Skip to main content

Lurking Behavior Analysis

  • Chapter
  • First Online:
Mining Lurkers in Online Social Networks

Part of the book series: SpringerBriefs in Computer Science ((BRIEFSCOMPUTER))

  • 280 Accesses

Abstract

In this chapter, we discuss main remarks and findings raised from the experimental evaluations of lurker rank methods conducted over several real-world OSNs, such as Twitter, FriendFeed, Flickr, Instagram, and Google+. We discuss how the ranking results produced by LurkerRank are effective in identifying and characterizing users at different grades of lurking. We also point out that LurkerRank solutions are correlated with data-driven rankings based on empirical influence. Then, we provide an in-depth analysis of aspects related to the time dimension, which aims to unveil the behavior of lurkers and their relations with other users. More specifically, we address a number of important research questions, including comparison of lurkers with other types of users (inactive users, newcomers, active users), lurkers’ responsiveness, evolution of lurking trends, and evolution of topical interests of lurkers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts. Everyone’s an influencer: quantifying influence on Twitter. In Proc. ACM Conf. on Web Search and Web Data Mining (WSDM), pages 65–74, 2011.

    Google Scholar 

  2. A. Bandura. Social foundations of thought and action: A social cognitive theory. Englewood Cliffs, NJ: Prentice Hall, 1986.

    Google Scholar 

  3. D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent Dirichlet Allocation. Journal of Machine Learning Research, 3(4–5):993–1022, 2003.

    MATH  Google Scholar 

  4. P. Bonacich and P. Lloyd. Eigenvector-like measures of centrality for asymmetric relations. Social Networks, 23:191–201, 2001.

    Article  Google Scholar 

  5. S. Brin and L. Page. The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems, 30(1-7):107–117, 1998.

    Article  Google Scholar 

  6. S. Budalakoti and R. Bekkerman. Bimodal invitation-navigation fair bets model for authority identification in a social network. In Proc. ACM Conf. on World Wide Web (WWW), pages 709–718, 2012.

    Google Scholar 

  7. A. Tagarelli and R. Interdonato. “Who’s out there?”: Identifying and Ranking Lurkers in Social Networks. In Proc. Int. Conf. on Advances in Social Networks Analysis and Mining (ASONAM), pages 215–222, 2013.

    Google Scholar 

  8. A. Tagarelli and R. Interdonato. Lurking in social networks: topology-based analysis and ranking methods. Social Netw. Analys. Mining, 4(230):27, 2014.

    Google Scholar 

  9. A. Tagarelli and R. Interdonato. Time-aware analysis and ranking of lurkers in social networks. Social Netw. Analys. Mining, 5(1):23, 2015.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Tagarelli, A., Interdonato, R. (2018). Lurking Behavior Analysis. In: Mining Lurkers in Online Social Networks. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-030-00229-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00229-9_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00228-2

  • Online ISBN: 978-3-030-00229-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics