2017
DOI: 10.1111/cgf.13211
|View full text |Cite
|
Sign up to set email alerts
|

Social Media Visual Analytics

Abstract: With the development of social media (e.g. Twitter, Flickr, Foursquare, Sina Weibo, etc.), a large number of people are now using them and post microblogs, messages and multi‐media information. The everyday usage of social media results in big open social media data. The data offer fruitful information and reflect social behaviors of people. There is much visualization and visual analytics research on such data. We collect state‐of‐the‐art research and put it into three main categories: social network, spatial… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 92 publications
(58 citation statements)
references
References 88 publications
(176 reference statements)
0
49
0
2
Order By: Relevance
“…As we collect research works from a diverse set of domains such as social media, finance, and cybersecurity, the scope of anomaly detection in our survey is broader than the scope identified in specific domains. For example, e.g., Chen et al [5] identify data outside normal ranges of attributes as anomalies in social media while in the field of cybersecurity, anomalies refer to malware, insider threats, and targeted attacks [13], [14]. In our work, anomalies refer to frauds, spam, intrusion, sudden increases in the volume of data, and periodic patterns of users, etc.…”
Section: A Terminologymentioning
confidence: 93%
See 1 more Smart Citation
“…As we collect research works from a diverse set of domains such as social media, finance, and cybersecurity, the scope of anomaly detection in our survey is broader than the scope identified in specific domains. For example, e.g., Chen et al [5] identify data outside normal ranges of attributes as anomalies in social media while in the field of cybersecurity, anomalies refer to malware, insider threats, and targeted attacks [13], [14]. In our work, anomalies refer to frauds, spam, intrusion, sudden increases in the volume of data, and periodic patterns of users, etc.…”
Section: A Terminologymentioning
confidence: 93%
“…A variety of data can be extracted from user behaviors across different domains. By analyzing multiple attributes of these data, we summarize four common data types including text, network, spatiotemporal information, and multidimensional data [3], [5]. A brief explanation for each data types is described as follows.…”
Section: Taxonomymentioning
confidence: 99%
“…Social media sites are rich sources of information that enable researchers to perform different kinds of analysis, including event analysis and cross-platform information linking [2,5,8,23], visual sentiment analysis [20], opinion diffusion analysis [6,43,46], and text analysis and topic modeling [15,25]. A thorough review of visual analytics research using social media data is presented in [7,42].…”
Section: Visual Social Media Analyticsmentioning
confidence: 99%
“…Since the term Visual Analytics (VA) was coined in 2004 [WT04, TC05], there have been hundreds of software systems reported in the literature for supporting various VA workflows (e.g., [ERT∗17, LGH∗17,CLY17]). As articulated by Thomas and Kielman [TK09] and Robertson et.…”
Section: Related Workmentioning
confidence: 99%