Computer Science ›› 2015, Vol. 42 ›› Issue (9): 66-69.doi: 10.11896/j.issn.1002-137X.2015.09.014

Previous Articles     Next Articles

Research on Field Influence of Digu Users

LI Min, XIAO Sheng, LIU Zheng-jie and ZHANG Jun   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Social media develops rapidly,which makes people pay more attention to the behaviors of influential social media users and the effects to others.Some studies dealt with the measurement of social influence of social media users.However,they usually chose global metrics,such as number of posts and number of fans,rather than other metrics that might consider varied social influences within different fields.So the measurement metrics are general and unspecific.This research chose online data of Digu users as object to study the classifications of users’ posts,and proposed the concept of field influence and the measurement method.At last,the method was verified by a sample study.The results show that it can be well used to measure users’ social influence within different fields.It was also found that the measurement metrics such as the number of fans have no positive correlation with user field influence.

Key words: Social media,Digu website,Field classification,Field influence

[1] Kwak H,Lee C,Park H,et al.What is Twitter,a social network or a news media [C]∥Proceedings of the 19th International Conference on World Wide Web(WWW’10).New York:ACM Press,2010:591-600
[2] Ye Shao-zhi,Wu Fel-ix.Measuring message propagation and social influence on twitter.com[J].Social Informatics Lecture Notes in Computer Science,2010,6430:216-231
[3] Cha M Y,Haddadi H,Benevenuto F,et al.Measuring user influe-nce in Twitter[C]∥the Milloin Follower Fallacy Proceedings of International AAAI Conference on Weblogs and Social Media(ICWSM’10).Washington,Menlo Park:The AAAI Press,2010:10-17
[4] 肖宇,许炜,商召玺.微博用户区域影响力识别算法及分析 [J].计算机科学,2012,9(9):38-42Xiao Yu,Xu Wei,Shang Zhao-xi.Analysis on Algorithms ofIdentifying Regional Influential Users in Micro-blogging [J].Computer Science,2012,39(9):38-42
[5] 王菲.一种改进的HITS算法在SNS类网站用户影响力评估系统中的应用[D].吉林:吉林大学,2012 Wang Fei.An Application of Improved Hits Algorithm in User Influence Valuation System of SNS Websites[D].Jilin:Jilin University,2012
[6] Weng Jian-shu,Lim Ee-peng,Jiang Jing,et al.TwitterRank:finding topic-sensitive influential twitterers[C]∥Proceedings of the 3rd ACM International Conference on Web Search and Data Mining(WSDM’10).New York:ACM Press,2010:261-270
[7] Cataldi M,Mittal N,Aufaure M A.Estimating Donain-basedUser Influence in Social Networks[C]∥Proceedings of SAC’13.Coimbra,Portugal,2013:1957-1962
[8] Liu Qing,Peng Geng,Wang Ping.PCA-Based evaluation system of micro-blog influence and an empirical analysis of Sina micro-blog[C]∥Conference on Web Based Business Management(WBM).Shanghai,China,2012:697-700
[9] Shuai Xin,Ding Ying,Jerome B,et al.Modeling Indirect Influe-nce on Twitter [J].International Journal on Semantic Web and Information System(IJSWIS),2013,8(4):20-36
[10] http://www.36kr.com/tag/klout
[11] http://www.leiphone.com/tag/klout
[12] http://www.tfengyun.com/
[13] http://data.weibo.com/
[14] Yan Q,Chen H,Zhang P Y,et al.Microblogging After a Major Disaster in China-a case study of the 2010 Yushu earthquake[C]∥CSCW2011.Hangzhou,China,2011:19-23

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .