Computational Intelligence - August 2016 - 8

Guest
Editorial

Erik Cambria
School of Computer Science and Engineering,
Nanyang Technological University, Singapore
Newton Howard
University of Oxford, UK
Yunqing Xia
Microsoft Research Asia, China
Tat-Seng Chua
National University of Singapore, Singapore

Computational Intelligence for Big Social Data Analysis

I

n the eras of social connectedness
and social colonization, people are
becoming increasingly enthusiastic
about interacting, sharing, and collaborating through online collaborative
media. In recent years, this collective
intelligence has spread to many different
areas, with particular focus on fields
related to everyday life such as commerce, tourism, education, and health,
causing the size of the Social Web to
expand exponentially. The distillation of
knowledge from such a large amount of
unstructured information, however, is an
extremely difficult task, as the contents
of today's Web are perfectly suitable for
human consumption, but remain hardly
understandable to machines.
Big social data analysis grows out of
this need and combines multiple disciplines such as social network analysis,
multimedia management, social media
analytics, trend discovery, and opinion
mining. For example, studying the evolution of a social network merely as a
graph is very limited as it does not take
into account the information flowing
between network nodes. Similarly,
-processing social interaction contents
between network members without taking into account connections between
them is limited by the fact that information flows cannot be properly weighted.
Big social data analysis, instead, aims to
study large-scale Web phenomena such
as social networks from a holistic point
of view, i.e., by concurrently taking into
Digital Object Identifier 10.1109/MCI.2016.2572481
Date of publication: 18 July 2016

8

account all the socio-technical aspects
involved in their dynamic evolution.
Hence, big social data analysis is inherently interdisciplinary and spans areas
such as machine learning, graph mining,
information retrieval, knowledge-based
systems, linguistics, common-sense reasoning, natural language processing, and
big data computing.
Big social data analysis finds applications in several different scenarios. There
is a good number of companies, large
and small, that include the analysis of
social data as part of their missions. Big
social data analysis can be exploited for
the creation and automated upkeep of
review and opinion aggregation websites, in which opinionated text and videos are continuously gathered from the
Web and not restricted only to product
reviews, but also to wider topics such as
political issues and brand perception. Big
social data analysis has also a great
potential as a sub-component technology for other systems. They can enhance
the capabilities of customer relationship
management and recommendation systems allowing, for example, to find out
which features customers are particularly
happy about or to exclude the recommendations items that have received
very negative feedbacks. Similarly, they
can be exploited for affective tutoring
and affective entertainment or for troll
filtering and spam detection in online
social communication.
Business intelligence is also one of
the main factors behind corporate interest in big social data analysis. Nowadays,
companies invest an increasing amount

IEEE Computational intelligence magazine | August 2016

of money in marketing strategies and
they are constantly interested in both
collecting and predicting the attitudes of
the general public towards their products and brands. The design of automatic
tools capable to mine sentiments over
the Web in real-time and to create condensed versions of them represents one
of the most active research and development areas. The development of such
systems, moreover, is not only important
for commercial purposes, but also for
government intelligence applications
able to monitor increases in hostile
communications or to model cyberissue diffusion.
Several commercial and academic
tools track public viewpoints on a largescale by offering graphical summarizations of trends and opinions in the
blogosphere. Nevertheless, most commercial off-the-shelf (COTS) tools are
limited to a polarity evaluation or a
mood classification according to a very
limited set of emotions. In addition,
such methods mainly rely on parts of
text in which emotional states are
explicitly expressed and, hence, they are
unable to capture opinions and sentiments that are expressed implicitly.
Because they are mainly based on statistical properties associated with words, in
fact, many COTS tools are easily tricked
by linguistic operators such as negation
and disjunction.
The main motivation for this Special
Issue is to explore how computational
intelligence can help overcome such
hurdles through new forms of processing that can handle high volume, high



Table of Contents for the Digital Edition of Computational Intelligence - August 2016

Computational Intelligence - August 2016 - Cover1
Computational Intelligence - August 2016 - Cover2
Computational Intelligence - August 2016 - 1
Computational Intelligence - August 2016 - 2
Computational Intelligence - August 2016 - 3
Computational Intelligence - August 2016 - 4
Computational Intelligence - August 2016 - 5
Computational Intelligence - August 2016 - 6
Computational Intelligence - August 2016 - 7
Computational Intelligence - August 2016 - 8
Computational Intelligence - August 2016 - 9
Computational Intelligence - August 2016 - 10
Computational Intelligence - August 2016 - 11
Computational Intelligence - August 2016 - 12
Computational Intelligence - August 2016 - 13
Computational Intelligence - August 2016 - 14
Computational Intelligence - August 2016 - 15
Computational Intelligence - August 2016 - 16
Computational Intelligence - August 2016 - 17
Computational Intelligence - August 2016 - 18
Computational Intelligence - August 2016 - 19
Computational Intelligence - August 2016 - 20
Computational Intelligence - August 2016 - 21
Computational Intelligence - August 2016 - 22
Computational Intelligence - August 2016 - 23
Computational Intelligence - August 2016 - 24
Computational Intelligence - August 2016 - 25
Computational Intelligence - August 2016 - 26
Computational Intelligence - August 2016 - 27
Computational Intelligence - August 2016 - 28
Computational Intelligence - August 2016 - 29
Computational Intelligence - August 2016 - 30
Computational Intelligence - August 2016 - 31
Computational Intelligence - August 2016 - 32
Computational Intelligence - August 2016 - 33
Computational Intelligence - August 2016 - 34
Computational Intelligence - August 2016 - 35
Computational Intelligence - August 2016 - 36
Computational Intelligence - August 2016 - 37
Computational Intelligence - August 2016 - 38
Computational Intelligence - August 2016 - 39
Computational Intelligence - August 2016 - 40
Computational Intelligence - August 2016 - 41
Computational Intelligence - August 2016 - 42
Computational Intelligence - August 2016 - 43
Computational Intelligence - August 2016 - 44
Computational Intelligence - August 2016 - 45
Computational Intelligence - August 2016 - 46
Computational Intelligence - August 2016 - 47
Computational Intelligence - August 2016 - 48
Computational Intelligence - August 2016 - 49
Computational Intelligence - August 2016 - 50
Computational Intelligence - August 2016 - 51
Computational Intelligence - August 2016 - 52
Computational Intelligence - August 2016 - 53
Computational Intelligence - August 2016 - 54
Computational Intelligence - August 2016 - 55
Computational Intelligence - August 2016 - 56
Computational Intelligence - August 2016 - 57
Computational Intelligence - August 2016 - 58
Computational Intelligence - August 2016 - 59
Computational Intelligence - August 2016 - 60
Computational Intelligence - August 2016 - 61
Computational Intelligence - August 2016 - 62
Computational Intelligence - August 2016 - 63
Computational Intelligence - August 2016 - 64
Computational Intelligence - August 2016 - 65
Computational Intelligence - August 2016 - 66
Computational Intelligence - August 2016 - 67
Computational Intelligence - August 2016 - 68
Computational Intelligence - August 2016 - 69
Computational Intelligence - August 2016 - 70
Computational Intelligence - August 2016 - 71
Computational Intelligence - August 2016 - 72
Computational Intelligence - August 2016 - 73
Computational Intelligence - August 2016 - 74
Computational Intelligence - August 2016 - 75
Computational Intelligence - August 2016 - 76
Computational Intelligence - August 2016 - Cover3
Computational Intelligence - August 2016 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com