Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Who Will Retweet This? Detecting Strangers from Twitter to Retweet Information

Published: 21 April 2015 Publication History

Abstract

There has been much effort on studying how social media sites, such as Twitter, help propagate information in different situations, including spreading alerts and SOS messages in an emergency. However, existing work has not addressed how to actively identify and engage the right strangers at the right time on social media to help effectively propagate intended information within a desired time frame. To address this problem, we have developed three models: (1) a feature-based model that leverages people's exhibited social behavior, including the content of their tweets and social interactions, to characterize their willingness and readiness to propagate information on Twitter via the act of retweeting; (2) a wait-time model based on a user's previous retweeting wait times to predict his or her next retweeting time when asked; and (3) a subset selection model that automatically selects a subset of people from a set of available people using probabilities predicted by the feature-based model and maximizes retweeting rate. Based on these three models, we build a recommender system that predicts the likelihood of a stranger to retweet information when asked, within a specific time window, and recommends the top-N qualified strangers to engage with. Our experiments, including live studies in the real world, demonstrate the effectiveness of our work.

References

[1]
Nitin Agarwal, Huan Liu, Lei Tang, and Philip S. Yu. 2008. Identifying the influential bloggers in a community. In WSDM.
[2]
Eytan Bakshy, Jake M. Hofman, Winter A. Mason, and Duncan J. Watts. 2011. Everyone's an influencer: Quantifying influence on Twitter. In WSDM.
[3]
Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. 2012. The role of social networks in information diffusion. In WWW.
[4]
Danah Boyd, Scott Golder, and Gilad Lotan. 2010. Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. In HICSS.
[5]
Ceren Budak, Divyakant Agrawal, and Amr El Abbadi. 2011. Limiting the spread of misinformation in social networks. In WWW.
[6]
Meeyoung Cha, Hamed Haddadi, Fabricio Benevenuto, and Krishna P. Gummadi. 2010. Measuring user influence in twitter: The million follower fallacy. In ICWSM.
[7]
Vineet Chaoji, Sayan Ranu, Rajeev Rastogi, and Rushi Bhatt. 2012. Recommendations to boost content spread in social networks. In WWW.
[8]
Nitesh V. Chawla, Kevin W. Bowyer, Lawrence O. Hall, and W. Philip Kegelmeyer. 2002. SMOTE: Synthetic minority over-sampling technique. J. Artif. Int. Res. 16, 1 (June 2002), 321--357.
[9]
Jilin Chen, Allen Cypher, Clemens Drews, and Jeffrey Nichols. 2013. CrowdE: Filtering tweets for direct customer engagements. In ICWSM.
[10]
Kailong Chen, Tianqi Chen, Guoqing Zheng, Ou Jin, Enpeng Yao, and Yong Yu. 2012. Collaborative personalized tweet recommendation. In SIGIR.
[11]
Paul T. Costa and Robert R. McCrae. 1992. Revised NEO Personality Inventory (NEO PI-R) and NEP Five-factor Inventory (NEO-FFI): Professional Manual. Psychological Assessment Resources.
[12]
Lisa A. Fast and David C. Funder. 2008. Personality as manifest in word use: Correlations with self-report, acquaintance report, and behavior. J. Personality Social Psychol. 94, 2 (2008), 334.
