2011
DOI: 10.1111/j.1467-9671.2011.01297.x
|View full text |Cite
|
Sign up to set email alerts
|

Inferring the Location of Twitter Messages Based on User Relationships

Abstract: User interaction in social networks, such as Twitter and Facebook, is increasingly becoming a source of useful information on daily events. The online monitoring of short messages posted in such networks often provides insight on the repercussions of events of several different natures, such as (in the recent past) the earthquake and tsunami in Japan, the royal wedding in Britain and the death of Osama bin Laden. Studying the origins and the propagation of messages regarding such topics helps social scientists… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
86
0
2

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 169 publications
(88 citation statements)
references
References 23 publications
0
86
0
2
Order By: Relevance
“…Recent revelations about NSA surveillance programs also show that this type of information is of great use for tracking and identifying individuals [30]. The dual problem, i.e., inferring location from social ties, has also been studied by the research community [31]- [33]. In [34], the authors exploit proximity information detected via Bluetooth, which is similar to co-location, to build an opportunistic ad-hoc localization algorithm by using intersection techniques similar to what we use in our attack.…”
Section: Related Workmentioning
confidence: 99%
“…Recent revelations about NSA surveillance programs also show that this type of information is of great use for tracking and identifying individuals [30]. The dual problem, i.e., inferring location from social ties, has also been studied by the research community [31]- [33]. In [34], the authors exploit proximity information detected via Bluetooth, which is similar to co-location, to build an opportunistic ad-hoc localization algorithm by using intersection techniques similar to what we use in our attack.…”
Section: Related Workmentioning
confidence: 99%
“…Geoparsing and toponym resolution has been addressed mainly using statistical techniques through trained models [23,21,30], also in combination with heuristics [20]. The social networks have been also used to infer the location of a user [8] or to disambiguate it [15] thanks to the additional contextual information. These researches focus mainly in the user home location rather than the locations mentioned in the messages, but recently it has been proved the usefulness of social networks also to overcome the problem of shortness and sparsity of tweet messages analyzing them with respect to other tasks.…”
Section: Related Workmentioning
confidence: 99%
“…The first type looks into what can be inferred from the user's network of friends and the people that users most frequently or recently communicate with [17][18][19]. The other type looks into analyzing content or style of posts to infer user's profile data, such as age and gender, as it is done in [20], or by finding geographic references or regional language style to determine user's location [21,22].…”
Section: Data Cleaning: Finding the Right Usersmentioning
confidence: 99%