Users of Social Media

Top PDF Users of Social Media:

Relations among Need for Approval, Loneliness and Personality Traits of Adult Social Media Users

Relations among Need for Approval, Loneliness and Personality Traits of Adult Social Media Users

Abstract:- Social media is an application area which gives opportunity people to share their information, ideas, perspectives and experiences. Need for approval, level of loneliness and personal traits, which are thought to be effective on the frequency of the usage of social media were investigated. Research held with 150 participants who live in Turkish Republic of North Cyprus, over the age of 18 and are users of social media. First part of the survey form consisted of the questions about sociodemographic information of, which social media sites are used by and how frequently they are used by participants. This part was prepared by the researcher. Second part of the survey form consisted Five Factor Personality Inventory (FFPI) in order to evaluate the personality traits. Third part included Dysfunctional Attitude Scale’s (DAS) subscale which is Need for Approval in order to measure the level of need for approval. Finally, in the fourth part UCLA Loneliness Scale (UCLA-LS) took place to investigate the level of loneliness. In research, it was found that need for approval and loneliness levels of people have not effects on social media usage. Conscientiousness, which is one of the personality traits, was founded as negatively correlated with usage. People who had high scores on conscientiousness used social media less. It was also identified that age and marital status had effects on the frequency of social media usage.
Show more

9 Read more

Knock Of Advertisement In Digital Social Interaction: Informative Or Intrusion For Social Media Users

Knock Of Advertisement In Digital Social Interaction: Informative Or Intrusion For Social Media Users

Abstract: Social media is a platform for social interaction but marketers as a third party entered into the scene and there were knock of advertisements in digital social interaction. The study aimed to know whether social media advertisements are informational or intrusion for users and to know their perception about social media advertisements. To meet the objectives literature had been studied and data c ollected from primary sources through a questionnaire. The collected data had been analysed using MS Excel and IBM SPSS Statistics 20. The study found that users perceive social media advertisements as informational and not an intrusion, and they prefer to watch advertisements on social media platforms that offer entertainment and practical use of content to users.
Show more

5 Read more

Ranking Radically Influential Web Forum users on Social Media

Ranking Radically Influential Web Forum users on Social Media

Social media is a form of internet marketing that utilizes social networking websites as a marketing tool. The goal of social networking is to produce content that users will share with their social network help a company increase brand exposure and broaden customer reach. In the recent past, it has been found that the web is also being used as a tool by radical or extremist groups and users to practice several kinds of mischievous acts with concealed agendas and promote ideologies in a sophisticated manner. Some of the web forums are predominantly being used for open discussions on critical issues influenced by radical thoughts. The influential users dominate and influence the newly joined innocent users through their radical thoughts. The radical of a user is captured by a measure based on the degree of match of the commented posts with a threat list. Eleven different collocation metrics are formulated to identify the association among users, and they are finally embedded in a customized Page Rank algorithm to generate a ranked list of radically influential users. Social media is very popular for different kind of activities. In this system web forum users contain for complete analysis of forums for manipulating the information post by users in forum. User of such forum talk about the violence data through their post, there are numbers of website are also available that are spreading such data. The reality is that system not successfully defined violence present
Show more

6 Read more

Vaccinating Users against the Hypodermic Needle Theory of Social Media: Libraries and Improving Media Literacy

Vaccinating Users against the Hypodermic Needle Theory of Social Media: Libraries and Improving Media Literacy

We will now discuss the relationship between the hypodermic needle theory in the field of information science and technology and the critical theory approach. The critical theory approach shows the hidden power of communication and its dominant patterns in the society (Fisher, et al., 1999, p.26). Specifically, the speaker (either the librarian in the library or computer in social media) has to first guarantee the presented offer which includes truth, reality, friendship, and normative law, except is cases that the speaker tries to control the output intentionally to influence the interpreter (ibid, p. 127). With this assumption and considering the application of the hypodermic needle theory in the field of information science and technology, it can be stated that the librarian can present the dominant patterns within the society and support creative masterpieces. Raymond Irwin shows this process in the relationship between librarianship and literature (Mukherjee,1996, p.29). He believes that the relationship between these two is difficult to identify, despite the fact that librarianship is responsible for maintaining the public’s interest in literature. Books become famous through libraries and sales. The use of evaluation standards of a book is done before buying it. In such cases the librarians reject low quality books although they are popular. This indirectly affects literature to maintain its standards. In the long term, such policies support and encourage creative literary masterpieces. Besides using the hypodermic needle theory for attaining goals, libraries and information centers can enhance the usersmedia knowledge and vaccinate them against the negative effects of social media.
Show more

8 Read more

Detecting social media users based on pedestrian networks and neighborhood attributes: an observational study

Detecting social media users based on pedestrian networks and neighborhood attributes: an observational study

Second, it makes sense to detect social media users in areas showing low ICTs values. Mobile information technologies are precisely designed for that purpose: to be used, for example, in places where it is not possible to have access to the information technol- ogy that is available at home, or when a user moves through the city. In other words, we believe that there is a situational user behavior. On the one hand, when users are at home, they can use non-mobile communication technologies, but when they leaves home they starts using mobile technologies and social media services such as Twitter. In this way, users are detected when they are physically distant from other types of non-mobile com- munication technologies usually found at home. On the other hand, in the case of people who support a protest, the use of Twitter has the purpose of creating and disseminat- ing content about the user’s participation in a given place and time, which is related to a target–driven user behavior. That is to say, the coordinated social media events seems to reduce randomness in the movements and social media usage of individuals, which increases their detectability. This would be a reasonable theoretical conjecture, but very difficult –or even inappropriate– to prove by using separately social media, census, or network data, or by studying user behavior under an experimental or quasi-experimental design.
Show more

24 Read more

Data Protection Guidelines for Protecting Privacy of Users on Social Media

Data Protection Guidelines for Protecting Privacy of Users on Social Media

When users put their information on the social media websites, they feel that only users they have approved – (friends on Facebook, followers on twitter, Instagram) can have access to their information, but there is someone else they forget to factor in - The OSN itself. The OSN has information about all the users and all their actions. The main reason people don‟t consider data in the hands of OSN as insecure is because they are not aware. Users of OSN do not know that the OSN has the right to use their data for advertisements and showing them “relevant content” among other things.
Show more

6 Read more

Using Conceptual Class Attributes to Characterize Social Media Users

Using Conceptual Class Attributes to Characterize Social Media Users

We describe a novel approach for automat- ically predicting the hidden demographic properties of social media users. Building on prior work in common-sense knowl- edge acquisition from third-person text, we first learn the distinguishing attributes of certain classes of people. For exam- ple, we learn that people in the Female class tend to have maiden names and en- gagement rings. We then show that this knowledge can be used in the analysis of first-person communication; knowledge of distinguishing attributes allows us to both classify users and to bootstrap new train- ing examples. Our novel approach enables substantial improvements on the widely- studied task of user gender prediction, ob- taining a 20% relative error reduction over the current state-of-the-art.
Show more

11 Read more

Profile Matching Of Anonymous Users in Multiple Social Media Networks

Profile Matching Of Anonymous Users in Multiple Social Media Networks

media application for different purpose. Facebook, is a for-profit corporation and most popular social media application in the world, has more than 1.7 billion users. Twitter is an online social networking service that enables users to send and read short 140-character messages called "tweets". At the second half of 2016 the number of registered users was more than 313 million users. Registered users can read and post tweets, but those who are unregistered can only read them. Instagarm is a mobile photo sharing network which has reached 500 million of active users in the month of September 2015.
Show more

6 Read more

A Pedagogical Evaluation of Knowledge Acquisition by Social Media Users

A Pedagogical Evaluation of Knowledge Acquisition by Social Media Users

transformed elements of human social experience. We all feel connected and enthralled to interact socially using Twitter, Facebook, and Instagram etc. Therefore, in the words of William Shakespeare the world a stage and men and women all are players happens to be more accurate in context of social media. One of the drawbacks of this theory is however that it is sometimes considered complex in contextual interpretation of social observation behavior, therefore, changes in the environment do not signify changes in behavior as well. Likewise, biological and hormonal outlooks are also not considered. There has been an enormous increase in the explosive presence, access and usage of social media [2]. It would be fair to say that with the emergence of internet, scope of collaboration and interaction among users has touched new pinnacles of interdependence, for social and emotional reasons [3]. The digital world continues to escalate and deploys unlimited resources for connecting people virtually. The uses can now easily see and relate to each other’s world across, previously defined within geographical boundaries; one to one across time and space. With social media, comes connectivity, and with that comes plethora of data, information and knowledge. For example, according to a report published in Global Web Index, that collected primary data from 89,029 people aged 16-40 countries across 40 countries, the average person now has 7.6 active social media accounts, with 98% of people having at least one social network account. Sharing web-links and pictures have always been the most popular usage of internet. However, social networks have motivated users to generate customized online content and share at the same time worldwide with different platforms, which earlier was restricted to only through email. It is estimated that on average, a social
Show more

8 Read more

Monitoring Unusual/Abnormal Behavior of Social Media Users

Monitoring Unusual/Abnormal Behavior of Social Media Users

Abstract: Terrorists are using the online environment to prey on the young and vulnerable. Nowadays a lot of terrorist activities are initiated through social media. A study says that these groups not only use social media for communication but are recruiting vulnerable youths into their groups. How can such activities be prevented? How such activities can be identified and eliminated at root level? In order to overcome these kinds of threats, this project deals about development of a monitoring system, this monitors the unusual behavior of users by comparing the dynamic data with the behavior datasets and process the information using natural language processing.
Show more

