Forthcoming and Online First Articles

International Journal of Web Based Communities

International Journal of Web Based Communities (IJWBC)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

International Journal of Web Based Communities (27 papers in press)

Regular Issues

  • Exploring the impact of COVID-19 Pandemic and Vaccine Dissemination on Airbnb's Popularity and Sentiment on Twitter   Order a copy of this article
    by Sina Shokoohyar, Vahid Ghomi, Amirsalar Jafari Gorizi, Weimin Liang, Charlie Evert 
    Abstract: This study aims to quantify the sentiment of those discussing Airbnb on Twitter and visualise how this sentiment differed in three main periods: prior to the pandemic (pre-COVID-19), and during the pandemic before vaccines were disseminated (pre-vaccine), and during the pandemic, after vaccines were disseminated (post-vaccine). 344,705 tweets relating to Airbnb are collected. In this study, popularity, and usage analytics, sentiment analytics, voice analytics, and topic mining analytics were utilised. Through exploring the data in these three periods, it is possible to distinguish inverse correlations between the number of COVID-19 cases/deaths as compared to the popularity and positive sentiment of Airbnb-related tweets. Other findings include the topics most mentioned along with Airbnb on Twitter and an illustration of how the
    Keywords: peer-to-peer accommodation; Airbnb; COVID-19 pandemic; voice analytics; topic mining analytics; latent Dirichlet allocation; LDA.
    DOI: 10.1504/IJWBC.2024.10056991
  • The Hidden Impact of Hashtags on Instagram: Navigational Heuristics on Source Trustworthiness   Order a copy of this article
    by Ye Han, Shuang Wu, Peter Haried 
    Abstract: Hashtags are popular navigability tools in a social media-driven environment. However, social media users have purposely employed a hashtag stuffing strategy, where many unrelated hashtags are added to a post to increase the visibility of the post and drive viewership. The results of the current study suggest a potential negative impact of hashtags on source trustworthiness assessment made by Instagram users through heuristic processing. This research conducted two experimental studies with samples from the overall Instagram population. Study 1 (N = 174) was a 2
    Keywords: hashtags; source trustworthiness; technological heuristics; social media; hashtag stuffing; affordance.
    DOI: 10.1504/IJWBC.2024.10062541
  • The Digital Presence of Law Firms: A Study of Social Media Strategies Employed by Prestigious US Law Firms   Order a copy of this article
    by Sara García-Moreno, Maria Elena Aramendia-Muneta 
    Abstract: The increasing digitalisation has brought to the fore the importance of building and consolidating the digital presence of law firms on the internet. Through the analysis of different accounts on various social networks (Twitter, LinkedIn, Facebook, Instagram, YouTube, Podcast), we will study the strategy of some of the most prestigious law firms in the USA (DLA Piper, Baker McKenzie, Norton Rose Fulbright, Latham & Watkins and White & Case). This paper aims to deepen existing research on social media strategies, as well as to encourage future analysis of law firms in this area. A general tendency has been observed to show the human side of such firms as well as the different pro bono services they are engaged in. The main conclusions found that Law firms need to develop different strategies for each social network and accurately define the target audience in each network.
    Keywords: social media; law firms; marketing strategy; content; Twitter; LinkedIn; Facebook; Instagram.
    DOI: 10.1504/IJWBC.2024.10064760
  • Does Technology Readiness Influence Sustained Use of Social Media Platform? A Cross-National Comparison   Order a copy of this article
    by Xinsheng Zhao, SungJoon Yoon 
    Abstract: This study attempts to validate an extended technology readiness and technology acceptance model (TRAM), which embraces an emotional feedback measure (enjoyment) to predict the continuous use of social media platforms. In addition, this study aims to determine the differences in the factors affecting sustained use of social media platform between Chinese and Korean users. The result indicated positive technology readiness having a positive impact on five factors (performance expectancy, effort expectancy, asocial influence, facilitating conditions and enjoyment) that were hypothesised to motivate technology acceptance. In addition, the study found that three technology acceptance motivators (performance expectancy, effort expectancy, and enjoyment significantly affect continuous use intention. Finally, the study found that positive technology readiness exerts greater significant effect on technology acceptance factors for China than Korea.
    Keywords: technology acceptance; social media platform; technology readiness; reuse intention; enjoyment; cross-national difference.
    DOI: 10.1504/IJWBC.2024.10064761
  • The Boardroom's Digital Footprint: Exploring the Impact of Diversity on Web-Based Disclosures   Order a copy of this article
    by Martin Surya Mulyadi, Yunita Anwar 
    Abstract: This study investigates the influence of board diversity on the extent of web-based corporate disclosures within the top publicly listed corporations in Indonesia and Malaysia. Grounded in media agenda-setting theory and using multiple regression analysis, it reveals a significant but nuanced impact of board diversity on disclosure practices. The study finds that while board nationality diversity negatively impacts web-based disclosures, robust corporate governance can mitigate this effect. Conversely, the diversity of foreign educational backgrounds and board gender diversity does not significantly influence web-based disclosures. These findings underscore the importance of a nuanced understanding of board diversity and its interaction with corporate governance in shaping disclosure practices. The research contributes to corporate web disclosure theory and offers practical insights for corporations seeking to optimise their web-based disclosures.
    Keywords: board diversity; web-based corporate disclosures; media agenda setting theory.
    DOI: 10.1504/IJWBC.2024.10064762

