acl acl2012 acl2012-173 acl2012-173-reference knowledge-graph by maker-knowledge-mining
Source: pdf
Author: JinYeong Bak ; Suin Kim ; Alice Oh
Abstract: In social psychology, it is generally accepted that one discloses more of his/her personal information to someone in a strong relationship. We present a computational framework for automatically analyzing such self-disclosure behavior in Twitter conversations. Our framework uses text mining techniques to discover topics, emotions, sentiments, lexical patterns, as well as personally identifiable information (PII) and personally embarrassing information (PEI). Our preliminary results illustrate that in relationships with high relationship strength, Twitter users show significantly more frequent behaviors of self-disclosure.
D.M. Blei, A.Y. Ng, and M.I. Jordan. 2003. Latent dirichlet allocation. The Journal of Machine Learning Research, 3:993–1022. D. Boyd, S. Golder, and G. Lotan. 2010. Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. In Proceedings of the 43rd Hawaii International Conference on System Sciences. C. Danescu-Niculescu-Mizil, M. Gamon, and S. Dumais. 2011. Mark my words!: linguistic style accommodation in social media. In Proceedings of the 20th International World Wide Web Conference. D. Derks, A.E.R. Bos, and J. Grumbkow. 2007. Emoticons and social interaction on the internet: the importance of social context. Computers in Human Behavior, 23(1):842–849. S. Duck. 2007. Human Relationships. Sage Publications Ltd. E. Gilbert and K. Karahalios. 2009. Predicting tie strength with social media. In Proceedings of the 27th International Conference on Human Factors in Computing Systems, pages 211–220. E. Gilbert. 2012. Predicting tie strength in a new medium. In Proceedings of the ACM Conference on Computer Supported Cooperative Work. M.S. Granovetter. 1973. The strength of weak ties. American Journal of Sociology, pages 1360–1380. J. Harris and S. Kamvar. 2009. We Feel Fine: An Almanac of Human Emotion. Scribner Book Company. L. Humphreys, P. Gill, and B. Krishnamurthy. 2010. How much is too much? privacy issues on twitter. In Conference of International Communication Association, Singapore. L. Jiang, N.N. Bazarova, and J.T. Hancock. 2011. From perception to behavior: Disclosure reciprocity and the intensification of intimacy in computer-mediated communication. Communication Research. Y. Jo and A.H. Oh. 2011. Aspect and sentiment unification model for online review analysis. In Proceedings of International Conference on Web Search and Data Mining. S. Kim, J. Bak, and A. Oh. 2012. Do you feel what ifeel? social aspects of emotions in twitter conversations. In Proceedings of the AAAI International Conference on Weblogs and Social Media. J.R. Landis and G.G. Koch. 1977. The measurement of observer agreement for categorical data. Biometrics, pages 159–174. D.Z. Levin and R. Cross. 2004. The strength of weak ties you can trust: The mediating role of trust in effective knowledge transfer. Management science, pages 1477–1490. 64 B.M. Montgomery. 1982. Verbal immediacy as a behavioral indicator of open communication content. Communication Quarterly, 30(1):28–34. A. Ritter, C. Cherry, and B. Dolan. 2010. Unsupervised modeling of twitter conversations. In Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, pages 172–180. A. Ritter, C. Cherry, and W.B. Dolan. 2011. Data-driven response generation in social media. In Proceedings of EMNLP. R. Tokuhisa, K. Inui, and Y. Matsumoto. 2008. Emotion classification using massive examples extracted from the web. In Proceedings of the 22nd International Conference on Computational Linguistics-Volume 1, pages 881–888. F. Vaassen and W. Daelemans. 2011. Automatic emotion classification for interpersonal communication. ACL HLT 2011, page 104. A. Wu, J.M. DiMicco, and D.R. Millen. 2010. Detecting professional versus personal closeness using an enterprise social network site. In Proceedings of the 28th International Conference on Human Factors in Computing Systems.