[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3365921.3365942acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Towards Context-Aware Social Behavioral Analytics

Published: 22 February 2020 Publication History

Abstract

The confluence of technological and societal advances, and more specifically, engagement with Web, social media, and smart devices has the potential to affect the mental behavior of the individuals. Examples include extremist and criminal behaviors such as radicalization and cyber-bullying, which are causing serious issues for humanity. Major barriers to the effective understanding of behavioral disorders on social networks includes the ability to understand the content and context of social documents, as well as the activity of social users. Understanding the patterns of behavioral disorders (e.g., criminal and extremist activities) on social networks, is challenging and requires techniques to contextualize the content of social documents based on the time-aware analysis of personality, behaviour and past activities of social users. In this context, semantic information extraction and enrichment from social documents has the potential to become a vital asset to explore the sign of behavioral disorders and prevent serious issues such as cyber-bullying, suicidal related behavior and radicalization. To address this challenge, in this paper, we present a novel social document analysis pipeline to enable analysts engage with social documents (e.g., a Tweet in Twitter or a post on Facebook) to explore cognitive aspects of behavioral disorders. We implement the pipeline as an extensible and scalable architecture and present the evaluation results.

References

[1]
Charu C. Aggarwal. 2011. An Introduction to Social Network Data Analytics. In Social Network Data Analytics.
[2]
Farhad Amouzgar, Amin Beheshti, Samira Ghodratnama, Boualem Benatallah, Jian Yang, and Quan Z. Sheng. 2018. iSheets: A Spreadsheet-Based Machine Learning Development Platform for Data-Driven Process Analytics. In Service-Oriented Computing - ICSOC 2018 Workshops - ADMS, ASOCA, ISYyCC, CloTS, DDBS, and NLS4IoT, Hangzhou, China, November 12-15, 2018, Revised Selected Papers. 453--457. https://doi.org/10.1007/978-3-030-17642-6_43
[3]
Itamar Arel and et al. 2010. Deep machine learning-a new frontier in artificial intelligence research. IEEE computational intelligence magazine 5, 4 (2010).
[4]
Tom Bartholomay and et al. 2011. Mapping Extension's networks: Using social network analysis to explore Extension's outreach. Journal of extension 49, 6 (2011).
[5]
Jamie Bartlett and Carl Miller. 2012. The edge of violence: Towards telling the difference between violent and non-violent radicalization. Terrorism and Political Violence 24, 1 (2012), 1--21.
[6]
Amin Beheshti, Boualem Benatallah, Reza Nouri, Van Munin Chhieng, HuangTao Xiong, and Xu Zhao. 2017. CoreDB: a Data Lake Service. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, CIKM 2017, Singapore, November 06 - 10, 2017, Ee-Peng Lim, Marianne Winslett, Mark Sanderson, Ada Wai-Chee Fu, Jimeng Sun, J. Shane Culpepper, Eric Lo, Joyce C. Ho, Debora Donato, Rakesh Agrawal, Yu Zheng, Carlos Castillo, Aixin Sun, Vincent S. Tseng, and Chenliang Li (Eds.). ACM, 2451--2454. https://doi.org/10.1145/3132847.3133171
[7]
Amin Beheshti, Boualem Benatallah, Reza Nouri, and Alireza Tabebordbar. 2018. CoreKG: a Knowledge Lake Service. PVLDB 11, 12 (2018), 1942--1945. https://doi.org/10.14778/3229863.3236230
[8]
Amin Beheshti, Boualem Benatallah, Alireza Tabebordbar, Hamid Reza Motahari-Nezhad, Moshe Chai Barukh, and Reza Nouri. 2019. DataSynapse: A Social Data Curation Foundry. Distributed and Parallel Databases 37, 3 (2019), 351--384. https://doi.org/10.1007/s10619-018-7245-1
[9]
Amin Beheshti, Francesco Schiliro, Samira Ghodratnama, Farhad Amouzgar, Boualem Benatallah, Jian Yang, Quan Z. Sheng, Fabio Casati, and Hamid Reza Motahari-Nezhad. 2018. iProcess: Enabling IoT Platforms in Data-Driven Knowledge-Intensive Processes. In Business Process Management Forum - BPM Forum 2018, Sydney, NSW, Australia, September 9-14, 2018, Proceedings (Lecture Notes in Business Information Processing), Mathias Weske, Marco Montali, Ingo Weber, and Jan vom Brocke (Eds.), Vol. 329. Springer, 108--126. https://doi.org/10.1007/978-3-319-98651-7_7
[10]
Seyed-Mehdi-Reza Beheshti, Alireza Tabebordbar, Boualem Benatallah, and Reza Nouri. 2017. On Automating Basic Data Curation Tasks. In Proceedings of the 26th International Conference on World Wide Web Companion, Perth, Australia, April 3-7, 2017. 165--169. https://doi.org/10.1145/3041021.3054726
[11]
Adam Bermingham and et al. 2009. Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In ASONAM. IEEE.
[12]
Kamaldeep Bhui, Brian Everitt, and Edgar Jones. 2014. Might depression, psychosocial adversity, and limited social assets explain vulnerability to and resistance against violent radicalisation? PloS one 9, 9 (2014), e105918.
[13]
Kamaldeep Bhui, Nasir Warfa, and Edgar Jones. 2014. Is violent radicalisation associated with poverty, migration, poor self-reported health and common mental disorders? PloS one 9, 3 (2014), e90718.
[14]
Vincent D Blondel and et al. 2008. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment 2008, 10 (2008).
[15]
