Abstract
On social media platforms and Twitter in particular, specific classes of users such as influencers have been given satisfactory operational definitions in terms of network and content metrics. Others, for instance online activists, are not less important but their characterisation still requires experimenting. We make the hypothesis that such interesting users can be found within temporally and spatially localised contexts, i.e., small but topical fragments of the network containing interactions about social events or campaigns with a significant footprint on Twitter. To explore this hypothesis, we have designed a continuous user profile discovery pipeline that produces an ever-growing dataset of user profiles by harvesting and analysing contexts from the Twitter stream. The profiles dataset includes key network and content-based users metrics, enabling experimentation with user-defined score functions that characterise specific classes of online users. The paper describes the design and implementation of the pipeline and its empirical evaluation on a case study consisting of healthcare-related campaigns in the UK, showing how it supports the operational definitions of online activism, by comparing three experimental ranking functions. The code is publicly available.
You have full access to this open access chapter, Download conference paper PDF
Keywords
1 Introduction
We present a customisable software framework for incrementally discovering and ranking individual profiles for classes of online users, through analysis of their social activity on Twitter. Practical motivation for this work comes from our ongoing effort to support health officers in tropical countries, specifically in Brazil, in their fight against airborne virus epidemics like Dengue and Zika. Help from community activists is badly needed to supplement the scarce public resources deployed on the ground. Our past work has focused on identifying relevant content on Twitter that may point health authorities directly to mosquito breeding sites [22], as well as to users who have shown interest in those topics, i.e., by posting relevant content on Twitter [13].
The approach described in this paper generalises those past efforts, by attempting to discover users who demonstrate an inclination to become engaged in social issues, regardless of the specific topic. We refer to this class of users as activists. The rationale for this approach is that activists who manifest themselves online on a range of social initiatives, may be more sensitive to requests for help on specific issues than the average Twitter user. In the paper we experiment with healthcare-related online campaigns in the UK. Application of the approach to our initial motivating case study in ongoing as part of a long-term collaboration, and is not specifically discussed in the paper.
To be clear, this work is not about providing a robust definition of online activism, or to demonstrate that online activism translates into actual engagement in the “real world”. Instead, we start by acknowledging that the notion of activist is not as well formalised in the literature as that of, for example, influencers, and we develop a generic content processing pipeline which can be customised to identify a variety of classes of users. The pipeline repeatedly searches for and ranks Twitter user profiles by collecting quantitative network- and content-based user metrics. Once targeted to a specific topic, it provides a tool for exploring operational definitions of user roles, including online activism, i.e., by combining the metrics into higher level, engineered user features to be used for ranking.
Although the user harvesting pipeline is generally applicable to the analysis of a variety of user profiles, our focus is on the search for a satisfactory operational definition of online activism. According to the Cambridge Dictionary, an activist is “A person who believes strongly in political or social change and takes part in activities such as public protests to try to make this happen”. While activism is well-documented, e.g. in the social movement literature [5], and online activism is a well-known phenomenon [12], research has been limited to the study of its broad societal impact. In contrast, we are interested in the fine-grained discovery of activists at the level of the single individual, that is, we seek people who feel passionate about a cause or topic, and who take action for it. Searching for online activists is a realistic goal, as activists presence in social media is widely acknowledged, and it is also clear that social media facilitates activists communication and organization [17, 23]. Specific traits that characterise activists include awareness of causes and social topic and the organization of social gatherings and activities, including in emergency situations, by helping organize support efforts and diffusion of useful information.
1.1 Challenges
The definition of online activism translates into technical challenges in systematically harvesting suitable candidate users. Firstly, the potentially more subdue nature of activists, relative to influencers, makes it particularly difficult to separate their online footprint from the background noise of general conversations. Also, interesting activists are by their nature associated to specific topics and manifest their nature in local contexts, for instance as organisers or participants to local events. Finally, we expect their personal engagement to be sustained over time and across multiple such contexts. These observations suggest that the models and algorithms developed for influencers are not immediately applicable, because they mostly operate on global networks, where less prominent users have less of a chance to emerge. Some topic-sensitive metrics and models have been proposed to measure social influence, for example, alpha centrality [6, 15] and the Information Diffusion model [16]. Algorithms based on topic models have also been proposed to account for topic specificity [24]. However, these approaches are still aimed at measuring influence, not activism, and assume a one-shot discovery process, as opposed to a continuous, incremental approach.
