skip to main content
10.1145/3378936.3378973acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsimConference Proceedingsconference-collections
research-article

Automated Detection of Social Roles in Online Communities using Deep Learning

Published: 07 March 2020 Publication History

Editorial Notes

A corrigendum was issued for this paper on April 21, 2020. You can download the corrigendum from the supplemental material section of this citation page.

Abstract

Online communities are an increasingly important aspect in the digital age, for business organizations, diverse industry sectors and overall, in modern society. The social role of each end-user, influencers to followers, and content providers to receivers is a primary consideration when evaluating the purpose and contribution of any online community. Most existing research on the detection of social roles in online communities is based on manual observations and analysis. This paper introduces a technique for automating the detection and extraction of social roles from online communities. Given the large volume of text and value of content, it is no longer viable to manually encode and detect social roles and contributions. The machine learning approach is based on a deep recurrent neural network and a word embedding model. A dataset consisting of over 1.2 million textual posts extracted from an online community on higher education in Australia was used to demonstrate the technique. This technique can be applied to any online community to automatically identify social roles, their influence and interactions.

Supplementary Material

p63-wijenayake-corrigendum (p63-wijenayake-corrigendum.pdf)
Corrigendum to "Automated Detection of Social Roles in Online Communities using Deep Learning" by Wijenayake et al., Proceedings of the 3rd International Conference on Software Engineering and Information Management (ICSIM '20).

References

[1]
C. M. Ridings and D. Gefen, "Virtual community attraction: Why people hang out online," J. Comput. Commun., vol. 10, no. 1, p. JCMC10110, 2004.
[2]
L. Benamar, C. Balagué, and M. Ghassany, "The Identification and Influence of Social Roles in a Social Media Product Community," J. Comput. Commun., vol. 22, no. 6, pp. 337--362, 2017.
[3]
I. Jahnke, "Dynamics of social roles in a knowledge management community," Comput. Human Behav., vol. 26, no. 4, pp. 533--546, 2010.
[4]
I. Himelboim, E. Gleave, and M. Smith, "Discussion catalysts in online political discussions: Content importers and conversation starters," J. Comput. Commun., vol. 14, no. 4, pp. 771--789, 2009.
[5]
K. de Valck, G. H. van Bruggen, and B. Wierenga, "Virtual communities: A marketing perspective," Decis. Support Syst., vol. 47, no. 3, pp. 185--203, 2009.
[6]
E. Mooi and M. Sarstedt, "A Concise Guide to Market Research The Process, Data, and Methods Using IBM SPSS Statistics. 2011." Berlin: Springer.
[7]
C. N. Gunawardena, C. A. Lowe, and T. Anderson, "Analysis of a global online debate and the development of an interaction analysis model for examining social construction of knowledge in computer conferencing," J. Educ. Comput. Res., vol. 17, no. 4, pp. 397--431, 1997.
[8]
F. Ouyang and Y. H. Chang, "The relationships between social participatory roles and cognitive engagement levels in online discussions," Br. J. Educ. Technol., vol. 50, no. 3, pp. 1396--1414, 2019.
[9]
T. F. Gieryn, Cultural boundaries of science: Credibility on the line. University of Chicago Press, 1999.
[10]
C. A. Bail, "The cultural environment: Measuring culture with big data," Theory Soc., vol. 43, no. 3, pp. 465--524, 2014.
[11]
J. Füller, K. Hutter, J. Hautz, and K. Matzler, "User Roles and Contributions in Innovation-Contest Communities," J. Manag. Inf. Syst., vol. 31, no. 1, pp. 273--308, 2014.
[12]
S. L. Johnson, H. Safadi, and S. Faraj, "The emergence of online community leadership," Inf. Syst. Res., vol. 26, no. 1, pp. 165--187, 2015.
[13]
H. T. Welser, E. Gleave, D. Fisher, and M. Smith, "Visualizing the signatures of social roles in online discussion groups," J. Soc. Struct., vol. 8, no. 2, pp. 1--21, 2006.
[14]
J. Xu, B. Marshall, S. Kaza, and H. Chen, "Analyzing and Visualizing Criminal Network Dynamics: A Case Study," in Intelligence and Security Informatics, 2004, pp. 359--377.
[15]
D. Fisher, M. Smith, and H. T. Welser, "You Are Who You Talk To: Detecting Roles in Usenet Newsgroups," in Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006, vol. 3, pp. 59b--59b.
[16]
J. A. Evans and P. Aceves, "Machine Translation: Mining Text for Social Theory," Ssrn, 2016.
[17]
K. Riemer, J. Finke, and D. Hovorka, "Bridging or bonding: do individuals gain social capital from participation in enterprise social networks?," 2015.
[18]
P. Bhattacharya, T. Q. Phan, X. Bai, and E. Airoldi, "Investigating the impact of network effects on content generation: Evidence from a large online student network," arXiv Prepr. arXiv1512.06469, 2015.
[19]
E. Whelan, R. Teigland, E. Vaast, and B. Butler, "Expanding the horizons of digital social networks: Mixing big trace datasets with qualitative approaches," Inf. Organ., vol. 26, no. 1--2, pp. 1--12, 2016.
[20]
C. K. Nicholas and A. S. Lee, "Voice of Customers: Text Analysis of Hotel Customer Reviews (Cleanliness, Overall Environment & Value for," pp. 104--111, 2017.
[21]
Y. LeCun, Y. Bengio, and G. Hinton, "Deep learning," Nature, vol. 521, no. 7553, p. 436, 2015.
[22]
A. Graves, A. Mohamed, and G. Hinton, "Speech recognition with deep recurrent neural networks," in Acoustics, speech and signal processing (icassp), 2013 ieee international conference on, 2013, pp. 6645--6649.
[23]
J. Schmidhuber, "Deep learning in neural networks: An overview," Neural networks, vol. 61, pp. 85--117, 2015.
[24]
J. H. Kietzmann, K. Hermkens, I. P. McCarthy, and B. S. Silvestre, "Social media? Get serious! Understanding the functional building blocks of social media," Bus. Horiz., vol. 54, no. 3, pp. 241--251, 2011.
[25]
J. H. Kietzmann, B. S. Silvestre, I. P. McCarthy, and L. F. Pitt, "Unpacking the social media phenomenon: towards a research agenda," J. Public Aff., vol. 12, no. 2, pp. 109--119, 2012.
[26]
M. Khanna, I. Jacob, and N. Yadav, "Identifying and analyzing touchpoints for building a higher education brand," J. Mark. High. Educ., vol. 24, no. 1, pp. 122--143, 2014.
[27]
A. Duesterhaus and M. Duesterhaus, "Attributes of successful university brands in the USA," J. Brand Strateg., vol. 3, no. 2, pp. 169--183, 2014.
[28]
N. K. Baym, "The Emergence of On-Line Community," Cybersociety 2.0 Revisiting Comput. Commun. Community, no. May 2019, pp. 35--68, 2012.
[29]
T. Turner, M. Smith, F. Fisher, and H. Welser, "T.(2005)," Picturing Usenet: mapping computermediated collective action," J. Comput. Commun., vol. 10, no. 4, p. 0.
[30]
A. P. Bradley, "The use of the area under the ROC curve in the evaluation of machine learning algorithms," Pattern Recognit., vol. 30, no. 7, pp. 1145--1159, 1997.

