کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
515502 | 867033 | 2013 | 31 صفحه PDF | دانلود رایگان |

• Micro-blogging services can develop into valuable sources of up-to-date information provided the spam problem is overcome.
• Finding “authoritative” sources/users is the main topic of this paper.
• Five rank prestige methods are compared: PageRank, HITS, NodeRanking, TunkRank and TwitterRank.
• Reciprocal links are most of the time “counterfeit currency” to increase followers count.
• The lower the ranking spammers reach (while relevant users remain atop), the better a method is.
Micro-blogging services such as Twitter allow anyone to publish anything, anytime. Needless to say, many of the available contents can be diminished as babble or spam. However, given the number and diversity of users, some valuable pieces of information should arise from the stream of tweets. Thus, such services can develop into valuable sources of up-to-date information (the so-called real-time web) provided a way to find the most relevant/trustworthy/authoritative users is available. Hence, this makes a highly pertinent question for which graph centrality methods can provide an answer. In this paper the author offers a comprehensive survey of feasible algorithms for ranking users in social networks, he examines their vulnerabilities to linking malpractice in such networks, and suggests an objective criterion against which to compare such algorithms. Additionally, he suggests a first step towards “desensitizing” prestige algorithms against cheating by spammers and other abusive users.
Journal: Information Processing & Management - Volume 49, Issue 6, November 2013, Pages 1250–1280