Cart (Loading....) | Create Account
Close category search window
 

Actualization of a Course Library through Influential Twitter Knowledge

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Ivanova, M. ; Coll. of Energy & Electron., Tech. Univ. of Sofia, Sofia, Bulgaria ; Ivanova, T.

The paper presents an investigation focused on directions for a course library list forming based on the collective intelligence of the most influential Twitter users. Our main aim is to answer the question whether and how Twitter posts may be used to facilitate the learning process. Billions of messages and users are tracked, extracted and analyzed to examine the possibilities for finding the relevant knowledgeable and informative sources of learning resources. The library list is compiled as a Twitter user searching, collecting and updating the most valuable Twitter content through keywords, hash tags, and user names organizing an ego-centric network. We pay particular attention to the most influential Twitter users, the most impressionable Twitter participants, users with a biggest number of favored messages and the most followed users in Twitter lists. The findings point that the most reliable authority for the course Internet Technologies are people practicing web design/programming, actively tweeting IT companies' representatives, the educators' guild, journalists and self-placed informers. Among the relevant and valuable resources are: tutorials, novelty articles, blog posts opinions and ideas, tips for accomplishing small tasks and dealing with tricky issues, useful codes and templates, new tools and explanations of contemporary and emerging technologies.

Published in:

Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on

Date of Conference:

25-27 June 2012

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.