Special Issue on: Consumer Behaviour in Mobile Commerce and Social Media

  • Study on Detection of Impulsive Purchase Behavior of E-commerce Platform Consumers Based on Social Network Media   Order a copy of this article
    by Bo An 
    Abstract: Studying consumers’ impulsive purchasing behaviour helps to understand their purchasing behaviour and increase sales revenue. Therefore, this article proposes a method for detecting consumer impulse buying behaviour on e-commerce platforms based on social network media. Firstly, collect data on consumer purchasing behaviour; Secondly, preprocess the characteristics of impulse buying behaviour based on the RFM function. Then, considering the polarity and degree of emotional words, calculate impulsive emotion scores based on an emotion dictionary; Finally, use the LSH algorithm to find the nearest neighbour point that matches each user’s emotional needs, and use the input of LOF to find the extreme point, obtaining the detection results of impulse buying behaviour. The results show that the detection recall rate of this method can reach 99.0%, the detection error is only 0.02, and the detection time is only 8.9 seconds. The detection effect of this method is good.
    Keywords: social network media; Impulsive purchasing behaviour; e-commerce platforms; K-nearest neighbour method; LOF method; LSH algorithm.
    DOI: 10.1504/IJWBC.2024.10061785
  • Study on Distributed network anomaly attack detection method based on machine learning   Order a copy of this article
    by Qiaoyun Chen, Youyou Li 
    Abstract: To overcome the problems of traditional methods such as low detection accuracy, high false alarm rate and long detection time, a distributed network anomaly attack detection method based on machine learning is proposed. Firstly, the local density of network operation data points is estimated by combining the Gaussian kernel and cut-off check, and the network operation data is clustered by the DPCA algorithm. Secondly, through the constructed attack model, abnormal attack characteristics are determined and important features are screened. Finally, the naive Bayes in machine learning is used to determine the attribute characteristics of each category in the clustering results. Match the category attribute feature with the important feature to get the anomaly attack detection result. The experimental results show that the maximum detection accuracy of this method is 98%, the average false alarm rate is 2.64%, and the detection time varies between 0.25 s and 0.68 s.
    Keywords: machine learning; distributed; network abnormality; attack detection; DPCA algorithm; naive Bayes.
    DOI: 10.1504/IJWBC.2024.10061786
  • A Precise sensing method of campus network security situation based on fuzzy clustering algorithm   Order a copy of this article
    by Ranran Yin, Zhenyu Yang 
    Abstract: To ensure the safe operation of the campus network and improve the sensing accuracy and convergence speed, a precise sensing method for campus network security situations based on a fuzzy clustering algorithm is proposed. Firstly, the constructed element model is used to extract the situation elements, and the situation information is processed through the non-negative matrix decomposition algorithm. Secondly, the Kalman entropy method is used to estimate the security situation of the whole network of the network campus, and the new information on the network security situation is calculated. Finally, according to the characteristics of campus network security situation awareness, the network security situation awareness is realised through a fuzzy clustering algorithm. The experimental results show that the MAPE value and RMSE value of the proposed method are low, and the RMSE value is maintained below 0.15, the convergence speed is fast, and can comprehensively reflect the network security situation.
    Keywords: fuzzy clustering algorithm; campus network; security situation awareness; Kalman filter model; transitive closure.
    DOI: 10.1504/IJWBC.2024.10061787
  • Accurate Prediction of Purchasing Behavior of Cross border E-commerce Consumers under Social Media Marketing   Order a copy of this article
