{"title":"使用点击流数据分析的会话来揭示不同类型的Twitter行为","authors":"F. Meier, Johannes Aigner, David Elsweiler","doi":"10.18452/1452","DOIUrl":null,"url":null,"abstract":"While much is known about how Twitter is used for specific tasks or by particular groups of users, we understand surprisingly little about how the service is used generally on a daily basis. To learn more about general Twitter behaviour we perform a cluster analysis on a rich set of longitudinal interaction log data describing interactions 44 users had with the Twitter website over a 5 month period. We report on and interpret 5 clusters representing common usage patterns with the service.","PeriodicalId":90875,"journal":{"name":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","volume":"14 1","pages":"237-250"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Using Sessions from Clickstream Data Analysis to Uncover Different Types of Twitter Behaviour\",\"authors\":\"F. Meier, Johannes Aigner, David Elsweiler\",\"doi\":\"10.18452/1452\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"While much is known about how Twitter is used for specific tasks or by particular groups of users, we understand surprisingly little about how the service is used generally on a daily basis. To learn more about general Twitter behaviour we perform a cluster analysis on a rich set of longitudinal interaction log data describing interactions 44 users had with the Twitter website over a 5 month period. We report on and interpret 5 clusters representing common usage patterns with the service.\",\"PeriodicalId\":90875,\"journal\":{\"name\":\"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics\",\"volume\":\"14 1\",\"pages\":\"237-250\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-03-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.18452/1452\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISI ... : ... IEEE Intelligence and Security Informatics. IEEE International Conference on Intelligence and Security Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18452/1452","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Using Sessions from Clickstream Data Analysis to Uncover Different Types of Twitter Behaviour
While much is known about how Twitter is used for specific tasks or by particular groups of users, we understand surprisingly little about how the service is used generally on a daily basis. To learn more about general Twitter behaviour we perform a cluster analysis on a rich set of longitudinal interaction log data describing interactions 44 users had with the Twitter website over a 5 month period. We report on and interpret 5 clusters representing common usage patterns with the service.