Guide to Tools for Social Media & Web Analytics and Insights
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Discover the Golden Paths, Unique Sequences and Marvelous Associations out of Your Big Data Using Link Analysis in SAS® Enterprise Miner TM
MWSUG 2016 – Paper AA04 Discover the golden paths, unique sequences and marvelous associations out of your big data using Link Analysis in SAS® Enterprise Miner TM Delali Agbenyegah, Alliance Data Systems, Columbus, OH Candice Zhang, Alliance Data Systems, Columbus, OH ABSTRACT The need to extract useful information from large amount of data to positively influence business decisions is on the rise especially with the hyper expansion of retail data collection and storage and the advancement in computing capabilities. Many enterprises now have well established databases to capture Omni channel customer transactional behavior at the product or Store Keeping Unit (SKU) level. Crafting a robust analytical solution that utilizes these rich transactional data sources to create customized marketing incentives and product recommendations in a timely fashion to meet the expectations of the sophisticated shopper in our current generation can be daunting. Fortunately, the Link Analysis node in SAS® Enterprise Miner TM provides a simple but yet powerful analytical tool to extract, analyze, discover and visualize the relationships or associations (links) and sequences between items in a transactional data set up and develop item-cluster induced segmentation of customers as well as next-best offer recommendations. In this paper, we discuss the basic elements of Link Analysis from a statistical perspective and provide a real life example that leverages Link Analysis within SAS Enterprise Miner to discover amazing transactional paths, sequences and links. INTRODUCTION A financial fraud investigator may be interested in exploring the relationship between the financial transactions of suspicious customers, the BNI may want to analyze the social network of individuals identified as terrorists to conduct further investigation or a medical doctor may be interested in understanding the association between different medical treatments on patients and their corresponding results. -
Networkx: Network Analysis with Python
NetworkX: Network Analysis with Python Salvatore Scellato Full tutorial presented at the XXX SunBelt Conference “NetworkX introduction: Hacking social networks using the Python programming language” by Aric Hagberg & Drew Conway Outline 1. Introduction to NetworkX 2. Getting started with Python and NetworkX 3. Basic network analysis 4. Writing your own code 5. You are ready for your project! 1. Introduction to NetworkX. Introduction to NetworkX - network analysis Vast amounts of network data are being generated and collected • Sociology: web pages, mobile phones, social networks • Technology: Internet routers, vehicular flows, power grids How can we analyze this networks? Introduction to NetworkX - Python awesomeness Introduction to NetworkX “Python package for the creation, manipulation and study of the structure, dynamics and functions of complex networks.” • Data structures for representing many types of networks, or graphs • Nodes can be any (hashable) Python object, edges can contain arbitrary data • Flexibility ideal for representing networks found in many different fields • Easy to install on multiple platforms • Online up-to-date documentation • First public release in April 2005 Introduction to NetworkX - design requirements • Tool to study the structure and dynamics of social, biological, and infrastructure networks • Ease-of-use and rapid development in a collaborative, multidisciplinary environment • Easy to learn, easy to teach • Open-source tool base that can easily grow in a multidisciplinary environment with non-expert users -
Ent-Social-Intelligence-Report.Pdf
Contents 1.0.0 EXECUTIVE SUMMARY ................................................................................. 3 2.0.0 INTRODUCTION ............................................................................................. 4 2.1. Social Intelligence for the Social Business ....................................................................... 5 2.2. Risks of an “All-in-One” Solution ....................................................................................... 5 3.0.0 THE SOCIAL INTELLIGENCE STACK .......................................................... 7 3.1.0 Brandwatch Social Intelligence Model ............................................................................. 8 3.2.0 Social Listening ................................................................................................................. 9 3.3.0 Data Management ............................................................................................................ 10 3.3.1 Data Management: Automation ..................................................................................... 10 3.3.2 Data Management: Workflow ......................................................................................... 10 3.3.3 Data Management: Dashboards .................................................................................... 11 3.4.0 Advanced Analytics ......................................................................................................... 11 3.4.1 Advanced Analytics: Advanced Boolean ...................................................................... -
What Is a Rate Limit?
