Social Media Analysis for Product Safety using Text Mining and Sentiment Analysis

被引:0
作者
Isah, Haruna [1 ]
Trundle, Paul [1 ]
Neagu, Daniel [1 ]
机构
[1] Univ Bradford, Sch Elect Engn & Comp Sci, Artificial Intelligence Res AIRe Grp, Bradford BD7 1DP, W Yorkshire, England
来源
2014 14TH UK WORKSHOP ON COMPUTATIONAL INTELLIGENCE (UKCI) | 2014年
关键词
text mining; sentiment analysis; product safety; social media; machine learning; naive Bayes;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The growing incidents of counterfeiting and associated economic and health consequences necessitate the development of active surveillance systems capable of producing timely and reliable information for all stake holders in the anti-counterfeiting fight. User generated content from social media platforms can provide early clues about product allergies, adverse events and product counterfeiting. This paper reports a work in progress with contributions including: the development of a framework for gathering and analyzing the views and experiences of users of drug and cosmetic products using machine learning, text mining and sentiment analysis; the application of the proposed framework on Facebook comments and data from Twitter for brand analysis, and the description of how to develop a product safety lexicon and training data for modeling a machine learning classifier for drug and cosmetic product sentiment prediction. The initial brand and product comparison results signify the usefulness of text mining and sentiment analysis on social media data while the use of machine learning classifier for predicting the sentiment orientation provides a useful tool for users, product manufacturers, regulatory and enforcement agencies to monitor brand or product sentiment trends in order to act in the event of sudden or significant rise in negative sentiment.
引用
收藏
页码:51 / 57
页数:7
相关论文
共 26 条
[1]  
Akaichi J, 2013, 2013 17TH INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), P640, DOI 10.1109/ICSTCC.2013.6689032
[2]  
[Anonymous], 2008, Introduction to information retrieval
[3]  
Balage FilhoP., 2013, Second Joint Conference on Lexical and Computational Semantics (* SEM), Volume 2: Proceedings of the Seventh International Workshop on Semantic Evaluation (SemEval 2013), V2, P568
[4]  
Bhuta S, 2014, PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), P583, DOI 10.1109/ICICICT.2014.6781346
[5]  
Bo Pang, 2008, Foundations and Trends in Information Retrieval, V2, P1, DOI 10.1561/1500000001
[6]  
Chee B., 2009, Proceedings of the 42nd Hawaii International Conference on System Sciences pp, P1
[7]   A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter [J].
Cheong, Marc ;
Lee, Vincent C. S. .
INFORMATION SYSTEMS FRONTIERS, 2011, 13 (01) :45-59
[8]  
de Quincey E, 2010, L N INST COMP SCI SO, V27, P21
[9]   Understanding and fighting the medicine counterfeit market [J].
Degardin, Klara ;
Roggo, Yves ;
Margot, Pierre .
JOURNAL OF PHARMACEUTICAL AND BIOMEDICAL ANALYSIS, 2014, 87 :167-175
[10]  
Ding X., 2008, P 2008 INT C WEB SEA, P231, DOI [10.1145/1341531.1341561, DOI 10.1145/1341531.1341561]