me: Deceit detection via online behavioral learningFace and Gesture 2011
Bryan Klimt, Yiming Yang (2004)
The Enron Corpus: A New Dataset for Email Classi(cid:12)cation Research
F. Ortega, J. Troyano, Fermín Cruz, Carlos Vallejo, Fernando Enríquez (2012)
Propagation of trust and distrust for the detection of trolls in a social networkComput. Networks, 56
Rula Sayaf, J. Rule, Dave Clarke (2013)
Can users control their data in social software? an ethical analysis of control systems2013 IEEE Security and Privacy Workshops
Online social network analysis has attracted great attention with a vast number of users sharing information and availability of APIs that help to crawl online social network data. In this paper, we study the research studies that are helpful for user characterization as online users may not always reveal their true identity or attributes. We especially focused on user attribute determination such as gender and age; user behavior analysis such as motives for deception; mental models that are indicators of user behavior; user categorization such as bots versus humans; and entity matching on different social networks. We believe our summary of analysis of user characterization will provide important insights into researchers and better services to online users.
Social Network Analysis and Mining – Springer Journals
Published: Nov 4, 2016
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.