What is a Rate Limit? When you add a content source to a monitor, in order for the monitor to collect data from that content source, it needs to make a call to the content source on your behalf. Some content sources put a limit on how many calls for data you can make over a period of time; this is called a rate limit. These rate limits are set by the content source, not by Crimson Hexagon. Specifically, Instagram and Facebook set limits on how much data you can pull from those sites, and Twitter sets a limit on how much data you can export from a monitor using the Bulk Export function. Instagram Rate Limit Instagram sets a limit of 200 calls per Instagram account per hour, the number of calls to be made depends on how much data a hashtag/account has. Please note: Due to Instagram access changes, Instagram Social Account Monitors are only available to the Instagram account owners. For more information, please see the article Instagram Social Account Monitor Update. Facebook Rate Limit Facebook’s rate limit is set per Facebook account over a period of time.. Facebook allowance tends to be heavily sourced by the amount of users. Therefore, it is always advised to add as many Facebook credentials to your team as you can. Twitter Rate Limit Twitter sets a rate limit on how many posts you can export from an analysis monitor per Twitter account per day, which is 50,000 posts. For guidance on adding social account credentials to a team, please refer to the article Social Account Credentials: Overview. -
Análisis De Klout Y Peerindex
HERRAMIENtas WEB para LA MEDICIÓN DE LA INFLUENCIA digital: ANÁLISIS DE KLOUT Y PEERINDEX Javier Serrano-Puche Javier Serrano-Puche, profesor de teoría de la comunicación en la Universidad de Navarra, in- vestiga los fundamentos teóricos de la comunicación, y sobre todo del periodismo, con interés por el ámbito digital 2.0. En especial estudia las redes sociales, tanto por sus implicaciones para la expresión de la identidad personal como en la conformación de la esfera pública. Es autor de La verdad recobrada en la escritura (2011), una biografía intelectual de Leonardo Sciascia. Sobre este escritor siciliano también ha publicado numerosos ensayos en diversas revistas españolas y extranjeras. Universidad de Navarra Departamento de Comunicación Pública Edif. Biblioteca, 31080 Pamplona, España [email protected] Resumen Cada vez más es reconocida la relevancia en el entorno digital de los “líderes de opinión” o usuarios influyentes: aquellos que por medio de su actividad online (publicación de tweets y entradas en blogs, actualización de su estado en las redes sociales, recomendación de lecturas…), cumplen con la función de crear contenidos o de filtrarlos hacia personas sobre las que tienen ascendencia. Por eso han proliferado las herramientas que evalúan la influencia de una persona o marca a través de la monitorización de su uso de los medios sociales. Se analizan las dos más importantes: Klout y PeerIndex. Se explican los parámetros que constituyen la base de sus algoritmos de medición, así como sus carencias. La comprensión de cómo se ejerce y cómo puede medirse la influencia digital es una de las cuestiones más interesantes del fenómeno 2.0. -
Link Analysis Using SAS Enterprise Miner
Link Analysis Using SAS® Enterprise Miner™ Ye Liu, Taiyeong Lee, Ruiwen Zhang, and Jared Dean SAS Institute Inc. ABSTRACT The newly added Link Analysis node in SAS® Enterprise MinerTM visualizes a network of items or effects by detecting the linkages among items in transactional data or the linkages among levels of different variables in training data or raw data. This node also provides multiple centrality measures and cluster information among items so that you can better understand the linkage structure. In addition to the typical linkage analysis, the node also provides segmentation that is induced by the item clusters, and uses weighted confidence statistics to provide next-best-offer lists for customers. Examples that include real data sets show how to use the SAS Enterprise Miner Link Analysis node. INTRODUCTION Link analysis is a popular network analysis technique that is used to identify and visualize relationships (links) between different objects. The following questions could be nontrivial: Which websites link to which other ones? What linkage of items can be observed from consumers’ market baskets? How is one movie related to another based on user ratings? How are different petal lengths, width, and color linked by different, but related, species of flowers? How are specific variable levels related to each other? These relationships are all visible in data, and they all contain a wealth of information that most data mining techniques cannot take direct advantage of. In today’s ever-more-connected world, understanding relationships and connections is critical. Link analysis is the data mining technique that addresses this need. In SAS Enterprise Miner, the new Link Analysis node can take two kinds of input data: transactional data and non- transactional data (training data or raw data). -
Evolving Networks and Social Network Analysis Methods And
