Journal Home > Volume 3 , Issue 4

During the past decades, the term “social computing” has become a promising interdisciplinary area in the intersection of computer science and social science. In this work, we conduct a data-driven study to understand the development of social computing using the data collected from Digital Bibliography and Library Project (DBLP), a representative computer science bibliography website. We have observed a series of trends in the development of social computing, including the evolution of the number of publications, popular keywords, top venues, international collaborations, and research topics. Our findings will be helpful for researchers and practitioners working in relevant fields.


menu
Abstract
Full text
Outline
About this article

Characterizing and Understanding Development of Social Computing Through DBLP: A Data-Driven Analysis

Show Author's information Jiaqi Wu1Bodian Ye1Qingyuan Gong1Atte Oksanen2Cong Li3Jingjing Qu4Felicia F. Tian5Xiang Li6Yang Chen1( )
Shanghai Key Lab of Intelligent Information Processing, the School of Computer Science, Fudan University, Shanghai 200438, China
Faculty of Social Sciences, Tampere University, Tampere 33100, Finland
School of Information Science and Technology, Fudan University, Shanghai 200438, China
Shanghai Artificial Intelligence Laboratory, Shanghai 200232, China
School of Social Development and Public Policy, Fudan University, Shanghai 200433, China
Institute of Complex Networks and Intelligent Systems, Shanghai Research Institute for Intelligent Autonomous Systems, Tongji University, Shanghai 200092, China

Abstract

During the past decades, the term “social computing” has become a promising interdisciplinary area in the intersection of computer science and social science. In this work, we conduct a data-driven study to understand the development of social computing using the data collected from Digital Bibliography and Library Project (DBLP), a representative computer science bibliography website. We have observed a series of trends in the development of social computing, including the evolution of the number of publications, popular keywords, top venues, international collaborations, and research topics. Our findings will be helpful for researchers and practitioners working in relevant fields.

Keywords: evolution, visualization, social computing, Digital Bibliography and Library Project (DBLP), bibliometric

References(48)

[1]

D. Schuler, Social computing, Communications of the ACM, vol. 37, no. 1, pp. 28–29, 1994.

[2]

D. C. Dryer, C. Eisbach, and W. S. Ark, At what cost pervasive? A social computing view of mobile computing systems, IBM Systems Journal, vol. 38, no. 4, pp. 652–676, 1999.

[3]

D. Zeng, F. -Y. Wang, and K. M. Carley, Guest editors’ introduction: Social computing, IEEE Intelligent Systems, vol. 22, no. 5, pp. 20–22, 2007.

[4]

G. Beigi and H. Liu, Identifying novel privacy issues of online users on social media platforms, ACM SIGWEB Newsletter, no. 4, pp. 1–7, 2019.

[5]

X. Zhang, X. Chen, H. Yan, and Y. Xiang, Privacy-preserving and verifiable online crowdsourcing with worker updates, Information Sciences, vol. 548, pp. 212–232, 2021.

[6]
T. Keipi, M. Näsi, A. Oksanen, and P. Räsänen, Online Hate and Harmful Content: Cross-National Perspectives. London, UK: Routledge, 2016.
DOI
[7]
A. Santos and M. Figueras, Instagram and gender inequalities: The discourse of young women regarding social networks, in Proc. Eighth International Conference on Technological Ecosystems for Enhancing Multiculturality, Salamanca Spain, 2020, pp. 577–581.
DOI
[8]

F. -Y. Wang, K. M. Carley, D. Zeng, and W. Mao, Social computing: From social informatics to social intelligence, IEEE Intelligent Systems, vol. 22, no. 2, pp. 79–83, 2007.

[9]

R. K. F. Ip and C. Wagner, Weblogging: A study of social computing and its impact on organizations, Decision Support Systems, vol. 45, no. 2, pp. 242–250, 2008.

[10]

M. Parameswaran and A. B. Whinston, Social computing: An overview, Communications of the Association for Information Systems, vol. 19, no. 1, pp. 762–780, 2007.

[11]
H. Ali-Hassan and D. Nevo, Identifying social computing dimensions: A multidimensional scaling study, presented at the International Conference on Information Systems (ICIS 2009), Phoenix, AZ, USA, 2009.
[12]

T. Wang, Q. Zhang, Z. Liu, W. Liu, and D. Wen, On social computing research collaboration patterns: A social network perspective, Frontiers of Computer Science, vol. 6, no. 1, pp. 122–130, 2012.

[13]

M. R. Lee and T. T. Chen, Understanding social computing research, IT Professional, vol. 15, no. 6, pp. 56–62, 2012.

[14]
Y. Li and K. Joshi, The state of social computing research: A literature review and synthesis using the latent semantic analysis approach, presented at Eighteenth Americas Conference on Information Systems, Seattle, WA, USA, 2012.
[15]
T. K. Landauer, LSA as a theory of meaning, in Handbook of Latent Semantic Analysis, T. K. Landauer, D. S. McNamara, S. Dennis, and W. Kintsch, eds. New York, NY, USA: Psychology Press, 2007, pp. 3–34.
DOI
[16]

Y. Bu, W. Lu, Y. Wu, H. Chen, and Y. Huang, How wide is the citation impact of scientific publications? A cross-discipline and large-scale analysis, Information Processing &Management, vol. 58, no. 1, p. 102429, 2021.

[17]

M. R. Frank, D. Wang, M. Cebrian, and I. Rahwan, The evolution of citation graphs in artificial intelligence research, Nature Machine Intelligence, vol. 1, no. 2, pp. 79–85, 2019.

[18]

Z. Lin, Y. Zhang, Q. Gong, Y. Chen, A. Oksanen, and A. Y. Ding, Structural hole theory in social network analysis: A review, IEEE Transactions on Computational Social Systems, vol. 9, no. 3, pp. 724–739, 2022.

[19]

S. P. Borgatti, Structural holes: Unpacking Burt’s redundancy measures, Connections, vol. 20, no. 1, pp. 35–38, 1997.

[20]

X. Chen, J. Chen, D. Wu, Y. Xie, and J. Li, Mapping the research trends by co-word analysis based on keywords from funded project, Procedia Computer Science, vol. 91, pp. 547–555, 2016.

[21]

F. Madani and C. Weber, The evolution of patent mining: Applying bibliometrics analysis and keyword network analysis, World Patent Information, vol. 46, pp. 32–48, 2016.

[22]

M. Ley, DBLP: Some lessons learned, Proc. VLDB Endow., vol. 2, no. 2, pp. 1493–1500, 2009.

[23]

L. Ceriani and P. Verme, The origins of the Gini index: Extracts from Variabilità e Mutabilità (1912) by Corrado Gini, The Journal of Economic Inequality, vol. 10, no. 3, pp. 421–443, 2012.

[24]
K. A. Nolan and J. E. Callahan, Beachcomber biology: The Shannon-Weiner species diversity index, in Proc. 27th Workshop/Conference of the Association for Biology Laboratory Education (ABLE), West Lafayette, IN, USA, 2006, pp. 334–338.
[25]

Q. Gong, Y. Chen, J. Hu, Q. Cao, P. Hui, and X. Wang, Understanding cross-site linking in online social networks, ACM Transactions on the Web, vol. 12, no. 4, pp. 1–29, 2018.

[26]

Y. Chen, J. Hu, Y. Xiao, X. Li, and P. Hui, Understanding the user behavior of foursquare: A data-driven study on a global scale, IEEE Transactions on Computational Social Systems, vol. 7, no. 4, pp. 1019–1032, 2020.

[27]

R. Campos, V. Mangaravite, A. Pasquali, A. Jorge, C. Nunes, and A. Jatowt, YAKE! Keyword extraction from single documents using multiple local features, Information Sciences, vol. 509, pp. 257–289, 2020.

[28]

Y. Huang, L. Yu, X. Wang, and B. Cui, A multi-source integration framework for user occupation inference in social media systems, World Wide Web, vol. 18, no. 5, pp. 1247–1267, 2015.

[29]
V. Chandola, S. R. Sukumar, and J. C. Schryver, Knowledge discovery from massive healthcare claims data, in Proc. 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, IL, USA 2013, pp. 1312–1320.
DOI
[30]

N. Albadi, M. Kurdi, and S. Mishra, Investigating the effect of combining GRU neural networks with handcrafted features for religious hatred detection on Arabic Twitter space, Social Network Analysis and Mining, vol. 9, no. 1, p. 41, 2019.

