2011 44th Hawaii International Conference on System Sciences 2011
DOI: 10.1109/hicss.2011.140
|View full text |Cite
|
Sign up to set email alerts
|

Democracy.com: A Tale of Political Blogs and Content

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…For example, if user-A has 200 followers, then the cells in user-A's column contain 200. Wasserman and Faust refer to these as expansiveness and popularity effects (1994), or more recently, receiver effects (Nahon and Hemsley, 2011). We expect this variable to be both significant and positive.…”
Section: Each Of the Variables Is In Matrix Form And Is Constructed Amentioning
confidence: 99%
“…For example, if user-A has 200 followers, then the cells in user-A's column contain 200. Wasserman and Faust refer to these as expansiveness and popularity effects (1994), or more recently, receiver effects (Nahon and Hemsley, 2011). We expect this variable to be both significant and positive.…”
Section: Each Of the Variables Is In Matrix Form And Is Constructed Amentioning
confidence: 99%
“…Several social computing research teams have used supervised learning to predict the political leanings of social media users (Conover et al, 2011;Jiang & Argamon, 2008;Park, Ko, Kim, Liu, & Song, 2011). Finally, network methods have proven themselves quite versatile, with applications in the study of political spam (Ratkiewicz et al, 2011), communication patterns among political bloggers (Adamic & Glance, 2005;Nahon & Hemsley, 2011;Ulicny et al, 2010), and political gatekeeping in social media (Jürgens et al, 2011). This very brief survey was intended to highlight some of the ways computational methods have been used to study political topics.…”
Section: Discussionmentioning
confidence: 99%
“…Interfacing with APIs to extract data is evidently such a routine activity in social computing research that documenting its details is optional. Studies that examined content from sources without APIs-blogs for example-usually used their own custom web-scraping scripts (Adamic & Glance, 2005;Nahon & Hemsley, 2011;Ulicny, Kokar, & Matheus, 2010).…”
Section: Data Collectionmentioning
confidence: 99%
“…This study focuses on the diffusion process in Twitter. Extensive exploratory research has been conducted on online social networks, for examples, online information diffusion investigating social media services, such as Facebook [14,15], YouTube [16][17][18], blogs [19,20], and Twitter [21][22][23][24][25][26]. Using the extensive diffusion research background on Twitter as an empirical basis for our study, previous research topics on Twitter cover influential identification [23,24], political communication [19,20,25], and information diffusion [15,[21][22][23]26].…”
Section: Related Workmentioning
confidence: 99%