DOI: 10.5772/intechopen.79041 ProvisionalChapter chapter 7 Evolving Networks andand SocialSocial NetworkNetwork AnalysisAnalysis Methods and Techniques Mário Cordeiro, Rui P. Sarmento,Sarmento, PavelPavel BrazdilBrazdil andand João Gama Additional information isis available atat thethe endend ofof thethe chapterchapter http://dx.doi.org/10.5772/intechopen.79041 Abstract Evolving networks by definition are networks that change as a function of time. They are a natural extension of network science since almost all real-world networks evolve over time, either by adding or by removing nodes or links over time: elementary actor-level network measures like network centrality change as a function of time, popularity and influence of individuals grow or fade depending on processes, and events occur in net- works during time intervals. Other problems such as network-level statistics computation, link prediction, community detection, and visualization gain additional research impor- tance when applied to dynamic online social networks (OSNs). Due to their temporal dimension, rapid growth of users, velocity of changes in networks, and amount of data that these OSNs generate, effective and efficient methods and techniques for small static networks are now required to scale and deal with the temporal dimension in case of streaming settings. This chapter reviews the state of the art in selected aspects of evolving social networks presenting open research challenges related to OSNs. The challenges suggest that significant further research is required in evolving social networks, i.e., existent methods, techniques, and algorithms must be rethought and designed toward incremental and dynamic versions that allow the efficient analysis of evolving networks. Keywords: evolving networks, social network analysis 1. -
The Scoring of America: How Secret Consumer Scores Threaten Your Privacy and Your Future
World Privacy Forum The Scoring of America: How Secret Consumer Scores Threaten Your Privacy and Your Future By Pam Dixon and Robert Gellman April 2, 2014 Brief Summary of Report This report highlights the unexpected problems that arise from new types of predictive consumer scoring, which this report terms consumer scoring. Largely unregulated either by the Fair Credit Reporting Act or the Equal Credit Opportunity Act, new consumer scores use thousands of pieces of information about consumers’ pasts to predict how they will behave in the future. Issues of secrecy, fairness of underlying factors, use of consumer information such as race and ethnicity in predictive scores, accuracy, and the uptake in both use and ubiquity of these scores are key areas of focus. The report includes a roster of the types of consumer data used in predictive consumer scores today, as well as a roster of the consumer scores such as health risk scores, consumer prominence scores, identity and fraud scores, summarized credit statistics, among others. The report reviews the history of the credit score – which was secret for decades until legislation mandated consumer access -- and urges close examination of new consumer scores for fairness and transparency in their factors, methods, and accessibility to consumers. About the Authors Pam Dixon is the founder and Executive Director of the World Privacy Forum. She is the author of eight books, hundreds of articles, and numerous privacy studies, including her landmark Medical Identity Theft study and One Way Mirror Society study. She has testified before Congress on consumer privacy issues as well as before federal agencies. -
Creating a 'Democracy for Everyone' 3 Foreword
Creating a ‘Democracy for everyone’ Jim Macnamara PhD, FAMEC, FAMI, CPM, FPRIA Strategies for increasing listening and engagement by government © Copyright 2017 The London School of Economics and Political Science, Houghton St, London, WC2A 2AE, UK University of Technology Sydney, PO Box 123, Broadway, NSW, 2007, Australia Foreword: Professor Nick Couldry PhD The London School of Economics and Political Science, Media and Communications Department Author: Professor Jim Macnamara PhD, FAMEC, FAMI, CPM, FPRIA Professor of Public Communication, University of Technology Sydney Visiting Professor, The London School of Economics and Political Science E-mail: [email protected] Citation: APA: Macnamara, J. (2017). Creating a ‘democracy for everyone’: Strategies for increasing listening and engagement by government. London, UK and Sydney, NSW: The London School of Economics and Political Science and University of Technology Sydney. Harvard: Macnamara, J. 2017, ‘Creating a ‘democracy for everyone’: Strategies for increasing listening and engagement by government’, The London School of Economics and Political Science and University of Technology Sydney, London and Sydney. Acknowledgements: This is an independent report. The conclusions and views expressed are those of the author and do not necessarily reflect the views of the organisations that supported or participated in this research. Support for this research was provided by the UK Government Communication Service (GCS), which is headquartered in the Prime Minister’s Office and the Cabinet -
