FOREX Press I. J. of Business & Management Research
Support Open Access

Research Article

Visualization for Analysis of Social Networking, Models and Techniques: A Review

Author(s) : Shugufta Abrahim*,Bilal Ahmed Mir, Faheem Ahmad Reegu and Shazia Farooq

Publisher : FOREX Publication

Published : 30 September 2018

e-ISSN :2347-4696

Page(s) : 137-144




Shugufta Abrahim*, Graduate School of Science and Engineering for Education, University of Toyama, Gofuku, Toyama, Japan, Department of Computer Science and Information Systems, Jazan University, Saudi Arabia; Email: Shuguftawani23@gmail.com

Bilal Ahmed Mir, Graduate School of Science and Engineering for Education, University of Toyama, Gofuku, Toyama, Japan ; Email: mirb940@gmail.com

Faheem Ahmad Reegu, Department of Computer Science and Information Systems, Jazan University, Saudi Arabia; Email: farfaheem6211@gmail.com

Shazia Farooq , Department of Computer Science and Information Systems, Jazan University, Saudi Arabia

[1] R. Zeng, Q. Z. Sheng, L. Yao, T. Xu, and D. Xie. A practical simulation method for social networks. In Proceedings of the First Australasian Web Conference, Volume 144, 27-34. Australian Computer Society, Inc. 2013.

[2] R. Toivonen, J. P. Onnela, J. Saramäki, J. Hyvönen, and K. Kaski. A model for social networks. Physica A: Statistical Mechanics and its Applications 371, no. 2 (2006): 851-860.

[3] A. M. Kaplan, and M. Haenlein. Users of the world, unite! The challenges and opportunities of Social Media. Business horizons 53, no. 1 (2010): 59-68.

[4] R. Orendovici, Social Network Analysis and Simulation of the Development of Adversarial Networks. 2011.

[5] N. B. Ellison, Social network sites: Definition, history, and scholarship. Journal of computer‐mediated Communication13, no. 1 (2007): 210-230.

[6] M. A. Urista, Q. Dong, and K. D. Day. Explaining why young adults use Myspace and Facebook through uses and gratifications theory. Human Communication 12, no. 2 (2009): 215-229.

[7] T. P. Alloway, and R. G. Alloway. The impact of engagement with social networking sites (SNSs) on cognitive skills. Computers in Human Behaviour 28, no. 5 (2012): 1748-1754.

[8] P. T. Jaeger, and S. Munson. Engaging the public in open government: Social media technology and policy for government transparency. Federal register 1 (2010).

[9] S. Asur, and B. A. Huberman. Predicting the future with social media. In Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology-Volume 01, pp. 492-499. IEEE Computer Society, 2010.

[10] J. Yin, A. Lampert, M. Cameron, B. Robinson, and R. Power. Using social media to enhance emergency situation awareness. IEEE Intelligent Systems 27, no. 6 (2012): 52-59.

[11] K. Subrahmanyam, S. M. Reich, N. Waechter, and G. Espinoza. Online and offline social networks: Use of social networking sites by emerging adults. Journal of applied developmental psychology 29, no. 6 (2008): 420-433.

[12] D. J. Kuss, and M. D. Griffiths. Social networking sites and addiction: Ten lessons learned. International journal of environmental research and public health 14, no. 3 (2017): 311.

[13] J. Bukovina, Social media big data and capital markets – An overview." Journal of Behavioural and Experimental Finance 11 (2016): 18-26.

[14] V. Jakkula, Tutorial on support vector machine (SVM). School of EECS, Washington State University 37 (2006).

[15] B. Viswanath, A. B. Muhammad, M. Crovella, S. Guha, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Towards Detecting Anomalous User Behaviour in Online Social Networks. In USENIX Security Symposium, pp. 223-238. 2014.

[16] H. Zhang, and D. Li. Naïve Bayes text classifier. In Granular Computing, 2007. GRC 2007. IEEE International Conference. pp. 708-708. IEEE, 2007.

[17] H. Zhang, and D. Li. Naïve Bayes text classifier. In Granular Computing, 2007. GRC 2007. IEEE International Conference. pp. 708-708. IEEE, 2007.

[18] P. Kazienko, and N. Chawla, eds. Applications of social media and social network analysis. Springer, 2015.

[19] C. Özgen, Social Networking Sites Utilization for Teaching and Learning. PhD diss., MIDDLE EAST TECHNICAL UNIVERSITY, 2012.

[20] R. Zeng, Q. Z. Sheng, L. Yao, T. Xu, & D.Xie. A practical simulation method for social networks. In Proceedings of the First Australasian Web Conference. Volume 144 (pp. 27-34). Australian Computer Society, Inc. (2013, January).

[21] V. E. Krebs, Mapping Networks of Terrorist Cells, CONNECTIONS, Vol. 24, Num. 3, pp 43-52. 2002.

[22] Il-C. Moon, M. C. Kathleen and A. H. Levis. Vulnerability assessment on adversarial organization: Unifying command and control structure analysis and social network analysis. In SIAM International Conference on Data Mining, Workshop on Link Analysis, Counterterrorism and Security. 2008.

[23] A. S. Sarlis, D. P. Sakas, and D. S. Vlachos. Facebook’s personal page modelling and simulation." In AIP Conference Proceedings, vol. 1644, no. 1, pp. 331-338. AIP, 2015.

[24] A. Sarlan, C. Nadam, and S. Basri. Twitter sentiment analysis. In Information Technology and Multimedia (ICIMU), 2014 International Conference on, pp. 212-216. IEEE, 2014.

[25] A. K. Jose, N. Bhatia, and S. Krishna. Twitter sentiment analysis. In Seminar Report, National Institute of Technology Calicut. 2010.

[26] Y. Jeong, and K. Yeuseung. Privacy concerns on social networking sites: Interplay among posting types, content, and audiences. Computers in Human Behavior 69 (2017): 302-310.

Shugufta Abrahim, Bilal Ahmed Mir, Faheem Ahmad Reegu and Shazia Farooq (2018), Visualization for Analysis of Social Networking, Models and Techniques: A Review . IJBMR 6(3), 137-144. DOI: 10.37391/IJBMR.060401.