Putting Social Media and Networking Data in Practice for Education, Planning, Prediction and Recommendation [E-Book] / edited by Mehmet Kaya, Şuayip Birinci, Jalal Kawash, Reda Alhajj
This book focusses on recommendation, behavior, and anomaly, among of social media analysis. First, recommendation is vital for a variety of applications to narrow down the search space and to better guide people towards educated and personalized alternatives. In this context, the book covers suppor...
Saved in:
Full text |
|
Personal Name(s): | Alhajj, Reda, editor |
Birinci, Şuayip, editor / Kawash, Jalal, editor / Kaya, Mehmet, editor | |
Edition: |
1st edition 2020. |
Imprint: |
Cham :
Springer,
2020
|
Physical Description: |
XIII, 237 pages 68 illustrations, 51 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783030336981 |
DOI: |
10.1007/978-3-030-33698-1 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Lecture Notes in Social Networks
|
Subject (LOC): |
This book focusses on recommendation, behavior, and anomaly, among of social media analysis. First, recommendation is vital for a variety of applications to narrow down the search space and to better guide people towards educated and personalized alternatives. In this context, the book covers supporting students, food venue, friend and paper recommendation to demonstrate the power of social media data analysis. Secondly, this book treats behavior analysis and understanding as important for a variety of applications, including inspiring behavior from discussion platforms, determining user choices, detecting following patterns, crowd behavior modeling for emergency evacuation, tracking community structure, etc. Third, fraud and anomaly detection have been well tackled based on social media analysis. This has is illustrated in this book by identifying anomalous nodes in a network, chasing undetected fraud processes, discovering hidden knowledge, detecting clickbait, etc. With this wide coverage, the book forms a good source for practitioners and researchers, including instructors and students. |