9 Read more

Exploiting Text and Network Context for Geolocation of Social Media Users

Exploiting Text and Network Context for Geolocation of Social Media Users

Research on automatically geolocating social media users has conventionally been based on the text content of posts from a given user or the social network of the user, with very lit- tle crossover between the two, and no bench- marking of the two approaches over compara- ble datasets. We bring the two threads of re- search together in first proposing a text-based method based on adaptive grids, followed by a hybrid network- and text-based method. Eval- uating over three Twitter datasets, we show that the empirical difference between text- and network-based methods is not great, and that hybridisation of the two is superior to the component methods, especially in contexts where the user graph is not well connected. We achieve state-of-the-art results on all three datasets.
Show more

6 Read more

Recommending access control decisions to social media users

Recommending access control decisions to social media users

Controlling access to one's information on social media sites is an essential task for users in order to preserve their privacy. However, it has been found that privacy con- trols afforded to social media users have been found to be burdensome and they have been found to struggle in appropriately configuring access controls while disclosing their information [WKR14]. Therefore, it is imperative to improve existing access control mechanisms and assist users in making appropriate access control decisions and preserve the ``contextual integrity"" of their content to safeguard their privacy [LHL + 09]. A ma- jor drawback of existing access control mechanisms in social media sites is the lack of support for interpersonal relationships [MS16]. The interpersonal relationships between users are often an integral component of the access control decisions making process followed by users and failure to adequately accommodate this aspect diminishes the utility of any such mechanism [FSEGF15, LLLT11]. This has led to the development of Relationship based Access Control (ReBAC) mechanisms which rely on information residing in the social network, either in the profiles created by users or in their commu- nication (messages, posts, etc.) with other users, to define the nature and strength of interpersonal relationships [FSEGF15]. There have been proposed approaches to assist users by using relationship based attributes to predict access control decisions made by them [AFW12, ML12, FL10]. In this way, the user is not burdened with the entire responsibility of making access control decisions and can rely on the recommendations made by the mechanism [AFW12]. A major drawback of employing such ReBAC systems, however, is that they typically employ large sets of attributes to define the relationships, which can help users better identify the social context of their disclosures, but can diminish usability due to challenges such as computational overhead of gathering and processing the required information. Previous ReBAC approaches have failed to provide a systematic evaluation of the relevant information required to represent social relationships between social media users which leaves a gap in terms of identifying the most suitable representation of relationships in an access control recommendation mechanism.
Show more

148 Read more

REACT:REcommending Access Control decisions To social media users

REACT:REcommending Access Control decisions To social media users

Social media users interact with vast network of people representing various facets of their life such as work, family, education, etc. In such a scenario, it is essential for them to make informed access control decisions to preserve the “contextual integrity” of their information. Any user who discloses information on social media has a notion of the “intended recipients” and the context in which they would view that information and hence preservation of “contextual integrity” is essential in order to avoid a privacy breach [1]. Unfortunately, social media users have been found to be less than capable of accurately reasoning about the ac- tual recipients of their content and even when they do, they struggle to appropriately control who can access their content on such platforms [2]. The inability of users to make appropriate access control decisions often results in “unintended disclosure” of information [3]. When users are aware of their audience, and are provided with finer grained access controls, they tend to be much more selective in granting access to their information [4]. Mainstream social media sites such as Facebook and Google+ have made an effort to assist users in managing their friend networks by providing them with “Lists” and “Circles” [4] respectively. However, recent research findings suggest that hardly any users employ these features when making access control decisions, arguably due to the effort this requires from them [5]. There have also been some efforts to improve visualization to enhance comprehension of access control policies among users [6] but even with these approaches, the burden of appropriately configuring access controls remains on the user. This burden can possibly be alleviated by
Show more

6 Read more

How Do Social Media Users in Turkey Differ in Terms of Their Use Habits and Preferences?

How Do Social Media Users in Turkey Differ in Terms of Their Use Habits and Preferences?

International Journal of Business and Information Direct mailing was done via a panel of nearly 20,000 participants. Twitter users who have relatively higher numbers of followers were asked, especially, to share the survey link in order to reach a larger sample size. Those link-sharing activities took place during daytime when the platform was used by Turkish social media users more often and intensely. The social platforms, such as online forums and other social networks like Facebook and LinkedIn (both personal accounts and groups), were also used to share the survey link and collect the data. Approximately 2,000 Internet and/or social media users accepted the research request and clicked on the survey link. Many were eliminated because of inappropriate or biased answers or because they did not complete the survey within the given time frame. This left a total sample of 557 users. Of those, we eliminated 27 who acknowledged that they use the Internet but do not use or join any social media platforms. The final sample of valid responses totaled 530, comprising responses from all around the country. The socio-demographic profile of the respondents is presented in Table 1, and a description of their Internet and social media habits is presented in Table 2.
Show more