    by Zhengya Guo 
    Abstract: Traditional cross-border e-commerce consumer purchase behaviour prediction methods have problems with low reliability and high prediction error rate. This article designs a research on accurate prediction of purchasing behaviour of cross border e-commerce consumers under social media marketing. Firstly, determine and extract the purchasing behaviour characteristics of cross-border e-commerce consumers under social media marketing; Then, determine the initial centroid set of feature data, determine similar data by calculating the Euclidean distance between feature data, and remove similar data; Finally, by calculating the information entropy of the feature data, determine the weight value of the feature data, and use the integration algorithm and loss function to achieve accurate prediction of purchase behaviour. The test results show that the proposed method improves the reliability of prediction and reduces the prediction error rate.
    Keywords: social media marketing; cross border e-commerce consumers; purchase behaviour; logistic regression; Euclidean distance; histogram algorithm.
    DOI: 10.1504/IJWBC.2024.10061788
  • Deep Mining of E-commerce Consumer Behavior Data Based on Concept Hierarchy Tree   Order a copy of this article
    by Yingchun Han 
    Abstract: In order to solve the problems of low data collection efficiency, high noise, and low accuracy in traditional e-commerce consumer behaviour user data mining methods, a deep mining method for e-commerce consumer behaviour data based on concept hierarchy tree is proposed. Use Python scripting language to collect e-commerce consumer behaviour data from e-commerce platforms, and use Myriad filtering algorithm to remove the interference noise in e-commerce consumer behaviour data. Based on non-interference noise free e-commerce consumer behaviour data, utilising domain expert participation and machine learning algorithms, a concept hierarchical tree based e-commerce consumer behaviour data mining model is established to achieve deep mining of e-commerce consumer behaviour data. Experimental results show that the method proposed in this paper collects e-commerce consumer behaviour data more quickly, effectively removes interference noise contained in e-commerce consumer behaviour data, and can effectively and deeply mine the behavioural preferences of e-commerce consumers, with significant applicability.
    Keywords: concept hierarchy tree; e-commerce consumer; behaviour data; deep mining; myriad filtering algorithm.
    DOI: 10.1504/IJWBC.2024.10061789
  • Customer Relationship Value Evaluation Method for E-commerce Platform Based on Fuzzy Clustering   Order a copy of this article
    by Sanping Qiu 
    Abstract: In order to improve the accuracy of customer relationship value evaluation on e-commerce platforms and reduce evaluation time, this paper proposes a fuzzy clustering-based customer relationship value evaluation method for e-commerce platforms. Firstly, consider the changes in customer relationships at different stages of the lifecycle and analyse the timeliness characteristics of customer relationships; then, the Weibull distribution function is introduced to calculate the length of customer lifecycle; finally, cluster the investment return on tangible assets of the enterprise, and invert the investment return on intangible assets of the enterprise. Use fuzzy clustering to evaluate the customer relationship value and obtain the final evaluation result. The results show that the method proposed in this paper can effectively improve evaluation efficiency and evaluation efficiency, with an evaluation time of only 2.8 seconds and an evaluation accuracy of up to 99.6%.
    Keywords: fuzzy clustering; e-commerce platform; customer relationship value evaluation; life cycle length; return rate splitting method.
    DOI: 10.1504/IJWBC.2024.10061790
  • The Impact of Payment Methods on Consumer Behavior in the E-commerce Environment   Order a copy of this article
    by Yanxi Zhou 