Christian Blum, Jakob Puchinger, Günther R Raidl, and Andrea Roli. 2011. Hybrid metaheuristics in combinatorial optimization: A survey. Applied Soft Computing 11, 6 (2011), 4135--4151.
[16]
Randy Borum. 2014. Psychological vulnerabilities and propensities for involvement in violent extremism. Behavioral sciences & the law 32, 3 (2014), 286--305.
[17]
Ronan Collobert, Jason Weston, Léon Bottou, Michael Karlen, Koray Kavukcuoglu, and Pavel Kuksa. 2011. Natural language processing (almost) from scratch. Journal of machine learning research 12, Aug (2011), 2493--2537.
[18]
Bertjan Doosje and et al. 2016. Terrorism, radicalization and de-radicalization. Current Opinion in Psychology 11 (2016).
[19]
Magdalini Eirinaki, Sumit Pal Singh Monga, and Shreedhar Sundaram. 2012. Identification of influential social networkers. International Journal of Web Based Communities 8, 2 (2012), 136--158.
[20]
Irene Gilpérez-López and et al. 2017. An initial study on radicalization risk factors: Towards an assessment software tool. In DEXA. IEEE.
[21]
M. Gong and et al. 2016. An Efficient Memetic Algorithm for Influence Maximization in Social Networks. IEEE Computational Intelligence Magazine 11, 3 (2016).
[22]
John Horgan. 2008. From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. The ANNALS of the American Academy of Political and Social Science 618, 1 (2008), 80--94.
[23]
https://www.kaggle.com/fifthtribe/how-isis-uses twitter/home. [n.d.]. How ISIS Uses Twitter.
[24]
Michael King and Donald M Taylor. 2011. The radicalization of homegrown jihadists: A review of theoretical models and social psychological evidence. Terrorism and Political Violence 23, 4 (2011), 602--622.
[25]
Arie W Kruglanski and et al. 2014. The psychology of radicalization and deradicalization: How significance quest impacts violent extremism. Political Psychology 35, S1 (2014).
[26]
Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon. 2010. What is Twitter, a social network or a news media?. In WWW.
[27]
Raúl Lara-Cabrera and et al. 2017. Measuring the radicalisation risk in social networks. IEEE Access 5 (2017).
[28]
Jong-Ryul Lee and Chin-Wan Chung. 2014. A fast approximation for influence maximization in large social networks. In WWW. ACM.
[29]
Lin Li, Anna Scaglione, Ananthram Swami, and Qing Zhao. 2011. Trust, opinion diffusion and radicalization in social networks. In ASILOMAR. IEEE.
[30]
Federico Marini and Beata Walczak. 2015. Particle swarm optimization (PSO). A tutorial. Chemometrics and Intelligent Laboratory Systems 149 (2015), 153--165.
[31]
Elena Mastors and et al. 2014. Omar al-Hammami: A case study in radicalization. Behavioral sciences 32, 3 (2014).
[32]
John Monahan. 2012. The individual risk assessment of terrorism. Psychology, Public Policy, and Law 18, 2 (2012).
[33]
Ashwini Nadkarni and Stefan G Hofmann. 2012. Why do people use Facebook? Personality and individual differences 52, 3 (2012), 243--249.
[34]
Preslav Nakov and et al. 2016. SemEval-2016 Task 4: Sentiment Analysis in Twitter. In SemEval@NAACL-HLT.
[35]
Mark EJ Newman. 2006. Modularity and community structure in networks. Proceedings of the national academy of sciences 103, 23 (2006), 8577--8582.
[36]
Frank Ohlhorst. 2012. Big data analytics: turning big data into big money. Vol. 65. John Wiley & Sons.
[37]
Daniel Preoţiuc-Pietro and et al. 2015. Studying user income through language, behaviour and affect in social media. PloS one 10, 9 (2015).
[38]
Khadije Rahimkhani and et al. 2015. A fast algorithm for finding most influential people based on the linear threshold model. Expert Systems with Applications 42, 3 (2015).
[39]
Adithya Rao, Nemanja Spasojevic, Zhisheng Li, and Trevor DSouza. 2015. Klout score: Measuring influence across multiple social networks. In Big Data (Big Data), 2015 IEEE International Conference on. IEEE, 2282--2289.
[40]
J Peter Rothe. 2017. The scientific analysis of personality. Routledge.
[41]
Hassan Saif and et al. 2017. A semantic graph-based approach for radicalisation detection on social media. In European semantic web conference. Springer.
[42]
Francesco Schiliro, Amin Beheshti, Samira Ghodratnama, Farhad Amouzgar, Boualem Benatallah, Jian Yang, Quan Z. Sheng, Fabio Casati, and Hamid Reza Motahari-Nezhad. 2018. iCOP: IoT-Enabled Policing Processes. In Service-Oriented Computing - ICSOC 2018 Workshops - ADMS, ASOCA, ISYyCC, CloTS, DDBS, and NLS4IoT, Hangzhou, China, November 12-15, 2018, Revised Selected Papers. 447--452. https://doi.org/10.1007/978-3-030-17642-6_42
[43]
Alireza Tabebordbar and Amin Beheshti. 2018. Adaptive rule monitoring system. In Proceedings of the 1st International Workshop on Software Engineering for Cognitive Services, SE4COG@ICSE 2018, Gothenburg, Sweden, May 28-2, 2018, Hamid R. Motahari Nezhad, Rao Mikkilineni, Boualem Benatallah, Fabio Casati, Schahram Dustdar, Gordana Dodig-Crnkovic, and Adrian Mos (Eds.). ACM, 45--51. https://doi.org/10.1145/3195555.3195564
[44]
Ramine Tinati and et al. 2012. Identifying communicator roles in twitter. In WWW. ACM.
[45]
Humberto M Trujillo and et al. 2016. Psychometric properties of the Spanish version of the activism and radicalism intention scale. Revista de Psicología Social 31, 1 (2016).
[46]
Jianshu Weng and et al. 2010. Twitterrank: finding topic-sensitive influential twitterers. In Web search and data mining conference. ACM.