[31]

A. Kumar, K. Srinivasan, W. -H. Cheng, and A. Y. Zomaya, Hybrid context enriched deep learning model for fine-grained sentiment analysis in textual and visual semiotic modality social data, Information Processing &Management, vol. 57, no. 1, p. 102141, 2020.

[32]

H. Liu, Y. Ge, Q. Zheng, R. Lin, and H. Li, Detecting global and local topics via mining Twitter data, Neurocomputing, vol. 273, pp. 120–132, 2018.

[33]

C. Y. Chiu, H. Y. Lane, J. L. Koh, and A. L. Chen, Multimodal depression detection on instagram considering time interval of posts, Journal of Intelligent Information Systems, vol. 56, no. 1, pp. 25–47, 2021.

[34]

A. Al-Zoubi, H. Faris, J. Alqatawna, and M. A. Hassonah, Evolving support vector machines using whale optimization algorithm for spam profiles detection on online social networks in different lingual contexts, Knowledge-Based Systems, vol. 153, pp. 91–104, 2018.

[35]
J. Cao, Social context modelling and recognition: Current work and future directions, in Proc. 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Kona, HI, USA, 2017, pp. 243–243.
[36]

J. Moody, The structure of a social science collaboration network: Disciplinary cohesion from 1963 to 1999, American Sociological Review, vol. 69, no. 2, pp. 213–238, 2004.

[37]

J. Wang, G. Su, C. Wan, X. Huang, and L. Sun, A keyword-based literature review data generating algorithm—Analyzing a field from scientific publications, Symmetry, vol. 12, no. 6, p. 903, 2020.

[38]
M. Dredze, H. M. Wallach, D. Puller, and F. Pereira, Generating summary keywords for emails using topics, in Proc. 13th International Conference on Intelligent User Interfaces, Gran Canaria, Spain, 2008, pp. 199–206.
DOI
[39]
A. Joshi and R. Motwani, Keyword generation for search engine advertising, in Proc. Sixth IEEE International Conference on Data Mining - Workshops (ICDMW’06), Hong Kong, China, 2006, pp. 490–496.
DOI
[40]

C. D. Hurt, Automatically generated keywords: A comparison to author-generated keywords in the sciences, Journal of Information and Organizational Sciences, vol. 34, no. 1, pp. 81–88, 2010.

[41]

Q. Gong, Y. Chen, X. He, Z. Zhuang, T. Wang, H. Huang, X. Wang, and X. Fu, DeepScan: Exploiting deep learning for malicious account detection in location-based social networks, IEEE Communications Magazine, vol. 56, no. 11, pp. 21–27, 2018.

[42]

Q. Gong, Y. Chen, X. He, Y. Xiao, P. Hui, X. Wang, and X. Fu, Cross-site prediction on social influence for cold-start users in online social networks, ACM Transactions on the Web, vol. 15, no. 2, pp. 1–23, 2021.

[43]

X. He, Q. Gong, Y. Chen, Y. Zhang, X. Wang, and X. Fu, DatingSec: Detecting malicious accounts in dating apps using a content-based attention network, IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 5, pp. 2193–2208, 2021.

[44]

T. K. Balaji, C. S. R. Annavarapu, and A. Bablani, Machine learning algorithms for social media analysis: A survey, Computer Science Review, vol. 40, p. 100395, 2021.

[45]

J. Grimmer, M. E. Roberts, and B. M. Stewart, Machine learning for social science: An agnostic approach, Annual Review of Political Science, vol. 24, pp. 395–419, 2021.

[46]

C. Li, S. Zhang, and X. Li, Can multiple social ties help improve human location prediction? Physica A:Statistical Mechanics and its Applications, vol. 525, pp. 1276–1288, 2019.

[47]
Y. Liu, X. Shi, L. Pierce, and X. Ren, Characterizing and forecasting user engagement with in-app action graph: A case study of snapchat, in Proc. 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Anchorage, AK, USA, 2019, pp. 2023–2031.
DOI
[48]

Y. Chen, X. Wu, A. Hu, G. He, and G. Ju, Social prediction: A new research paradigm based on machine learning, The Journal of Chinese Sociology, vol. 8, p. 15, 2021.

Publication history
Copyright
Rights and permissions

Publication history

Received: 27 October 2022
Revised: 05 January 2023
Accepted: 12 January 2023
Published: 31 December 2022
Issue date: December 2022

Copyright

© The author(s) 2022

Rights and permissions

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return