1.2 Approach and Contributions
To address these challenges, the approach we propose involves a two-fold strategy. Firstly, we identify suitable contexts that are topic-specific and limited both in time and, optionally, also in space, i.e., regional initiatives, events, or campaigns. We then search for users only within these contexts, following the intuition that low-key users who produce weak online signal have a better chance to be discovered when the search is localised and then repeated across multiple such contexts. By continuously discovering new contexts, we hope to incrementally build up a users’ dataset where users who appear in multiple contexts are progressively more strongly characterised. Secondly, to allow experimenting with varying technical definitions of activist, we collect a number of network-based and content-based user profile features, mostly known from the literature, and make them available to experiment with a variety of user rankings.
The paper makes the following specific contributions. Firstly, we propose a data processing pipeline for harvesting Twitter content and user profiles, based on multiple limited contexts. The pipeline includes community detection and network analysis algorithms aimed at discovering users within such limited contexts.
Secondly, we have implemented a comprehensive set of content-based metrics that results into an ever-growing database of user profile features, which can then be used for mining purposes. User profiles are updated when they are repeatedly found in multiple contexts.
Lastly, for empirical evaluation of our implementation, we demonstrate an operational definition of the activist profile, defined in terms of the features available in the database. We collected about 3,500 users across 25 contexts in the domain of healthcare awareness campaigns in the UK during 2018, and demonstrated three separate ranking functions, showing that it is possible to identify individuals as opposed to well-known organisations. The application of the approach to the specific challenge of combating tropical disease epidemics in Brazil is currently in progress and is not reported in this paper.
1.3 Related Work
The closest body of research to this work is concerned with techniques for the discovery of online influencers. According to [11], influencers are prominent individuals with special characteristics that enable them to affect a disproportionately large number of their peers with their actions. A large number of metrics and techniques have been proposed to make this generic definition operational [19]. These metrics tend to favour high visibility users across global networks, regardless of their actual impact [8]. In contrast, activists are typically low-key, less prominent users who only emerge from the crowd by signalling high levels of engagement with one or more specific topics, as opposed to being thought-leaders. While such behaviour can be described using well-tested metrics [19], it should also be clear that new ways to combine those metrics are required. A method for creating Twitter user ontologies considering the content type of the tweets is proposed in [18]. This approach could be used to gain insights over a user, but fails to give a comprehensive description of the user activity as it is based only on recent user activity, also due to Twitter API limitations.
The algorithm proposed in [7] aims to identify influencers based on a single topic context, based on relevant social media conversations. Metrics include number of “likes”, viewers per months, post frequency and number of comments per post, as well as the ratio of positive to negative posts. As some of these metrics are qualitative and difficult to acquire, however, this approach is not easy to automate. Another approach to ranking topic-specific influencers within specific events appears in [11], where network dynamics are accounted for in real-time. Once again however, the effect is to discover users who receive much attention, but do not necessarily create a real impact over users inside one topic.
Machine learning is used in [2] to analyse posted content and recognise when a user is able to influence another inside a conversation. This however requires substantial a priori ground truth, making this approach impracticable in our case. In addition, the need to create a classifier for each topic limits the scalability of the system.
A supervised regression approach is used in [14] to rank influence of Twitter users. It uses features that are not based on content, but the method performs poorly as it requires a huge training set to work effectively.
Unlike the majority of the influencer ranking algorithms, in [21] a topic-specific influencer ranking is proposed. First it harvests sequentially timed snapshots of the network of users related to a topic. Then it ranks the users based on the number of followers gained and lost in the considered snapshots.
Finally, [4] presents a model for identifying “prominent users” regarding a specific topic event in Twitter. Those are users who focus their attention and communication on the aforementioned topic event. Users are described by a feature vector, computed in real-time, which allows a separation between on-topic and off-topic users activity over Twitter. Similar to [2], problems of scalability and adaptability arise as two supervised learning methods are used, one to discriminate prominent users from the rest and the other to rank them.
