Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Information Systems (H) > Information Storage And Retrieval (H.3) > Systems And Software (H.3.4) > Social Networking (H.3.4...)  
  1-10 of 104 Reviews about "Social Networking (H.3.4...)": Date Reviewed
  Inferring directions of undirected social ties
Zhang J., Wang C., Wang J., Yu J., Chen J., Wang C.  IEEE Transactions on Knowledge and Data Engineering 28(12): 3276-3292, 2016. Type: Article

With the advent of social networks, there are many opportunities available for researchers to research and analyze social ties. This is especially true with social networking sites like LinkedIn. In this paper, the authors aim to analyze the direc...

Apr 26 2017
  Fraud analytics using descriptive, predictive, and social network techniques: a guide to data science for fraud detection
Baesens B., Van Vlasselaer V., Verbeke W.,  Wiley Publishing, Hoboken, NJ, 2015. 400 pp. Type: Book (978-1-119133-12-4)

The general scope of fraud analytics comprises a set of both conceptual approaches and appropriate tools for detecting certain anomalies in processes that can be associated with fraud. Fraud can occur in several business domains, spanning from ban...

Mar 15 2017
  Retrieving the maximal time-bounded positive influence set from social networks
Shi T., Cheng S., Cai Z., Li Y., Li J.  Personal and Ubiquitous Computing 20(5): 717-730, 2016. Type: Article

The spread of information about products, ideas, and behaviors, and their adoption, is an important tool in viral marketing and communication strategies in politics. Shi et al. assume that social networks play a unique role in this process, and th...

Nov 15 2016
  A trust evaluation scheme for complex links in a social network: a link strength perspective
Li M., Xiang Y., Zhang B., Huang Z., Zhang J.  Applied Intelligence 44(4): 969-987, 2016. Type: Article

As links among users are the channel for interchanging information inside social networks, trust is a widely accepted indicator or parameter to discover and analyze potential security threats. This work proposes a trust evaluation schema for socia...

Nov 10 2016
  Characteristics of social media stories
AlNoamany Y., Weigle M., Nelson M.  International Journal on Digital Libraries 17(3): 239-256, 2016. Type: Article

Through its portrayal of social media in an archival review, this paper attempts to decipher “what makes a story good.” In order to do this, the paper identifies popular “human-generated” posts. The concept that a timeline ...

Nov 9 2016
  Beyond smartphone overuse: identifying addictive mobile apps
Ding X., Xu J., Chen G., Xu C.  CHI EA 2016 (Proceedings of the 2016 CHI Conference Extended Abstracts, Santa Clara, CA,  May 7-12, 2016) 2821-2828, 2016. Type: Proceedings

More and more, research on Internet addiction applies not only to games or time spent on the network, but also to smartphone addiction. The main aim of the analysis reported in the paper is the relation between mobile apps and proneness to smartph...

Oct 6 2016
  Tweet properly: analyzing deleted tweets to understand and identify regrettable ones
Zhou L., Wang W., Chen K.  WWW 2016 (Proceedings of the 25th International World Wide Web Conference, Montréal, Québec, Canada,  Apr 11-15, 2016) 603-612, 2016. Type: Proceedings

Whoever thought that a 140-character method of social media communication would warrant so much academic attention? Its use in my classroom was brought about by a desire to have students at the leading edge of all types of information technology f...

Sep 8 2016
  Connecting social media to e-commerce: cold-start product recommendation using microblogging information
Zhao W., Li S., He Y., Chang E., Wen J., Li X.  IEEE Transactions on Knowledge and Data Engineering 28(5): 1147-1159, 2016. Type: Article

Zhao et al. introduce a product recommendation model for social media users who have never shopped online before. The most important premise for a successful product recommendation is that the user has bought something before and has shown interes...

Sep 6 2016
  Towards information diffusion in mobile social networks
Lu Z., Wen Y., Zhang W., Zheng Q., Cao G.  IEEE Transactions on Mobile Computing 15(5): 1292-1304, 2016. Type: Article

A thorough technical account, this paper addresses an important emerging opportunity in mobile social networks: viral marketing....

Sep 6 2016
  Social media for government services
Nepal S., Paris C., Georgakopoulos D.,  Springer International Publishing, New York, NY, 2015. 409 pp. Type: Book (978-3-319272-35-1)

Since social media reaches billions of people, governments must take heed of citizens’ opinions expressed therein. However, this is easier said than done. Political leaders used to make decisions through a long series of polls and discussion...

Sep 1 2016
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy