During the past decades, the term “social computing” has become a promising interdisciplinary area in the intersection of computer science and social science. In this work, we conduct a data-driven study to understand the development of social computing using the data collected from Digital Bibliography and Library Project (DBLP), a representative computer science bibliography website. We have observed a series of trends in the development of social computing, including the evolution of the number of publications, popular keywords, top venues, international collaborations, and research topics. Our findings will be helpful for researchers and practitioners working in relevant fields.
D. Schuler, Social computing, Communications of the ACM, vol. 37, no. 1, pp. 28–29, 1994.
D. C. Dryer, C. Eisbach, and W. S. Ark, At what cost pervasive? A social computing view of mobile computing systems, IBM Systems Journal, vol. 38, no. 4, pp. 652–676, 1999.
D. Zeng, F. -Y. Wang, and K. M. Carley, Guest editors’ introduction: Social computing, IEEE Intelligent Systems, vol. 22, no. 5, pp. 20–22, 2007.
G. Beigi and H. Liu, Identifying novel privacy issues of online users on social media platforms, ACM SIGWEB Newsletter, no. 4, pp. 1–7, 2019.
X. Zhang, X. Chen, H. Yan, and Y. Xiang, Privacy-preserving and verifiable online crowdsourcing with worker updates, Information Sciences, vol. 548, pp. 212–232, 2021.
F. -Y. Wang, K. M. Carley, D. Zeng, and W. Mao, Social computing: From social informatics to social intelligence, IEEE Intelligent Systems, vol. 22, no. 2, pp. 79–83, 2007.
R. K. F. Ip and C. Wagner, Weblogging: A study of social computing and its impact on organizations, Decision Support Systems, vol. 45, no. 2, pp. 242–250, 2008.
M. Parameswaran and A. B. Whinston, Social computing: An overview, Communications of the Association for Information Systems, vol. 19, no. 1, pp. 762–780, 2007.
T. Wang, Q. Zhang, Z. Liu, W. Liu, and D. Wen, On social computing research collaboration patterns: A social network perspective, Frontiers of Computer Science, vol. 6, no. 1, pp. 122–130, 2012.
M. R. Lee and T. T. Chen, Understanding social computing research, IT Professional, vol. 15, no. 6, pp. 56–62, 2012.
Y. Bu, W. Lu, Y. Wu, H. Chen, and Y. Huang, How wide is the citation impact of scientific publications? A cross-discipline and large-scale analysis, Information Processing &Management, vol. 58, no. 1, p. 102429, 2021.
M. R. Frank, D. Wang, M. Cebrian, and I. Rahwan, The evolution of citation graphs in artificial intelligence research, Nature Machine Intelligence, vol. 1, no. 2, pp. 79–85, 2019.
Z. Lin, Y. Zhang, Q. Gong, Y. Chen, A. Oksanen, and A. Y. Ding, Structural hole theory in social network analysis: A review, IEEE Transactions on Computational Social Systems, vol. 9, no. 3, pp. 724–739, 2022.
S. P. Borgatti, Structural holes: Unpacking Burt’s redundancy measures, Connections, vol. 20, no. 1, pp. 35–38, 1997.
X. Chen, J. Chen, D. Wu, Y. Xie, and J. Li, Mapping the research trends by co-word analysis based on keywords from funded project, Procedia Computer Science, vol. 91, pp. 547–555, 2016.
F. Madani and C. Weber, The evolution of patent mining: Applying bibliometrics analysis and keyword network analysis, World Patent Information, vol. 46, pp. 32–48, 2016.
M. Ley, DBLP: Some lessons learned, Proc. VLDB Endow., vol. 2, no. 2, pp. 1493–1500, 2009.
L. Ceriani and P. Verme, The origins of the Gini index: Extracts from Variabilità e Mutabilità (1912) by Corrado Gini, The Journal of Economic Inequality, vol. 10, no. 3, pp. 421–443, 2012.
Q. Gong, Y. Chen, J. Hu, Q. Cao, P. Hui, and X. Wang, Understanding cross-site linking in online social networks, ACM Transactions on the Web, vol. 12, no. 4, pp. 1–29, 2018.
Y. Chen, J. Hu, Y. Xiao, X. Li, and P. Hui, Understanding the user behavior of foursquare: A data-driven study on a global scale, IEEE Transactions on Computational Social Systems, vol. 7, no. 4, pp. 1019–1032, 2020.
R. Campos, V. Mangaravite, A. Pasquali, A. Jorge, C. Nunes, and A. Jatowt, YAKE! Keyword extraction from single documents using multiple local features, Information Sciences, vol. 509, pp. 257–289, 2020.
Y. Huang, L. Yu, X. Wang, and B. Cui, A multi-source integration framework for user occupation inference in social media systems, World Wide Web, vol. 18, no. 5, pp. 1247–1267, 2015.
N. Albadi, M. Kurdi, and S. Mishra, Investigating the effect of combining GRU neural networks with handcrafted features for religious hatred detection on Arabic Twitter space, Social Network Analysis and Mining, vol. 9, no. 1, p. 41, 2019.
A. Kumar, K. Srinivasan, W. -H. Cheng, and A. Y. Zomaya, Hybrid context enriched deep learning model for fine-grained sentiment analysis in textual and visual semiotic modality social data, Information Processing &Management, vol. 57, no. 1, p. 102141, 2020.
H. Liu, Y. Ge, Q. Zheng, R. Lin, and H. Li, Detecting global and local topics via mining Twitter data, Neurocomputing, vol. 273, pp. 120–132, 2018.
C. Y. Chiu, H. Y. Lane, J. L. Koh, and A. L. Chen, Multimodal depression detection on instagram considering time interval of posts, Journal of Intelligent Information Systems, vol. 56, no. 1, pp. 25–47, 2021.
A. Al-Zoubi, H. Faris, J. Alqatawna, and M. A. Hassonah, Evolving support vector machines using whale optimization algorithm for spam profiles detection on online social networks in different lingual contexts, Knowledge-Based Systems, vol. 153, pp. 91–104, 2018.
J. Moody, The structure of a social science collaboration network: Disciplinary cohesion from 1963 to 1999, American Sociological Review, vol. 69, no. 2, pp. 213–238, 2004.
J. Wang, G. Su, C. Wan, X. Huang, and L. Sun, A keyword-based literature review data generating algorithm—Analyzing a field from scientific publications, Symmetry, vol. 12, no. 6, p. 903, 2020.
C. D. Hurt, Automatically generated keywords: A comparison to author-generated keywords in the sciences, Journal of Information and Organizational Sciences, vol. 34, no. 1, pp. 81–88, 2010.
Q. Gong, Y. Chen, X. He, Z. Zhuang, T. Wang, H. Huang, X. Wang, and X. Fu, DeepScan: Exploiting deep learning for malicious account detection in location-based social networks, IEEE Communications Magazine, vol. 56, no. 11, pp. 21–27, 2018.
Q. Gong, Y. Chen, X. He, Y. Xiao, P. Hui, X. Wang, and X. Fu, Cross-site prediction on social influence for cold-start users in online social networks, ACM Transactions on the Web, vol. 15, no. 2, pp. 1–23, 2021.
X. He, Q. Gong, Y. Chen, Y. Zhang, X. Wang, and X. Fu, DatingSec: Detecting malicious accounts in dating apps using a content-based attention network, IEEE Transactions on Dependable and Secure Computing, vol. 18, no. 5, pp. 2193–2208, 2021.
T. K. Balaji, C. S. R. Annavarapu, and A. Bablani, Machine learning algorithms for social media analysis: A survey, Computer Science Review, vol. 40, p. 100395, 2021.
J. Grimmer, M. E. Roberts, and B. M. Stewart, Machine learning for social science: An agnostic approach, Annual Review of Political Science, vol. 24, pp. 395–419, 2021.
C. Li, S. Zhang, and X. Li, Can multiple social ties help improve human location prediction? Physica A:Statistical Mechanics and its Applications, vol. 525, pp. 1276–1288, 2019.
The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).