2 Contexts and User Metrics
The aim of the pipeline is to repeatedly and efficiently discover user profiles from the Twitter post history within user-specified contexts and to use the process to grow a database of feature-rich user profiles that can be ranked according to user-defined relevance functions. The criteria used to define contexts, profile relevance functions, and associated user relevance thresholds can be configured for specific applications.
2.1 Contexts and Context Networks
A context C is a Twitter query defined by a set K of hashtags and/or keyword terms, a time interval \([t_1, t_2]\), and a geographical constraint s, such as a bounding box:
Let P(C) denote the query result, i.e., a set of posts by users. We only consider two Twitter user activities: an original tweet, or a retweet. Let u(p) be the user who originated a tweet \(p \in P(C)\). We say that both p and u(p) are within context C. We also define the complement of P(C) as the set of posts found using the same spatio-temporal constraints, but which do not contain any of the terms in K. More precisely, given a context \(C'= ( s, [t_1, t_2], \emptyset )\) with no terms constraints, we define
. We refer to these posts, and their respective users, as “out of context C”.
P(C) induces a user-user social network graph \(G_C = (V,E)\) where V is the set of all users who have authored any \(p \in P(C)\): \(V = \{ u(p) | p \in P(C) \}\), and a weighted directed edge \(e = \langle u_1, u_2, w \rangle \) is added to E for each pair of posts \(p_1, p_2\) such that \(u(p_1) = u_1, u(p_2) = u_2\) and either (i) \(p_2\) is a retweet of \(p_1\), or (ii) \(p_1\) contains a mention of \(u_2\). For any such edge, w is a count of such pairs of posts occurring in P(C) for the same pair of users.
2.2 User Relevance Metrics
We support metrics that are generally accepted by the community as forming a core, from which many different social user roles are derived [19]. We distinguish amongst three types of features, which differ in the way they are computed from the raw Twitter feed:
-
Content-based metrics that rely solely on content and not on the user-user network. These metrics are defined relative to a topic of interest, i.e., a context;
-
Context-independent topological metrics that encode context-independent, long-lived relationships amongst users, i.e., follower/followee; and
-
Context-specific topological metrics that encode user relationships that occur specifically within a context.
All metrics are functions of a few core features that can be directly extracted from Twitter posts. Given a context C containing user u, we define:
Note that, given C, we can evaluate some of the features above with respect to either P(C) or independently from each other, that is, we can consider an “on-context” and an “off-context” version of each feature, with the exception of \( F1 \) and \( F2 \) which are context-independent. For example, we are going to write \(R1_{on}(u)\) to denote the number of context retweets and \(R1_{ off }(u)\) the number of out-of-context retweets by u, i.e., these are retweets that occur within C’s spatio-temporal boundaries, but do not contain any of the hashtags or keywords that define C. We similarly qualify all other features. Using these core features, the framework currently supports the following metrics.
Content-based metrics:
The framework supports one Context-independent topological metric and one Context-specific topological metric, both commonly used, see e.g. [19]:
where N is the number of nodes in the network induced by C. Note that the metrics we have selected are a superset of those indicated in recent studies on online activism, namely [12] and [17], and thus support our empirical evaluation, described in Sect. 4.
3 Incremental User Discovery
The content processing pipeline operates iteratively on a set of contexts within a given area of interest, for instance 2018 UK health campaigns. This set is initialised at the start of the process and then updated at the end of each iteration, in a semi-automated way. The user discovery process is therefore potentially open-ended, as long as new contexts can be discovered. The new contexts are expected to be within the same topic area, but contexts that “drift” to new areas of interest are also acceptable. Each iteration takes a context C as input, and selects a subset of the users who participate in C, using the topogical criteria described below, along with the set of their features and metrics. These users profiles are added to a database, where entries for repeat users are updated according to a user-defined function. The pipeline structure is described below, where the numbers are with reference to Fig. 1.
