Skip to main content

Understanding User Behavior through URL Analysis in Sina Tweets

  • Conference paper
Web Information Systems Engineering – WISE 2013 Workshops (WISE 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8182))

Included in the following conference series:

Abstract

As the popularity of online social networks, the user behavior in cyber-world might probably become a mirror of the user in physical world. Therefore, understanding online user’s behavior is an interesting yet challenging task. This paper aims to analyze URLs in Sina tweets, the largest Chinese Twitter, to facilitate the understanding of the user behavior. In particular, we first provide some statistics data to show the global behavior. Then, we take a close look to users who publish similar URLs frequently to track their abnormal behaviors. By observing the contents and publishing time of these users, we classify users with commercial purposes into several types, and thus showcase some interesting cases to validate our classification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ritter, A., Mausam, Etzioni, O.: Open domain event extraction from twitter. In: Proc. of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2012), pp. 1104–1112 (2012)

    Google Scholar 

  2. Cha, M., Mislove, A., Gummadi, K.P.: A measurement-driven analysis of information propagation in the flickr social network. In: Proc. of the 18th International Conference on World Wide Web (WWW 2009), pp. 721–730 (2009)

    Google Scholar 

  3. Zhou, J., Li, Y., Adhikari, V.K., Zhang, Z.: Counting youtube videos via random prefix sampling. In: Proc. of the 11th ACM SIGCOMM Conference on Internet Measurement (IMC 2011), pp. 371–379 (2011)

    Google Scholar 

  4. Benevenuto, F., Rodrigues, T., Cha, M., Almeida, V.: Characterizing user behavior in online social networks. In: Proc. of the 9th ACM SIGCOMM Conference on Internet Measurement (IMC 2009), pp. 49–62 (2009)

    Google Scholar 

  5. Kandylas, V., Dasdan, A.: The utility of tweeted urls for web search. In: Proc. of the 20th International Conference on World Wide Web (WWW 2011), pp. 1127–1128 (2011)

    Google Scholar 

  6. Kwak, H., Lee, C., Park, H., Moon, S.: What is twitter, a social network or a news media? In: Proc. of the 19th International Conference on World Wide Web (WWW 2010), pp. 591–600 (2010)

    Google Scholar 

  7. Zubiaga, A., Spina, D., Fresno, V., Martínez, R.: Classifying trending topics: A typology of conversation triggers on twitter. In: Proc. of the 20th ACM International Conference on Information and Knowledge Management (CIKM 2011), pp. 2461–2464 (2011)

    Google Scholar 

  8. Yu, L., Asur, S., Huberman, B.A.: What trends in chinese social media. In: Proc. of the 5th SNA-KDD Workshop 2011 on Social Network Mining and Analysis, SNA-KDD 2011 (2011)

    Google Scholar 

  9. Chen, Z., Liu, P., Wang, X., Gu, Y.: Follow whom? chinese users have different choice. CoRR abs/1212.0167 (2012)

    Google Scholar 

  10. Antoniades, D., Polakis, I., Kontaxis, G.: we.b: The web of short urls. In: Proc. of the 20th International Conference on World Wide Web (WWW 2011), pp. 715–724 (2011)

    Google Scholar 

  11. Rodrigues, T., Benevenuto, F., Cha, M.: On word-of-mouth based discovery of the web. In: Proc. of the 11th ACM SIGCOMM Conference on Internet Measurement (IMC 2007), pp. 381–396 (2007)

    Google Scholar 

  12. Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: Learning to detect malicious web sites from suspicious urls. In: Proc. of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2009), pp. 1245–1254 (2009)

    Google Scholar 

  13. Chhabra, S., Aggarwal, A., Benevenuto, F., Kumaraguru, P.: Phi.sh/$ocial: The phishing landscape through short urls. In: Proc. of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference (CEAS 2011), pp. 92–101 (2011)

    Google Scholar 

  14. Cui, A., Zhang, M., Liu, Y., Ma, S.: Are the urls really popular in microblog messages? In: Proc. of the 1st IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS 2011), pp. 1–5 (2011)

    Google Scholar 

  15. Wu, X., Zhang, X.: Micro-blog in china: Identify influential users and automatically classify posts on sina micro-blog. J. Ambient Intell. Human Comput. (2012), doi:10.1007/s12652–012–0121–3

    Google Scholar 

  16. Chen, C., Wu, K., Srinivasan, V., Zhang, X.: Battling the internet wa-ter army: Detection of hidden paid posters. CoRR, vol. abs/1111.4297 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, Y., Tao, H., Cao, J., Wu, Z. (2014). Understanding User Behavior through URL Analysis in Sina Tweets. In: Huang, Z., Liu, C., He, J., Huang, G. (eds) Web Information Systems Engineering – WISE 2013 Workshops. WISE 2013. Lecture Notes in Computer Science, vol 8182. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54370-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54370-8_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54369-2

  • Online ISBN: 978-3-642-54370-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics