Advertisement

Social Credibility Incorporating Semantic Analysis and Machine Learning: A Survey of the State-of-the-Art and Future Research Directions

  • Bilal Abu-SalihEmail author
  • Bushra Bremie
  • Pornpit Wongthongtham
  • Kevin Duan
  • Tomayess Issa
  • Kit Yan Chan
  • Mohammad Alhabashneh
  • Teshreen Albtoush
  • Sulaiman Alqahtani
  • Abdullah Alqahtani
  • Muteeb Alahmari
  • Naser Alshareef
  • Abdulaziz Albahlal
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 927)

Abstract

The wealth of Social Big Data (SBD) represents a unique opportunity for organisations to obtain the excessive use of such data abundance to increase their revenues. Hence, there is an imperative need to capture, load, store, process, analyse, transform, interpret, and visualise such manifold social datasets to develop meaningful insights that are specific to an application’s domain. This paper lays the theoretical background by introducing the state-of-the-art literature review of the research topic. This is associated with a critical evaluation of the current approaches, and fortified with certain recommendations indicated to bridge the research gap.

References

  1. 1.
    Abu-Salih, B., Wongthongtham, P., Kit, C.Y.: Twitter mining for ontology-based domain discovery incorporating machine learning. J. Knowl. Manag. 22(5), 949–981 (2018)CrossRefGoogle Scholar
  2. 2.
    Nabipourshiri, R., Abu-Salih, B., Wongthongtham, P.: Tree-based classification to users’ trustworthiness in OSNs In: Proceedings of the 2018 10th International Conference on Computer and Automation Engineering, pp. 190–194. ACM, Brisbane, Australia (2018)Google Scholar
  3. 3.
    Wongthongtham, P., Abu Salih, B.: Ontology and trust based data warehouse in new generation of business intelligence: state-of-the-art, challenges, and opportunities. In: 2015 IEEE 13th International Conference on Industrial Informatics (INDIN). IEEE (2015)Google Scholar
  4. 4.
    Abu-Salih, B., et al.: Towards a methodology for social business intelligence in the era of big social data incorporating trust and semantic analysis. In: Second International Conference on Advanced Data and Information Engineering (DaEng-2015). Springer, Bali, Indonesia (2015)Google Scholar
  5. 5.
    Abu-Salih, B., et al.: CredSaT: credibility ranking of users in big social data incorporating semantic analysis and temporal factor. J. Inform. Sci. 0(0), 0165551518790424 (2018)Google Scholar
  6. 6.
    Abu-Salih, B.: Trustworthiness in Social Big Data Incorporating Semantic Analysis, Machine Learning and Distributed Data Processing. Curtin University (2018)Google Scholar
  7. 7.
    Chan, K.Y., et al.: Affective design using machine learning: a survey and its prospect of conjoining big data. Int. J. Comput. Integr. Manuf. 1–19 (2018)Google Scholar
  8. 8.
    Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. 45(4), 47 (2013)CrossRefGoogle Scholar
  9. 9.
    Passant, A., et al.: Enabling trust and privacy on the social web. In: W3C Workshop on the Future of Social Networking (2009)Google Scholar
  10. 10.
    Podobnik, V., et al.: How to calculate trust between social network users? In: 2012 20th International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE (2012)Google Scholar
  11. 11.
    Agarwal, M., Bin, Z.: Detecting malicious activities using backward propagation of trustworthiness over heterogeneous social graph. In: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) (2013)Google Scholar
  12. 12.
    Massa, P., Bhattacharjee, B.: Using trust in recommender systems: an experimental analysis, in trust management. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) pp. 221–235. Springer, Berlin, Heidelberg. (2004)Google Scholar
  13. 13.
    Gupta, P., et al.: WTF: the who to follow service at Twitter. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 505–514. International World Wide Web Conferences Steering Committee, Rio de Janeiro, Brazil (2003)Google Scholar
  14. 14.
    Gallege, L.S., et al.: Towards trust-based recommender systems for online software services. In: Proceedings of the 9th Annual Cyber and Information Security Research Conference, pp. 61–64. ACM, Oak Ridge, Tennessee (2014)Google Scholar
  15. 15.
    Sun, G., et al.: A social trust path recommendation system in contextual online social networks. In: Chen, L., et al. (eds.) Web Technologies and Applications, pp. 652–656. Springer, Cham (2014)Google Scholar
  16. 16.
    Alahmadi, D.H., Zeng, X.J.: ISTS: implicit social trust and sentiment based approach to recommender systems. Expert Syst. Appl. 42(22), 8840–8849 (2015)CrossRefGoogle Scholar
  17. 17.
    AlRubaian, M., et al.: A multistage credibility analysis model for microblogs. In: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. ACM (2015)Google Scholar
  18. 18.
    Zhang, B., et al.: A trust-based sentiment delivering calculation method in microblog. Int. J. Serv. Technol. Manag. 21(4–6), 185–198 (2015)CrossRefGoogle Scholar
  19. 19.
    Bae, Y., Lee, H.: Sentiment analysis of twitter audiences: measuring the positive or negative influence of popular Twitterers. J. Am. Soc. Inform. Sci. Technol. 63(12), 2521–2535 (2012)CrossRefGoogle Scholar
  20. 20.
    Kawabe, T., et al.: Tweet credibility analysis evaluation by improving sentiment dictionary. In: 2015 IEEE Congress on Evolutionary Computation (CEC). IEEE (2015)Google Scholar
  21. 21.
    Momeni, E., Cardie, C., Diakopoulos, N.: A survey on assessment and ranking methodologies for user-generated content on the web. ACM Comput. Surv. (CSUR) 48(3), 41 (2016)Google Scholar
  22. 22.
    Amalanathan, A., Anouncia, S.M.: A review on user influence ranking factors in social networks. Int. J. Web Based Commun. 12(1), 74–83 (2016)CrossRefGoogle Scholar
  23. 23.
    Ruan, Y., Durresi, A.: A survey of trust management systems for online social communities–trust modeling, trust inference and attacks. Knowl.-Based Syst. 106, 150–163 (2016)CrossRefGoogle Scholar
  24. 24.
    Berners-Lee, T., Hendler, J.: Publishing on the semantic web. Nature 410(6832), 1023 (2001)CrossRefGoogle Scholar
  25. 25.
    Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing? Int. J. Hum Comput Stud. 43(5), 907–928 (1995)CrossRefGoogle Scholar
  26. 26.
    De Nart, D., et al.: A content-based approach to social network analysis: a case study on research communities, in digital libraries on the move. In: Calvanese, D., De Nart, D., Tasso, C. (eds.) 11th Italian Research Conference on Digital Libraries, IRCDL 2015, Bolzano, Italy, 29–30 January 2015, pp. 142–154. Springer, Cham, 2016, Revised Selected PapersGoogle Scholar
  27. 27.
    Chianese, A., Marulli, F., Piccialli, F.: Cultural heritage and social pulse: a semantic approach for CH sensitivity discovery in social media data. In: 2016 IEEE Tenth International Conference on Semantic Computing (ICSC) (2016)Google Scholar
  28. 28.
    Michelson, M., Macskassy, S.A.: Discovering users; topics of interest on twitter: a first look. In: Proceedings of the Fourth Workshop on Analytics for Noisy Unstructured Text Data. ACM (2010)Google Scholar
  29. 29.
    Schonhofen, P.: Identifying document topics using the wikipedia category network. In: Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence, pp. 456–462. IEEE Computer Society (2006)Google Scholar
  30. 30.
    Hassan, M.M., Karray, F., Kamel, M.S.: Automatic document topic identification using wikipedia hierarchical ontology. In: 2012 11th International Conference on Information Science, Signal Processing and their Applications (ISSPA) (2012)Google Scholar
  31. 31.
    Anthes, G.: Topic models Vs unstructured data. Commun. ACM 53(12), 16–18 (2010)CrossRefGoogle Scholar
  32. 32.
    Wang, C., et al. Markov topic models. In: Artificial Intelligence and Statistics (2009)Google Scholar
  33. 33.
    Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3(4–5), 993–1022 (2003)zbMATHGoogle Scholar
  34. 34.
    Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3(Jan), 993–1022 (2003)zbMATHGoogle Scholar
  35. 35.
    Karami, A., et al.: Fuzzy approach topic discovery in health and medical corpora. Int. J. Fuzzy Syst. 1–12 (2017)Google Scholar
  36. 36.
    Hofmann, T.: Probabilistic latent semantic indexing. In: Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM (1999)Google Scholar
  37. 37.
    Chen, Y., et al.: Topic modeling for evaluating students; reflective writing: a case study of pre-service teachers’ journals. In: Proceedings of the Sixth International Conference on Learning Analytics & Knowledge. ACM (2016)Google Scholar