Given C as in (2), all Twitter posts P(C) that satisfy C are retrieved, using the Twitter Search APIs. Note that this step hits the API service limitations imposed by Twitter. For this reason, in our evaluation we have limited our retrieval to 200 tweets/context. This is sufficient, considering that repeated users appear consistently in our evaluation (Sect. 4). Twitter API limitations can be overcome by either extending the harvesting time, or by choosing more recent contexts, as the Twitter API is more tolerant with recents tweets.
The context network \(G_C\) is then generated (3), as defined in Sect. 2.1. The size of each network is largely determined by the nature of the context, and ranges between 140 and 400 users (avg 254, see Table 1).
Next, \(G_C\) is partitioned into communities of users (4). The goal of this partitioning is to further narrow the scope when computing in-degree centrality (6), to enable weak-signal users to emerge relative to other more globally dominant users. We have experimented with two of the many algorithms for discovering virtual communities in social networks, namely DEMON [9] and Infomap [20]. Both are available in our implementation, but based on our experimental comparison (Sect. 4) we recommend the latter.
DEMON is based on ego networks [1], and uses a label propagation algorithm to assign nodes to communities. Users may be assigned to multiple communities, an attractive feature when users are active in more than one community within the same context, i.e., a social event or a campaign. Label propagation is also a local method, translating into an efficient algorithm. In practice, however, in our experiments we found that for almost half of our context networks, DEMON actually fails to discover any communities. In contrast, Infomap forces each user into at most one community, but it generates valid communities in all cases. As some of those are very small, our implementation discards communities with fewer than 4 users (see Sect. 4).
Once communities are identified, using either method, we calculate in-degree centrality (6) for each node locally, either relative to their own community if they are available, and to the entire network otherwise.
3.1 Computing User Features and Ranking
Next, user metrics as defined in Sect. 2.2, along with the Follower Rank are computed from the network and the user features. This is achieved through bulk retrieval of user profile information (5), namely the number of tweets, retweets, number of followers F1(u) and followees, F2(u), along with user name, web link, and bio. Computing the other metrics: Topical Focus (2), Topical Strength (3), Topical Attachment (4) also requires the entire user post history to be retrieved for the entire time interval defined by the context. These posts are then separated into P(C) (on-context) and (off-context), depending on whether they contain a hashtag related to the context or not. Similarly, a post that contains a link is a link on-topic if it contains both a link and a hashtag related to the context, and a link off-topic otherwise. We also calculate the number of retweets for every post, i.e., \( R1 (u)\) and \( R3 (u)\), which are required to compute Topical Strength.
All of these features are persisted to a database which is made available for ranking purposes. User-defined functions can be specified to update the Rank of pre-existing users, e.g. by combining scores assigned at different times. The DB enables user-defined scoring functions, which result in user ranking lists (6). Examples of these are given later in Sect. 4. This framework approach is consistent with the experimental nature of our search for activists, which requires exploring a variety of ranking functions.
3.2 New Contexts Discovery
The final step within one iteration (7) aims to discover new contexts, so that the process can start again (2). Intuitively, once a score function has been applied and users have been ranked, we can hope to discover new interesting keywords and hashtags by exploring the timeline of the top-k users. Specifically, we consider each hashtag found in the timelines, which is related to the broader topic and not yet considered in past iterations. Each stored hashtag is then enriched with the information needed to perform a new iteration of the pipeline, namely (i) the temporal and spatial information of the context, and (ii) related hashtags. Currently this step is only semi-automated, as making a judgement on the relevance of the new terms requires human expertise. While automating this step is not straightforward, this is not a very time-consuming step, and one can imagine an approach where such task is crowdsourced.
While the process ends naturally when no new contexts are uncovered from the previous ones, the system continuously monitors the Twitter stream for recent contexts. These may typically include events that are temporally recurring, and use similar hashtags for each new edition. In this case, their relevance is assessed on the basis of their past history.
