Social network analysis of Twitter interactions: a directed multilayer network approach

被引:15
作者
Logan, Austin P. [1 ]
LaCasse, Phillip M. [2 ]
Lunday, Brian J. [2 ]
机构
[1] Air Combat Command, Directorate Plans Programs & Requirements, 129 Andrews St, Langley Air Force Base, VA 23665 USA
[2] Air Force Inst Technol, Dept Operat Sci, 2950 Hobson Way, Wright Patterson Air Forc, OH 45433 USA
关键词
Social network analysis; Networks; Multilayer networks; Natural language processing;
D O I
10.1007/s13278-023-01063-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Effective employment of social media for any social influence outcome requires a detailed understanding of the target audience. Social media provides a rich repository of self-reported information that provides insight regarding the sentiments and implied priorities of an online population. Using Social Network Analysis, this research models user interactions on Twitter as a weighted, directed network. Topic modeling through Latent Dirichlet Allocation identifies the topics of discussion in Tweets, which this study uses to induce a directed multilayer network wherein users (in one layer) are connected to the conversations and topics (in a second layer) in which they have participated, with inter-layer connections representing user participation in conversations. Analysis of the resulting network identifies both influential users and highly connected groups of individuals, informing an understanding of group dynamics and individual connectivity. The results demonstrate that the generation of a topically-focused social network to represent conversations yields more robust findings regarding influential users, particularly when analysts collect Tweets from a variety of discussions through more general search queries. Within the analysis, PageRank performed best among four measures used to rank individual influence within this problem context. In contrast, the results of applying both the Greedy Modular Algorithm and the Leiden Algorithm to identify communities were mixed; each method yielded valuable insights, but neither technique was uniformly superior. The demonstrated four-step process is readily replicable, and an interested user can automate the process with relatively low effort or expense.
引用
收藏
页数:18
相关论文
共 54 条
  • [1] Ahuja R.K., 1993, Network Flows
  • [2] Aiello L.-M, 2010, Proceedings of the 2010 IEEE Second International Conference on Social Computing (SocialCom 2010). the Second IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2010), P249, DOI 10.1109/SocialCom.2010.42
  • [3] [Anonymous], 1990, COMMAND CONTROL COMM
  • [4] Bakshy E., 2011, P 4 ACM INT C WEB SE, P65, DOI [DOI 10.1145/1935826.1935845, 10.1145/1935826.1935845]
  • [5] Barrios F., 2015, PREPRINT, DOI DOI 10.48550/ARXIV.1602.03606
  • [6] Bhavnani V, 2021, 2021 4 BIENN INT C N, P1
  • [7] Latent Dirichlet allocation
    Blei, DM
    Ng, AY
    Jordan, MI
    [J]. JOURNAL OF MACHINE LEARNING RESEARCH, 2003, 3 (4-5) : 993 - 1022
  • [8] Bouma G., 2009, P BIENN GERM SOC COM, P31, DOI DOI 10.1139/F04-132
  • [9] Choirul Rahmadan M., 2020, 2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS), P126, DOI 10.1109/ICIMCIS51567.2020.9354320
  • [10] Clauset A, 2004, PHYS REV E, V70, DOI 10.1103/PhysRevE.70.066111