Gupta, J. P., Menon, K., K
¨
arkk
¨
ainen, H., Huhtam
¨
aki, J.,
Mukkamala, R. R., Hussain, A., Vatrapu, R., Jussila,
J., and Pirkkalainen, H. (2016). Identifying Weak
Ties from Publicly Available Social Media Data in an
Event. In AcademicMindtrek ’16, pages 11–19. ACM.
Gupte, M. and Eliassi-Rad, T. (2012). Measuring tie
strength in implicit social networks. In WebSci’12,
pages 109–118. ACM.
Hornick, M. F. and Tamayo, P. (2012). Extending rec-
ommender systems for disjoint user/item sets: The
conference recommendation problem. IEEE TKDE,
24(8):1478–1490.
Hossmann, T., Nomikos, G., Spyropoulos, T., and Leg-
endre, F. (2012). Collection and analysis of
multi-dimensional network data for opportunistic
networking research. Computer Communications,
35(13):1613–1625.
Huang, H., Tang, J., Liu, L., Luo, J., and Fu, X. (2015). Tri-
adic Closure Pattern Analysis and Prediction in Social
Networks. IEEE TKDE, 27(12):3374–3389.
Hussain, A. and Vatrapu, R. (2014). Social Data Analytics
Tool (SODATO). In Lecture Notes in Computer Sci-
ence, volume 8463 LNCS, pages 368–372. Springer.
Hussain, A., Vatrapu, R., Hardt, D., and Jaffari, Z. A.
(2014). Social Data Analytics Tool: A Demonstrative
Case Study of Methodology and Software. In Ana-
lyzing Social Media Data and Web Networks, pages
99–118. Palgrave Macmillan UK, London.
Kahanda, I. and Neville, J. (2009). Using transactional in-
formation to predict link strength in online social net-
works. ICWSM09, pages 74–81.
L. Fogues, R., Such, J. M., Espinosa, A., and Garcia-Fornes,
A. (2018). Tie and tag: A study of tie strength and tags
for photo sharing. PLOS ONE, 13(8):e0202540.
Levin, D. Z. and Cross, R. (2004). The Strength of Weak
Ties You Can Trust: The Mediating Role of Trust in
Effective Knowledge Transfer. Management Science,
50(11):1477–1490.
Marsden, P. V. and Campbell, K. E. (1984). Measuring tie
strength. Social Forces, 63(2):482–501.
Marsden, P. V. and Campbell, K. E. (2012). Reflections on
Conceptualizing and Measuring Tie Strength. Social
Forces, 91(1):17–23.
Onnela, J.-P., Saram
¨
aki, J., Hyv
¨
onen, J., Szab
´
o, G., Lazer,
D., Kaski, K., Kert
´
esz, J., and Barab
´
asi, A.-L. (2007).
Structure and tie strengths in mobile communication
networks. PNAS, 104(18):7332–6.
Pappalardo, L., Rossetti, G., and Pedreschi, D. (2012). How
well do we know each other? : Detecting tie strength
in multidimensional social networks. In ASONAM
2012, pages 1040–1045. IEEE.
Petroczi, A., Bazs
´
o, F., and Nepusz, T. (2007). Measuring
tie-strength in virtual social networks. Connections,
27(2):39–52.
Quijano-S
´
anchez, L., D
´
ıaz-Agudo, B., and Recio-Garc
´
ıa,
J. A. (2014). Development of a group recommender
application in a Social Network. Knowledge-Based
Systems, 71:72–85.
Reinhardt, W., Ebner, M., and Beham, G. (2009). How peo-
ple are using Twitter during conferences. In EduMedia
conference, p. 145-156, Salzburg, pages 145–156.
Ross, C., Terras, C., Warwick, M., and Welsh, A.
(2011). Enabled Backchannel: Conference Twitter
use by Digital Humanists. Journal of Documentation,
67(2):214–237.
Servia-Rodr
´
ıguez, S., D
´
ıaz-Redondo, R. P., Fern
´
andez-
Vilas, A., Blanco-Fern
´
andez, Y., and Pazos-Arias,
J. J. (2014). A tie strength based model to socially-
enhance applications and its enabling implementation:
mySocialSphere. Expert Systems with Applications,
41(5):2582–2594.
Wegge, D., Vandebosch, H., Eggermont, S., and Walrave,
M. (2015). The Strong, the Weak, and the Unbalanced
The Link Between Tie Strength and Cyberaggression
on a Social Network Site. Social Science Computer
Review, 33(3):315–342.
Wiese, J., Min, J.-K., Hong, J. I., and Zimmerman, J.
(2015). You Never Call, You Never Write. In
CSCW’15, pages 765–774. ACM.
Xiang, R., Neville, J., and Rogati, M. (2010). Modeling re-
lationship strength in online social networks. In WWW
’10, page 981.
Yin, R. K. (1994). Case study research. Design and Meth-
ods. Evaluation & Research in Education, 24(3):221–
222.
Zhan Shi, Huaxia Rui, and Whinston, A. B. (2014). Content
Sharing in a Social Broadcasting Environment: Evi-
dence from Twitter. MIS Quarterly, 38(1):123–A6.
Zhang, A., Bhardwaj, A., and Karger, D. (2016). Confer:
A Conference Recommendation and Meetup Tool. In
CSCW’16, pages 118–121. ACM.
Zhang, B., K
¨
arkk
¨
ainen, H., Gupta, J. P., and Menon, K.
(2017). The role of weak ties in enhancing knowledge
work. In AcademicMindtrek ’17, pages 210–215, New
York, New York, USA. ACM Press.
Zhong, Y., Yang, J., and Nugroho, R. (2015). Incorporating
Tie Strength in Robust Social Recommendation. In
BigData Congress 2015, pages 63–70. IEEE.
KMIS 2019 - 11th International Conference on Knowledge Management and Information Systems
186