4 Empirical Evaluation
Existing methods to discover specific classes on online users are typically validated using a supervised approach, i.e., they rely on expert-generated ground truth. Such approaches, however, are vulnerable to the subjectivity of the experts, whereby the evaluation would be measuring the fit of the model to the specific experts’ own assessment of user instances’ relevance. In contrast, we follow an unsupervised approach with no a priori knowledge of user relevance. We aim to demonstrate the value of our pipeline in creating a database of online profiles that are ready to be mined, along with examples of candidate user ranking functions. In this approach, human expertise only comes into play to assess and validate the top-k user lists produced by these functions. We demonstrate the pipeline in action on a significant set of 25 initial contexts, and define three alternative ranking functions aimed at capturing the empirical notion of online activists. The pipeline is fully implemented in Python using Pandas and public libraries (NetworkX, Selenium) and is available on githubFootnote 1. All experiments are performed on a single Azure node with standard commodity configuration. Note that we do not focus on system performance as all components operate in near-real time. One exception is Twitter content harvesting, which is limited by the Twitter API and requires approximately 2 h per context.
4.1 Contexts and Networks
We have manually selected 25 contexts within the scope of health awareness campaigns in the UK, all occurring in 2018 and well-characterised using predefined hashtags. Due to limitations imposed by Twitter on the number of posts that can be retrieved within a time interval, only 200 tweets were retrieved from each context. Table 1 lists the events along with key metrics for their corresponding user-user networks. To recall, assortativity measures how frequently nodes are likely to connect to other nodes with the same degree (\(>0\)) or with a different degree (\(<0\)). Negative figures (mean: −0.22, std dev: 0.17) are in line with what is observed on the broader Twitter network [10]. The very small figures for density, defined as \(\frac{\#edges }{ \#nodes \cdot ( \#nodes -1)}\) (mean: 0.004, std dev: 0.002), suggest very few connections exist amongst users within a context. This makes it difficult to detect meaningful communities, as described below, thus for some contexts the topological metrics are measured on the entire network as opposed to within each community. This view is also supported by the average node degree (mean: 2.04, std dev: 0.46) and the ratio of strongly connected components to the number of nodes (mean: 0.98, std. dev. 0.02).
4.2 Communities
DEMON and Infomap produce significantly different communities in each network. DEMON identifies communities in only 48% of the networks, with an average of only 1.92 communities per network and a slightly negative (−0.28) average assortativity per community, in line with the average for their parent networks. Only the users who belong to one of those communities, about 6%, are added to the database. For the remaining 52% of networks where no communities are detected, users’ in-degrees are calculated using the entire network, and all users are added to the database, for a total of 3,570 users being added to the database in our experiments using DEMON.
In contrast, Infomap provides meaningful communities for all networks. Those with fewer than 3 users are discarded, leaving 18.88 communities per network on average, with 8.5 users per community on average. When using Infomap, 3,567 users were added to the database (on average 253 users per network). The average assortativity across all communities is again slightly negative (−0.43). Table 2 compares the two approaches on the key metrics just discussed. On the basis of this comparison, we recommend using Infomap, which we have used for our evaluation.
4.3 Users Discovery
Repeat users who appear in multiple contexts are particularly interesting as they provide a stronger signal. Out of the total 3,567 users, 160 of those appear at least in two of the 25 contexts. After community detection, only 61 of these users are still seen as repeat users, while the remaining 99 are either removed altogether, or they only appear once. Of the 61, 57 appear twice, 2 appear three times, and 2 appear four times. Thus, only 1.6% of users appear more than once when communities with more than 3 users are considered, compared to the overall 4.5% of overall repeat users. Table 3 reports the top-10 repeat users along with their Follower Rank, and Fig. 2 shows the number of repeat users per context. As the table is sorted by number of occurrences then by Follower Rank, an indication of popularity, it is not surprising to find that top users include well-known names such as Mr. Hunt, who at the time of the events was Secretary of State for Health and Social Care in the UK, with \(FR =1\), and a number of associations and foundations active in the public healthcare space. More interesting are perhaps non-repeat users who emerge when ad hoc ranking is applied to the database, as we illustrate next.