[13]
Tom Fawcett. 2006. An introduction to ROC analysis. Pattern Recogn. Lett. 27, 8 (June 2006), 861--874.
[14]
Wei Feng and Jianyong Wang. 2013. Retweet or not? Personalized tweet re-ranking. In WSDM.
[15]
Alastair J. Gill, Scott Nowson, and Jon Oberlander. 2009. What are they blogging about? Personality, topic and motivation in blogs. In ICWSM.
[16]
Amit Goyal, Francesco Bonchi, and Laks V. S. Lakshmanan. 2010. Learning influence probabilities in social networks. In WSDM.
[17]
Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H. Witten. 2009. The WEKA data mining software: An update. SIGKDD Explor. Newsl. 11, 1 (Nov. 2009), 10--18.
[18]
Tuan-Anh Hoang and Ee-Peng Lim. 2012. Virality and susceptibility in information diffusions. In ICWSM.
[19]
Nathan O. Hodas and Kristina Lerman. 2014. The simple rules of social contagion. Sci. Rep. 4 (2014). http://www.nature.com/srep/2014/140311/srep04343/full/srep04343.html.
[20]
Junming Huang, Xue-Qi Cheng, Hua-Wei Shen, Tao Zhou, and Xiaolong Jin. 2012. Exploring social influence via posterior effect of word-of-mouth recommendations. In WSDM.
[21]
Kyumin Lee, James Caverlee, and Steve Webb. 2010. Uncovering social spammers: Social honeypots + machine learning. In SIGIR.
[22]
Kyumin Lee, Brian David Eoff, and James Caverlee. 2011. Seven months with the devils: A long-term study of content polluters on Twitter. In ICWSM.
[23]
Kyumin Lee, Jalal Mahmud, Jilin Chen, Michelle Zhou, and Jeffrey Nichols. 2014. Who will retweet this? Automatically identifying and engaging strangers on twitter to spread information. In IUI.
[24]
Xu-Ying Liu and Zhi-Hua Zhou. 2006. The influence of class imbalance on cost-sensitive learning: An empirical study. In ICDM.
[25]
Sofus A. Macskassy and Matthew Michelson. 2011. Why do people retweet? Anti-homophily wins the day! In ICWSM.
[26]
Jalal Mahmud, Michelle X. Zhou, Nimrod Megiddo, Jeffrey Nichols, and Clemens Drews. 2013. Recommending targeted strangers from whom to solicit information on social media. In IUI.
[27]
Jeffrey Nichols and Jeon-Hyung Kang. 2012. Asking questions of targeted strangers on social networks. In CSCW.
[28]
James W. Pennebaker, Martha E. Francis, and Roger J. Booth. 2001. Linguistic Inquiry and Word Count. Lawrence Erlbaum Associates.
[29]
Daniel M. Romero, Wojciech Galuba, Sitaram Asur, and Bernardo A. Huberman. 2011. Influence and passivity in social media. In ECML/PKDD.
[30]
Claude Shannon. 1948. A mathematical theory of communication. Bell Syst. Tech. J. 27 (July, October 1948), 379--423, 623--656.
[31]
Yaron Singer. 2012. How to win friends and influence people, truthfully: Influence maximization mechanisms for social networks. In WSDM.
[32]
Kate Starbird and Leysia Palen. 2010. Pass It On? Retweeting in Mass Emergency. International Community on Information Systems for Crisis Response and Management.
[33]
Greg Ver Steeg and Aram Galstyan. 2012. Information transfer in social media. In WWW.
[34]
Jianshu Weng, Ee-Peng Lim, Jing Jiang, and Qi He. 2010. TwitterRank: Finding topic-sensitive influential twitterers. In WSDM.
[35]
Yiming Yang and Jan O. Pedersen. 1997. A comparative study on feature selection in text categorization. In ICML.
[36]
Tal Yarkoni. 2010. Personality in 100,000 words: A large-scale analysis of personality and word use among bloggers. J. Res. Personality 44, 3 (2010), 363--373.