Cited By

View all
  • (2023)A Contextualized Transformer-Based Method for Cyberbullying Detection2023 IEEE 10th International Conference on Data Science and Advanced Analytics (DSAA)10.1109/DSAA60987.2023.10302478(1-10)Online publication date: 9-Oct-2023
  • (2020)Linking textual and contextual features for intelligent cyberbullying detection in social mediaProceedings of the 18th International Conference on Advances in Mobile Computing & Multimedia10.1145/3428690.3429171(3-10)Online publication date: 30-Nov-2020
  • (2020)The Socio-economic Impacts of Social Media Privacy and Security ChallengesFrontiers in Cyber Security10.1007/978-981-15-9739-8_41(553-563)Online publication date: 4-Nov-2020

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
MoMM2019: Proceedings of the 17th International Conference on Advances in Mobile Computing & Multimedia
December 2019
266 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Johannes Kepler University, Linz, Austria
  • @WAS: International Organization of Information Integration and Web-based Applications and Services

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 February 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Behavioral Analytics
  2. Context-aware Applications
  3. Data Curation

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

MoMM2019

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)1
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A Contextualized Transformer-Based Method for Cyberbullying Detection2023 IEEE 10th International Conference on Data Science and Advanced Analytics (DSAA)10.1109/DSAA60987.2023.10302478(1-10)Online publication date: 9-Oct-2023
  • (2020)Linking textual and contextual features for intelligent cyberbullying detection in social mediaProceedings of the 18th International Conference on Advances in Mobile Computing & Multimedia10.1145/3428690.3429171(3-10)Online publication date: 30-Nov-2020
  • (2020)The Socio-economic Impacts of Social Media Privacy and Security ChallengesFrontiers in Cyber Security10.1007/978-981-15-9739-8_41(553-563)Online publication date: 4-Nov-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media