4.4 Users Ranking
To demonstrate the potential value of the database, albeit on a small scale, we have tested three user ranking functions. As mentioned, the aim of this exercise is to provide an objective grounding for engaging with experts on finding suitable operational definitions for specific user profiles. We consider good functions those that privilege individuals over organisations or business.
Function (7) is designed to promote users who are at the “fringe” of their community, while giving credit to generic on-topic activities during the contexts. To achieve this, Topical Focus \( TF \) is used as a positive contribution, while a large in-degree \( IC \) reduces the score. In contrast, function (8) penalises user popularity, i.e., by using the complement of Follower Rank \( FR \), while rewarding prominence inside communities (in-degree \( IC \)) and information spreading by also considering shared links (Topical Attachment \( TA \)). Function (9) combines ideas from both (8) and (7).
The top-10 users for each ranking are reported in Table 4. To appreciate the effects of these functions, we have manually labelled the top-100 user profiles for each of the rankings, using a broad type classification as individuals as opposed to institutional players (associations, public bodies), or professionals. The fractions of on-topic users are 86%, 83%, and 38% for (7), (8), and (9) respectively. Importantly, (9) identifies more individuals than institutions and professionals (96%) than (8) and (7), both at 33%p. Also, repeat users are rewarded in both rankings. Users with \( FR (u) = 0\) and \( min\_max(|Tweets (u)|) < 0.005 \) are considered not active and have been assigned lowest score. Figure 3 shows the distribution of user types within the top-100 users for each of the three rankings, broken down into 10 users bins. We can see that individuals dominate in (9), and are fewer but emerge earlier in the ranks when (8) is used. We plan to conduct user studies to establish useful analytics to be incorporated into our framework.
5 Conclusions and Lessons Learnt
Motivated by the need to find an operational definition of “online activists” that is grounded in well-established network and user-activity metrics, we have designed a Twitter content processing pipeline for progressively harvesting Twitter users based on their engagement with online socially-minded events, or campaigns, which we have called contexts. The pipeline yields a growing database of user profiles along with their associated metrics, which can then be analysed to experiment with user-defined user ranking criteria. The pipeline is designed to select promising candidate profiles, but the approach is unsupervised, i.e., no manual classification of example users is provided. We have empirically evaluated the pipeline on a case study, along with experimental scoring functions to show the viability of the approach.
The design of the pipeline show that useful harvesting of interesting users can be accomplished within the limitations imposed by Twitter on its APIs. The next challenge is to automate the discovery of new contexts so that the pipeline may continuously add new and update users in the database. Only at this point will it be possible to validate the entire approach, hopefully with help from third party users, on a variety of new context topics.
References
Arnaboldi, V., Conti, M., Passarella, A., Pezzoni, F.: Ego networks in twitter: an experimental analysis. In: 2013 Proceedings IEEE INFOCOM, pp. 3459–3464 (2013)
Biran, O., Rosenthal, S., Andreas, J., McKeown, K., Rambow, O.: Detecting influencers in written online conversations. In: Proceedings of the Second Workshop on Language in Social Media LSM 2012, pp. 37–45. Association for Computational Linguistics, Stroudsburg (2012)
Bizid, I., Nayef, N., Boursier, P., Doucet, A.: Detecting prominent microblog users over crisis events phases. Inf. Syst. 78, 173–188 (2018)
Bizid, I., Nayef, N., Boursier, P., Faiz, S., Morcos, J.: Prominent users detection during specific events by learning on- and off-topic features of user activities. In: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015 ASONAM 2015, pp. 500–503. ACM, New York (2015)
Bobel, C.: “i’m not an activist, though i’ve done a lot of it": doing activism, being activist and the “perfect standard" in a contemporary movement. Soc. Mov. Stud. 6(2), 147–159 (2007)
