Learning influence probabilities in social networks

A Goyal, F Bonchi, LVS Lakshmanan - … on Web search and data mining, 2010 - dl.acm.org
… By starting with the diffusion models assumed in viral marketing, we elicit desiderata for …
• We propose a variety of probabilistic models of influence between users in a social network. …

Group polarization and computer-mediated communication: Effects of communication cues, social presence, and anonymity

CL Sia, BCY Tan, KK Wei - Information Systems Research, 2002 - pubsonline.informs.org
… that the reduction in social presence might have increased group polarization by causing …
group polarization might be affected by level of social presence. Specifically, group discussion

Climate quiz: a web application for eliciting and validating knowledge from social networks

A Scharl, M Sabou, M Föls - … of the 18th Brazilian symposium on …, 2012 - dl.acm.org
… emergent semantics and elicits formal knowledge in the form of a domain model. As an
innovative survey instrument, the application leverages social networking platforms to capture …

Spontaneous neural encoding of social network position

C Parkinson, AM Kleinbaum, T Wheatley - Nature Human Behaviour, 2017 - nature.com
… data with multi-voxel pattern analysis, we show that information about social network
position is accurately perceived and spontaneously activated when encountering familiar …

Eliciting personal network data in web surveys through participant-generated sociograms

P Tubaro, AA Casilli, L Mounier - Field Methods, 2014 - journals.sagepub.com
… a social network study, we aim to shed light onto the consequences of using these online
communication tools and to devise innovative solutions for health policy and information

elicit: A System for Detecting Insiders Who Violate Need-to-Know

MA Maloof, GD Stephens - Recent Advances in Intrusion Detection: 10th …, 2007 - Springer
… We stored this information in a database, and Table 3 shows an example. With this contextual
information, we were able to build simple social networks with e-mail traffic, use a person’s …

Value-oriented requirements: Eliciting domain requirements from social network services to evolve software product lines

N Ali, JE Hong - Applied Sciences, 2019 - mdpi.com
… However, these approaches do not consider eliciting … To address this issue, we have
proposed a social network service-… information such as nationality (geographical information), …

… of the Reporting Information about Networks and Groups (RING) task: a method for eliciting information from memory about associates, groups, and networks

L Hope, F Kontogianni, K Geyer… - Journal of Forensic …, 2019 - emerald.com
… Formal methods, such as social network analysis, is often used to structure intelligence on
eliciting information about the structure of target groups, gangs, cells or networks, ie who is …

The interrogation game: Using coercion and rewards to elicit information from groups

DB Johnson, JB Ryan - Journal of Peace Research, 2015 - journals.sagepub.com
… not care about the other group members and wants to provide accurate information. Extreme
‘strong’ types are detainees who care about the other group members as much as they care …

Using social network analysis to improve communities of practice

R Cross, T Laseter, A Parker… - California Management …, 2006 - journals.sagepub.com
information flow and learning networkselicit and then characterize people that respondents
relied on for informational purposes. The survey then moved to a series of full group network