28 Read more

Learning Invariant Representations of Social Media Users

Learning Invariant Representations of Social Media Users

The most closely related work is author identi- fication on social media. However, previous work in this area has largely focused on distinguish- ing among small, closed sets of authors rather than the open-world setting of this paper (Mikros and Perifanos, 2013; Ge et al., 2016). For ex- ample, Schwartz et al. (2013) consider the prob- lem of assigning single tweets to one of a closed set of 1000 authors. Overdorf and Greenstadt (2016) consider the problem of cross-domain au- thorship attribution and consider 100 users active on multiple platforms. In a different direction, Sari et al. (2018) seek to identify stylistic features contributing to successful author identification and consider a closed set of 62 authors. In contrast, the present work is concerned with problems in- volving several orders of magnitude more authors. This scale precludes methods where similarity be- tween examples is expensive to compute, such as the method of Koppel and Winter (2014).
Show more

12 Read more

WHO BONDS ON SOCIAL MEDIA? THE CORRELATION OF USERS’ PERSONALITY AND SOCIAL MEDIA USE

WHO BONDS ON SOCIAL MEDIA? THE CORRELATION OF USERS’ PERSONALITY AND SOCIAL MEDIA USE

People have different personalities and it is important to study what types of people depend on these social media tools to interact with others. Previous studies have established three personality traits that central to social media use: extraversion, neuroticism & openness to experience (Correa,et al,2010;Ross et al,2009).Ryan &Xenos (2011) found, significant higher levels of self reported Extraversion in FB users compare to non users. Empirical studies have found that conscientiousness is negatively related to time spent on SNS (Ryan & Xenos, 2011).According to Ross eta al., (2009) agreeableness is related neither to overall internet use nor to any form of social media use.
Show more

7 Read more

A Survey On Ranking Radically Influential Web Forum Users On Social Media

A Survey On Ranking Radically Influential Web Forum Users On Social Media

Matthew Richardson and Pedro Domingos in year 2012 [3]works on different way of marketing and social network sites by mining knowledge sharing. In a market, try to sell the product viral marketing uses the customers. This public advertising is more cost effective than previous methods. Use of internet is more popular from the past few years. Because of social media people are interacting with each other, this interaction is saved in archives. On knowledge sharing sites social interaction is in variety of forms. One is some form of explicit trust between users. The limitations of this system are multiple sources of related information will be available but this system extracts a network from a single source. This system introduces a marketing plan when the structure of network is unknown or partially known.
Show more

6 Read more

PERFORMANCE COMPARISION OF IMPACT ON USERS OF SOCIAL MEDIA USING CLASSIFICATION ALGORITHM

PERFORMANCE COMPARISION OF IMPACT ON USERS OF SOCIAL MEDIA USING CLASSIFICATION ALGORITHM

In future, the advanced algorithms will be developed such as optimization algorithms for executing the reviews. It handles extremely high dimensional dataset and analyzes all the large input samples with less execution time. The optimization algorithms are such as particle swarm optimization and multi objective genetic algorithm to analyze the extremely high dimensional dataset. It will select the global optimal features to model the label for huge volume of social network. It also captures the heterogeneous data sources and analyzes optimally the positive, negative as well as neutral comments. Furthermore, security is a major issue which can be considered to
Show more

9 Read more

Identifying unknown and identical users in cross-application social media networks

Identifying unknown and identical users in cross-application social media networks

We built up a Friend Relationship Based User Recognizable proof calculation (FRUI). FRUI expect each client has an extraordinary companion circle; this is utilized to recognize clientsover different social applications. In contrast to existing calculations [4], [6], [7], FRUI picks a competitor coordinating sets from right now known distinguishable clients rather than unmapped ones. This activity diminishes computational unpredictability, since just an ceptionally little segment of unmapped clients are engaged with every cycle. Also, since just mapped clients are misused, our arrangement is versatile and can be effectively stretched out to on the web client recognizable proof applications. Conversely with current calculations [4], [6], [7], FRUI requires no control parameters.
Show more

5 Read more

Identifying the Anonymous Users in Multiple Social Media Cross Platform Networks

Identifying the Anonymous Users in Multiple Social Media Cross Platform Networks

[2] X. Kong, J. Zhang, and P.S. Yu, “Inferring anchor linksacross multiple heterogeneous social networks," Proc. of the22nd ACM International Conf. on Information andKnowledge Management (CIKM’13), pp. 179-188, 2013. [3] R. Zafarani and H. Liu, "Connecting correspondingidentities across communities," Proc. of the 3rd InternationalICWSM Conference, pp. 354-357, 2009.

8 Read more

Show all 10000 documents...