On Some Aspects of Link Analysis and Informal Network in Social Network Platform
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 2, Issue. 7, July 2013, pg.371 – 377 RESEARCH ARTICLE On Some Aspects of Link Analysis and Informal Network in Social Network Platform Subrata Paul Department of Computer Science and Engineering, M.I.T.S. Rayagada, Odisha 765017, INDIA [email protected] Abstract— This paper presents a review on the two important aspects of Social Network, namely Link Analysis and Informal Network. Both of these characteristic plays a vital role in analysis of direction of information flow and reliability of the information passed or received. They can be easily visualized or can be studied using the concepts of graph theory. We have deliberately omitted discussing about general definitions of social network and representing the relationship between actors as a graph with nodes and edges. This paper starts with a formal definition of Informal Network and continues with some of its major aspects. Moreover its application is explained with a real life example of a college scenario. In the later part of the paper, some aspects of Informal Network have been presented. The similar kind of real life scenario is also being drawn out here to represent application of informal network. Lastly, this paper ends with a general conclusion on these two topics. Key Terms: - Social Network; Link Analysis; Information Overload; Formal Network; Informal Network I. INTRODUCTION Link analysis is a data-analysis technique used to evaluate relationships (connections) between nodes. Relationships may be identified among various types of nodes (objects), including organizations, people and transactions. -
Comment Submitted by David Crawley Comment View Document
Comment Submitted by David Crawley Comment View document: The notion that my social media identifier should have anything to do with entering the country is a shockingly Nazi like rule. The only thing that this could facilitate anyway is trial by association - something that is known to ensnare innocent people, and not work. What is more this type of thing is repugnant to a free society. The fact that it is optional doesn't help - as we know that this "optional" thing will soon become not-optional. If your intent was to keep it optional - why even bother? Most importantly the rules that we adopt will tend to get adopted by other countries and frankly I don't trust China, India, Turkey or even France all countries that I regularly travel to from the US with this information. We instead should be a beacon for freedom - and we fail in our duty when we try this sort of thing. Asking for social media identifier should not be allowed here or anywhere. Comment Submitted by David Cain Comment View document: I am firmly OPPOSED to the inclusion of a request - even a voluntary one - for social media profiles on the I-94 form. The government should NOT be allowed to dip into users' social media activity, absent probable cause to suspect a crime has been committed. Bad actors are not likely to honor the request. Honest citizens are likely to fill it in out of inertia. This means that the pool of data that is built and retained will serve as a fishing pond for a government looking to control and exploit regular citizens. -
Travelsofadam-Media2013.Pdf
IT’S A BLOG ABOUT Travels of Adam is a top-rated travel website & blog of unique and interesting stories from around the world. The site receives over 50,000 page views per month from 100+ countries. Readers are modern, open-minded and socially responsible individuals with a very strong interest in travel and city destinations. Adam strives to find interesting and unique stories from around the world, whether political tours, art exhibits or destination guides. WHY BLOG? Travels of Adam is consistently ranked among the top 50 travel blogs by numerous online sources and is a featured source of information on the travel industry, specifically “hipster travel.” Advertising on travelsofadam.com, it’s possible to reach a highly commercial demographic. Readers consistently use the site as a source for useful & interesting travel information. Readers have been known to purchase tours, visit recommended travel websites & change travel itineraries based on recommendations published on this website. Travels of Adam.com March 2013 EDITORIAL ART, MUSIC, DESIGN & PHOTOGRAPHY With a background in graphic design, Adam writes about museums, art galleries, exhibits and unusual architecture. Read: David Guetta live in Berlin ALTERNATIVE THINGS TO DO Popular posts include alternative city guides with information on graffiti, interesting tours, local blogs and unique restaurants. Read: Alternative things to do in Tel Aviv HOTEL & ACCOMMODATION REVIEWS POLITICAL & SOCIAL ISSUES With a section devoted entirely to hotel and other accommodation reviews, Adam is able to provide honest feedback to readers on Travel isn’t just about visiting landscapes & famous tourist sites where to stay. Adam is also the curator and founder of a growing but also learning about the local political climate and culture.