Bonacich, P., Lloyd, P.: Eigenvector-like measures of centrality for asymmetric relations. Soc. Netw. 23(3), 191–201 (2001)
Booth, N., Matic, J.A.: Mapping and leveraging influencers in social media to shape corporate brand perceptions. Corp. Commun. Int. J. 16, 184–191 (2011)
Cha, M., Haddadi, H., Benevenuto, F., Gummadi, K.P.: Measuring user influence in twitter: the million follower fallacy. In: ICWSM (2010)
Coscia, M., Rossetti, G., Giannotti, F., Pedreschi, D.: Demon: a local-first discovery method for overlapping communities. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining KDD 2012, pp. 615–623. ACM, New York (2012)
Fisher, D.N., Silk, M.J., Franks, D.W.: The perceived assortativity of social networks: methodological problems and solutions. In: Missaoui, R., Abdessalem, T., Latapy, M. (eds.) Trends in Social Network Analysis. LNSN, pp. 1–19. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-53420-6_1
Kardara, M., Papadakis, G., Papaoikonomou, A., Tserpes, K., Varvarigou, T.: Large-scale evaluation framework for local influence theories in twitter. Inf. Process. Manage. 51(1), 226–252 (2015)
Lotan, G., Graeff, E., Ananny, M., Gaffney, D., Pearce, I., Boyd, D.: The Arab spring| the revolutions were tweeted: information flows during the 2011 Tunisian and Egyptian revolutions. Int. J. Commun. 5, 31 (2011)
Missier, P., et al.: Recruiting from the network: discovering twitter users who can help combat zika epidemics. In: Cabot, J., De Virgilio, R., Torlone, R. (eds.) ICWE 2017. LNCS, vol. 10360, pp. 437–445. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60131-1_30
Nargundkar, A., Rao, Y.S.: Influencerank: a machine learning approach to measure influence of twitter users. In: 2016 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 1–6, April 2016
Overbey, L.A., Greco, B., Paribello, C., Jackson, T.: Structure and prominence in twitter networks centered on contentious politics. Soc. Netw. Anal. Min. 3(4), 1351–1378 (2013)
Pal, A., Counts, S.: Identifying topical authorities in microblogs. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining - WSDM 2011 (2011)
Poell, T.: Social media and the transformation of activist communication: exploring the social media ecology of the 2010 Toronto G20 protests. Inf. Commun. Soc. 17(6), 716–731 (2014)
Razis, G., Anagnostopoulos, I.: Semantifying twitter: the influence tracker ontology. In: 2014 9th International Workshop on Semantic and Social Media Adaptation and Personalization, pp. 98–103, November 2014
Riquelme, F., Gonzalez-Cantergiani, P.: Measuring user influence on twitter: a survey. Inf. Process. Manage. 52(5), 949–975 (2016)
Rosvall, M., Bergstrom, C.T.: Maps of random walks on complex networks reveal community structure. Proc. Nat. Acad. Sci. U.S.A. 105, 1118–1123 (2008)
Schenk, C.B., Sicker, D.C.: Finding event-specific influencers in dynamic social networks. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, pp. 501–504 (2011)
Sousa, L., et al.: Vazadengue: an information system for preventing and combating mosquito-borne diseases with social networks. Inf. Syst. 75, 26–42 (2018)
Youmans, W.L., York, J.C.: Social media and the activist toolkit: user agreements, corporate interests, and the information infrastructure of modern social movements. J. Commun. 62(2), 315–329 (2012)
Zhao, W.X., et al.: Comparing twitter and traditional media using topic models. In: Clough, P., et al. (eds.) ECIR 2011. LNCS, vol. 6611, pp. 338–349. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20161-5_34
Acknowledgments
The authors would like to thank Prof. Carlo Piccardi at Politecnico di Milano, Italy, for his useful suggestions and SmartMetropolis Project at Universidade Federal do Rio Grande do Norte, Brazil, for the support to the Brazilian team.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Primo, F., Missier, P., Romanovsky, A., Figueredo, M., Cacho, N. (2019). A Customisable Pipeline for Continuously Harvesting Socially-Minded Twitter Users. In: Bakaev, M., Frasincar, F., Ko, IY. (eds) Web Engineering. ICWE 2019. Lecture Notes in Computer Science(), vol 11496. Springer, Cham. https://doi.org/10.1007/978-3-030-19274-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-19274-7_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19273-0
Online ISBN: 978-3-030-19274-7
eBook Packages: Computer ScienceComputer Science (R0)