Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Computer Engineering
An Analysis Of Rumor And Counter-Rumor Messages In Social Media, Dion Hoe-Lian Goh, Alton Y. K. Chua, Hanyu Shi, Wenju Wei, Haiyan Wang, Ee-Peng Lim
An Analysis Of Rumor And Counter-Rumor Messages In Social Media, Dion Hoe-Lian Goh, Alton Y. K. Chua, Hanyu Shi, Wenju Wei, Haiyan Wang, Ee-Peng Lim
Research Collection School Of Computing and Information Systems
Social media platforms are one of the fastest ways to disseminate information but they have also been used as a means to spread rumors. If left unchecked, rumors have serious consequences. Counter-rumors, messages used to refute rumors, are an important means of rumor curtailment. The objective of this paper is to examine the types of rumor and counter-rumor messages generated in Twitter in response to the falsely reported death of a politician, Lee Kuan Yew, who was Singapore’s first Prime Minister. Our content analysis of 4321Twitter tweets about Lee’s death revealed six categories of rumor messages, four categories ofcounter-rumor messages …
Identifying The High-Value Social Audience From Twitter Through Text-Mining Methods, Siaw Ling Lo, David Cornforth, Raymond Chiong
Identifying The High-Value Social Audience From Twitter Through Text-Mining Methods, Siaw Ling Lo, David Cornforth, Raymond Chiong
Research Collection School Of Computing and Information Systems
Doing business on social media has become a common practice for many companies these days. While the contents shared on Twitter and Facebook offer plenty of opportunities to uncover business insights, it remains a challenge to sift through the huge amount of social media data and identify the potential social audience who is highly likely to be interested in a particular company. In this paper, we analyze the Twitter content of an account owner and its list of followers through various text mining methods, which include fuzzy keyword matching, statistical topic modeling and machine learning approaches. We use tweets of …