  38. 38.
    Nichols, L.G.: A topic model approach to measuring interdisciplinarity at the national science foundation. Scientometrics 100(3), 741–754 (2014)MathSciNetCrossRefGoogle Scholar
  39. 39.
    Weng, J., et al.: Twitterrank: finding topic-sensitive influential Twitterers. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining. ACM (2010)Google Scholar
  40. 40.
    Asharaf, S., Alessandro, Z.: Generating and visualizing topic hierarchies from microblogs: an iterative Latent Dirichlet allocation approach. In: 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE (2015)Google Scholar
  41. 41.
    Quercia, D., Askham, H., Crowcroft, J.: TweetLDA: supervised topic classification and link prediction in Twitter. In: The 4th Annual ACM Web Science Conference, pp. 247–250. ACM, Evanston, Illinois (2012)Google Scholar
  42. 42.
    Onan, A., Korukoglu, S., Bulut, H.: LDA-based topic modelling in text sentiment classification: an empirical analysis. Int. J. Comput. Linguistics Appl. 7(1), 101–119 (2016)Google Scholar
  43. 43.
    Cha, M., et al.: Measuring user influence in Twitter: the million follower fallacy. ICWSM 10, 10–17 (2010)Google Scholar
  44. 44.
    Silva, A., et al.: ProfileRank: finding relevant content and influential users based on information diffusion. In: Proceedings of the 7th Workshop on Social Network Mining and Analysis. ACM (2013)Google Scholar
  45. 45.
    Jiang, W., Wang, G., Wu, J.: Generating trusted graphs for trust evaluation in online social networks. Future Gener. Comput. Syst. 31, 48–58 (2014)CrossRefGoogle Scholar
  46. 46.
    Liu, B., Zhang, L.: A survey of opinion mining and sentiment analysis. In: Aggarwal, C., Zhai, C. (eds.) Mining Text Data, pp. 415–463. Springer, Cham (2012)CrossRefGoogle Scholar
  47. 47.
    Balog, K., et al.: Expertise retrieval. Found. Trends Inf. Retr. 6(2–3), 127–256 (2012)CrossRefGoogle Scholar
  48. 48.
    Yin, H.Z., et al.: Dynamic user modeling in social media systems. ACM Trans. Inf. Syst. 33(3), 10 (2015)CrossRefGoogle Scholar
  49. 49.
    Abbasi, M.-A., Liu, H.: Measuring user credibility in social media, in social computing, behavioral-cultural modeling and prediction. In: Greenberg, A., Kennedy, W., Bos, N. (eds.) pp. 441–448. Springer, Berlin, Heidelberg (2013)Google Scholar
  50. 50.
    Yardi, S., et al.: Detecting spam in a Twitter network (2009)Google Scholar
  51. 51.
    Manyika, J., et al.: Big data: the next frontier for innovation, competition, and productivity. McKinsey Global Institute (2011)Google Scholar
  52. 52.
    Chen, M., et al.: Open issues and outlook. In: Big Data, pp. 81–89. Springer International Publishing (2014)Google Scholar
  53. 53.
    Lavbič, D., et al.: Traversal and relations discovery among business entities and people using semantic web technologies and trust management. In: Databases and Information Systems VII: Selected Papers from the Tenth International Baltic Conference, DB & IS 2012. IOS Press (2013)Google Scholar
  54. 54.
    Herzig, J., Mass, Y., Roitman, H.: An author-reader influence model for detecting topic-based influencers in social media. In: Proceedings of the 25th ACM Conference on Hypertext and Social Media. ACM (2014)Google Scholar
  55. 55.
    Shen, W., Wang, J., Han, J.: Entity linking with a knowledge base: Issues, techniques and solutions. IEEE Trans. Knowl. Data Eng. 27(2), 443–460 (2015)CrossRefGoogle Scholar
  56. 56.
    Free Social Media Analytics Tools (2016). http://simplymeasured.com/free-social-media-tools/
  57. 57.
    Li, C., et al.: Topic Modeling for short texts with auxiliary word embeddings. In: Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Bilal Abu-Salih
    • 1
    • 2
    Email author
  • Bushra Bremie
    • 1
  • Pornpit Wongthongtham
    • 1
  • Kevin Duan
    • 1
  • Tomayess Issa
    • 1
  • Kit Yan Chan
    • 1
  • Mohammad Alhabashneh
    • 1
  • Teshreen Albtoush
    • 1
  • Sulaiman Alqahtani
    • 1
  • Abdullah Alqahtani
    • 1
  • Muteeb Alahmari
    • 1
  • Naser Alshareef
    • 1
  • Abdulaziz Albahlal
    • 1
  1. 1.Curtin UniversityPerthAustralia
  2. 2.The University of JordanAmmanJordan

Personalised recommendations