Cited By

View all
  • (2025)Role Identification Based Method for Cyberbullying Analysis in Social Edge ComputingTsinghua Science and Technology10.26599/TST.2024.901006630:4(1659-1684)Online publication date: Aug-2025
  • (2024)The Effect of Individual Traits on Emerging Roles in Synchronous Computer-Mediated GroupsProceedings of the ACM on Human-Computer Interaction10.1145/36410208:CSCW1(1-22)Online publication date: 26-Apr-2024
  • (2024)Theory-Guided Multiclass Text Classification in Online Academic DiscussionsJournal of Computer Information Systems10.1080/08874417.2024.2371435(1-12)Online publication date: 2-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICSIM '20: Proceedings of the 3rd International Conference on Software Engineering and Information Management
January 2020
258 pages
ISBN:9781450376907
DOI:10.1145/3378936
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • University of Science and Technology of China: University of Science and Technology of China

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 March 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Neural Networks
  2. Online Social roles
  3. automation
  4. big data
  5. deep learning
  6. honeycomb framework
  7. machine learning
  8. online communities
  9. social media analytics
  10. word embedding

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICSIM '20

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)23
  • Downloads (Last 6 weeks)5
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Role Identification Based Method for Cyberbullying Analysis in Social Edge ComputingTsinghua Science and Technology10.26599/TST.2024.901006630:4(1659-1684)Online publication date: Aug-2025
  • (2024)The Effect of Individual Traits on Emerging Roles in Synchronous Computer-Mediated GroupsProceedings of the ACM on Human-Computer Interaction10.1145/36410208:CSCW1(1-22)Online publication date: 26-Apr-2024
  • (2024)Theory-Guided Multiclass Text Classification in Online Academic DiscussionsJournal of Computer Information Systems10.1080/08874417.2024.2371435(1-12)Online publication date: 2-Jul-2024
  • (2024)AI Within Online Discussions: Rational, Civil, Privileged?Minds and Machines10.1007/s11023-024-09658-034:2Online publication date: 4-May-2024
  • (2023)Synthesis of Datasets for Neural Networks Based on Expert KnowledgeCyber-Physical Systems and Control II10.1007/978-3-031-20875-1_50(535-544)Online publication date: 21-Jan-2023
  • (2022)Creating and Using Synthetic Data for Neural Network Training, Using the Creation of a Neural Network Classifier of Online Social Network User Roles as an ExampleDigital Science10.1007/978-3-030-93677-8_36(412-421)Online publication date: 17-Jan-2022
  • (2021)Social network analysis using deep learning: applications and schemesSocial Network Analysis and Mining10.1007/s13278-021-00799-z11:1Online publication date: 25-Oct-2021
  • (2021)Modelling the Structure of Protest Movement Advocacy in Social Media Using Graph and Neural Network AnalysisScience and Global Challenges of the 21st Century - Science and Technology10.1007/978-3-030-89477-1_1(3-15)Online publication date: 14-Oct-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media