Cited By

View all
  • (2023)Fake Twitter Followers Detection using Machine Learning Approach2023 International Conference on Business Analytics for Technology and Security (ICBATS)10.1109/ICBATS57792.2023.10111260(1-7)Online publication date: 7-Mar-2023
  • (2023)Improving Retweet Prediction via Tweet Features2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)10.1109/HORA58378.2023.10156692(1-5)Online publication date: 8-Jun-2023
  • (2023)Towards fake news refuter identification: Mixture of Chi-Merge grounded CNN approachExpert Systems with Applications10.1016/j.eswa.2023.120712231(120712)Online publication date: Nov-2023
  • Show More Cited By

Index Terms

  1. Who Will Retweet This? Detecting Strangers from Twitter to Retweet Information

    Recommendations

    Reviews

    Susan Loretta Fowler

    The authors of this paper are from Google, IBM Research, and Utah State University. These are smart folks, and the study shows it. Their premise was that one could predict, based on tweeters past behavior and how they used language, who would be most likely to retweet public service messages. These information propagators are more likely to be willing and ready (within a set time frame) to spread information on request. The authors used two tweets, one location based and the other topic based, for their experiment. The location-based public safety tweet reported a shooting in the San Francisco Bay Area, and the topic-based bird flu tweet said that bird flu was expected to evolve in nature. Both tweets were obtained from news media sites. Their retweeting system succeeded when they sent tweets to people with these characteristics: They have tweeted on the topic before. They have many followers (100 was the bottom threshold). They retweeted within a set period of time (possibly six or 12 hours, although the optimal time frame is not stated). Retweeters word usage in their own tweets tended toward inclusiveness, conscientiousness, and openness on the Big5 and Linguistic Inquiry and Word Count scales. The authors provide copious information about the statistical analyses in which they engaged, so anyone with an interest in the project should be able to reproduce the experiment. At the end of the paper, the authors state: We found that our approaches were able to at least double the retweeting rates over two baselines. With our time estimation model, our approach also outperformed other approaches significantly by achieving a much higher retweeting rate within a given time window. ... In a live setting, our approach consistently outperformed the two baselines by almost doubling their retweeting rates. Overall, our approach effectively identifies qualified candidates for retweeting a message within a given time window. Emergency management groups could really use a system like this. However, there is no uniform resource locator (URL) or other information about how to access the authors system (which was funded by the US Defense Advanced Research Projects Agency, or DARPA). Nevertheless, I suppose that any smart information technology (IT) person would be able to reproduce the system from the paper. Online Computing Reviews Service

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Intelligent Systems and Technology
    ACM Transactions on Intelligent Systems and Technology  Volume 6, Issue 3
    Survey Paper, Regular Papers and Special Section on Participatory Sensing and Crowd Intelligence
    May 2015
    319 pages
    ISSN:2157-6904
    EISSN:2157-6912
    DOI:10.1145/2764959
    • Editor:
    • Huan Liu
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 April 2015
    Accepted: 01 September 2014
    Revised: 01 August 2014
    Received: 01 March 2014
    Published in TIST Volume 6, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Twitter
    2. personality
    3. retweet
    4. social media
    5. willingness

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)32
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 25 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Fake Twitter Followers Detection using Machine Learning Approach2023 International Conference on Business Analytics for Technology and Security (ICBATS)10.1109/ICBATS57792.2023.10111260(1-7)Online publication date: 7-Mar-2023
    • (2023)Improving Retweet Prediction via Tweet Features2023 5th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)10.1109/HORA58378.2023.10156692(1-5)Online publication date: 8-Jun-2023
    • (2023)Towards fake news refuter identification: Mixture of Chi-Merge grounded CNN approachExpert Systems with Applications10.1016/j.eswa.2023.120712231(120712)Online publication date: Nov-2023
    • (2023)Understanding the Role of the User in Information Propagation on Online Social Networks: A Literature Review and Proposed User ModelProceedings of the 15th International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2023)10.1007/978-3-031-48642-5_31(304-315)Online publication date: 26-Nov-2023
    • (2022)Proactive Prioritization of App Issues via Contrastive Learning2022 IEEE International Conference on Big Data (Big Data)10.1109/BigData55660.2022.10020586(535-544)Online publication date: 17-Dec-2022
    • (2021)Effective Visibility Prediction on Online Social NetworkIEEE Transactions on Computational Social Systems10.1109/TCSS.2020.30427138:2(355-364)Online publication date: Apr-2021
    • (2021)Retweet Prediction based on Topic, Emotion and PersonalityOnline Social Networks and Media10.1016/j.osnem.2021.10016525(100165)Online publication date: Sep-2021
    • (2020)A Social Sensing Model for Event Detection and User Influence Discovering in Social Media Data StreamsIEEE Transactions on Computational Social Systems10.1109/TCSS.2019.29389547:1(141-150)Online publication date: Feb-2020
    • (2019)Information Diffusion in Social NetworksProceedings of the XV Brazilian Symposium on Information Systems10.1145/3330204.3330234(1-8)Online publication date: 20-May-2019
    • (2019)Resilience of Smart Power Grids to False Pricing Attacks in the Social NetworkIEEE Access10.1109/ACCESS.2019.29235787(80491-80505)Online publication date: 2019
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media