skip to main content
10.1145/3336191.3371865acmconferencesArticle/Chapter ViewAbstractPublication PageswsdmConference Proceedingsconference-collections
research-article

personality2vec: Enabling the Analysis of Behavioral Disorders in Social Networks

Published: 22 January 2020 Publication History

Abstract

Enabling the analysis of behavioral disorders over time in social networks, can help in suicide prevention, (school) bullying detection and extremist/criminal activity prediction. In this paper, we present a novel data analytics pipeline to enable the analysis of patterns of behavioral disorders on social networks. We present a Social Behavior Graph (sbGraph) model, to enable the analysis of factors that are driving behavior disorders over time. We use the golden standards in personality, behavior and attitude to build a domain specific Knowledge Base (KB). We use this domain knowledge to design cognitive services to automatically contextualize the raw social data and to prepare them for behavioral analytics. Then we introduce a pattern-based word embedding technique, namely personality2vec, on each feature extracted to build the sbGraph. The goal is to use mathematical embedding from a space with a dimension per feature to a continuous vector space which can be mapped to classes of behavioral disorders (such as cyber-bullying and radicalization) in the domain specific KB. We implement an interactive dashboard to enable social network analysts to analyze and understand the patterns of behavioral disorders over time. We focus on a motivating scenario in Australian government's office of the e-Safety commissioner, where the goal is to empowering all citizens to have safer, more positive experiences online.

References

[1]
Jamie Bartlett and Carl Miller. 2012. The edge of violence: Towards telling the difference between violent and non-violent radicalization. Terrorism and Political Violence, Vol. 24, 1 (2012), 1--21.
[2]
Amin Beheshti, Boualem Benatallah, Reza Nouri, Van Munin Chhieng, HuangTao Xiong, and Xu Zhao. 2017. CoreDB: a Data Lake Service. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, CIKM 2017, Singapore, November 06 - 10, 2017. 2451--2454.
[3]
Amin Beheshti, Boualem Benatallah, Reza Nouri, and Alireza Tabebordbar. 2018a. CoreKG: a Knowledge Lake Service. PVLDB, Vol. 11, 12 (2018), 1942--1945.
[4]
Amin Beheshti, Boualem Benatallah, Alireza Tabebordbar, Hamid Reza Motahari-Nezhad, Moshe Chai Barukh, and Reza Nouri. 2018b. DataSynapse: A Social Data Curation Foundry. Distributed and Parallel Databases (2018), 1--34.
[5]
Seyed-Mehdi-Reza Beheshti, Boualem Benatallah, and Hamid Reza Motahari-Nezhad. 2016. Scalable graph-based OLAP analytics over process execution data. Distributed and Parallel Databases, Vol. 34, 3 (2016), 379--423.
[6]
Tanya Beran and Qing Li. 2005. Cyber-harassment: A study of a new method for an old behavior. Journal of educational computing research, Vol. 32, 3 (2005), 265.
[7]
Adam Bermingham, Maura Conway, Lisa McInerney, Neil O'Hare, and Alan F Smeaton. 2009. Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In ASONAM. IEEE.
[8]
Mohammad Hammoud, Dania Abed Rabbou, Reza Nouri, Seyed-Mehdi-Reza Beheshti, and Sherif Sakr. 2015. DREAM: Distributed RDF Engine with Adaptive Query Planner and Minimal Communication. PVLDB, Vol. 8, 6 (2015), 654--665.
[9]
Sameer Hinduja and Justin W Patchin. 2010. Bullying, cyberbullying, and suicide. Archives of suicide research, Vol. 14, 3 (2010), 206--221.
[10]
https://www.kaggle.com/fifthtribe/how-isis-uses twitter/home. [n.d.]. How ISIS Uses Twitter.
[11]
Arie W Kruglanski, Michele J Gelfand, Jocelyn J Bélanger, Anna Sheveland, Malkanthi Hetiarachchi, and Rohan Gunaratna. 2014. The psychology of radicalization and deradicalization: How significance quest impacts violent extremism. Political Psychology, Vol. 35, S1 (2014).
[12]
James W Pennebaker, Martha E Francis, and Roger J Booth. 2001. Linguistic inquiry and word count: LIWC 2001. Mahway: Lawrence Erlbaum Associates, Vol. 71, 2001 (2001), 2001.
[13]
Roy Schwartz, Roi Reichart, and Ari Rappoport. 2015. Symmetric pattern based word embeddings for improved word similarity prediction. In Proceedings of the nineteenth conference on computational natural language learning. 258--267.
[14]
Alireza Tabebordbar, Amin Beheshti, and Boualem Benatallah. 2019. ConceptMap: A Conceptual Approach for Formulating User Preferences in Large Information Spaces. In Web Information Systems Engineering - WISE 2019 - 20th International Conference, Hong Kong, China, November 26--30, 2019, Proceedings. 779--794.

Cited By

View all
  • (2024)Discovering Synergies: Exploring Cognitive Techniques for Cross-Domain Recommendation System2024 Second International Conference on Advances in Information Technology (ICAIT)10.1109/ICAIT61638.2024.10690362(1-9)Online publication date: 24-Jul-2024
  • (2024)Explainable depression symptom detection in social mediaHealth Information Science and Systems10.1007/s13755-024-00303-912:1Online publication date: 6-Sep-2024
  • (2024)Unraveling minds in the digital era: a review on mapping mental health disorders through machine learning techniques using online social mediaSocial Network Analysis and Mining10.1007/s13278-024-01205-014:1Online publication date: 4-Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WSDM '20: Proceedings of the 13th International Conference on Web Search and Data Mining
January 2020
950 pages
ISBN:9781450368223
DOI:10.1145/3336191
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 January 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. behavioural analytics
  2. cognitive analytics
  3. deep learning

Qualifiers

  • Research-article

Funding Sources

  • AI-enabled Processes (AIP) Research Centre at Macquarie University

Conference

WSDM '20

Acceptance Rates

Overall Acceptance Rate 498 of 2,863 submissions, 17%

Upcoming Conference

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)23
  • Downloads (Last 6 weeks)2
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Discovering Synergies: Exploring Cognitive Techniques for Cross-Domain Recommendation System2024 Second International Conference on Advances in Information Technology (ICAIT)10.1109/ICAIT61638.2024.10690362(1-9)Online publication date: 24-Jul-2024
  • (2024)Explainable depression symptom detection in social mediaHealth Information Science and Systems10.1007/s13755-024-00303-912:1Online publication date: 6-Sep-2024
  • (2024)Unraveling minds in the digital era: a review on mapping mental health disorders through machine learning techniques using online social mediaSocial Network Analysis and Mining10.1007/s13278-024-01205-014:1Online publication date: 4-Apr-2024
  • (2024)The Outcome of Social Media User Behavior on Safety and Secrecy PressuresData Engineering and Applications10.1007/978-981-97-2451-2_24(361-374)Online publication date: 31-Aug-2024
  • (2024)Understanding Big Data in NeurosurgeryComputational Neurosurgery10.1007/978-3-031-64892-2_10(157-175)Online publication date: 11-Nov-2024
  • (2024)Emotional Insights for Food RecommendationsAdvances in Information Retrieval10.1007/978-3-031-56060-6_16(238-253)Online publication date: 16-Mar-2024
  • (2023)The Security Awareness of Social Media Users2023 IEEE 8th International Conference on Recent Advances and Innovations in Engineering (ICRAIE)10.1109/ICRAIE59459.2023.10468199(1-5)Online publication date: 2-Dec-2023
  • (2023)A Contextualized Transformer-Based Method for Cyberbullying Detection2023 IEEE 10th International Conference on Data Science and Advanced Analytics (DSAA)10.1109/DSAA60987.2023.10302478(1-10)Online publication date: 9-Oct-2023
  • (2023)Approach Based on Bayesian Network and Ontology for Identifying Factors Impacting the States of People with Psychological Problems from Data on Social MediaModel and Data Engineering10.1007/978-3-031-49333-1_10(128-141)Online publication date: 22-Dec-2023
  • (2022)Making Sense of Language Signals for Monitoring RadicalizationApplied Sciences10.3390/app1217841312:17(8413)Online publication date: 23-Aug-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media