    Abstract: The changes in payment methods in the e-commerce environment also have an impact on consumer behaviour. Therefore, the study investigates the impact of payment methods on consumer behaviour in the e-commerce environment. The impact of e-commerce mainly includes factors such as social environment, service methods, and consumer psychology. Payment types include online bank card payment, electronic cash, electronic check, third-party payment platform and mobile payment. Analyse the impact of payment methods on consumer behaviour from four aspects: purchase decision, purchase intention, consumption motivation, and consumption habits. The example analysis results show that the proportion of consumers choosing electronic payment methods reaches 90%, indicating that electronic payment methods have changed consumers’ purchasing decisions; The choice of electronic payment methods and the amount of consumption also exceed the amount of cash, indicating that consumers are more willing to engage in online consumption in e-commerce, changing their purchasing intention.
    Keywords: E-commerce environment; payment method; consumer behaviour; Influencing factors.
    DOI: 10.1504/IJWBC.2024.10061791
  • Privacy Protection of Multiple Sensitive Attribute Data for Users on E-commerce Social Media Platforms   Order a copy of this article
    by Na Wang, Ji Zhang, Feng Gao 
    Abstract: Protecting the privacy of multi-sensitive attribute data is of great significance for safeguarding the interests of individuals, enterprises, and countries, as well as promoting technological development. Therefore, this paper proposes a privacy protection method of multiple sensitive attribute data for users on e-commerce social media platforms. An improved artificial bee colony algorithm is used to improve the KHM algorithm and mine multi-sensitive attribute data. Based on a personalised anonymity model, the mined multi-sensitive attribute data is quantified in a graded manner according to the sensitivity value and user privacy requirements of each attribute data. Low-sensitive attribute data is protected by equivalent expression privacy protection, while high-sensitive attribute data is encrypted and hidden by an improved fully homomorphic encryption method, thus achieving data privacy protection. The experimental results show that the probability of successful abnormal extraction of data by hackers using this method is less than 0.05, which improves privacy security.
    Keywords: e-commerce; multiple sensitive; attribute data; privacy protection; KHM algorithm; social media.
    DOI: 10.1504/IJWBC.2024.10061792
  • Research on personalized short video push on social media platforms based on affinity propagation clustering   Order a copy of this article
    by Miao Wang 
    Abstract: Personalised short video push on social media platforms can help enterprises improve user experience, competitiveness, and marketing effectiveness. This article proposes a personalised short video push method on social media platforms based on affinity propagation clustering. By determining the attractiveness, belonging, and reference between data points, the optimal clustering centre of the affinity propagation clustering algorithm is selected to achieve user behaviour data collection. Based on the data collection results, Markov matrix is used to extract user sentiment labels, combined with sentiment labels and XGBoost model to predict user personalised preferences. The i Expand algorithm is used to determine user interest vectors and generate recommendation lists, achieving personalised short video push on social media platforms. The experimental results show that the maximum push accuracy of this method is 97%, the maximum time consumption is 97.4 ms, and the maximum satisfaction with push results is 98.6.
    Keywords: affinity propagation clustering; social media platforms; short video; personalised; push; sentiment labels; XGBoost model; i Expand algorithm.
    DOI: 10.1504/IJWBC.2024.10061793
  • A Method for Tracing Big Data of Network Public Opinion Based on Data Mining Algorithms   Order a copy of this article
    by Shumin Zhi, Lin Yu 
    Abstract: In order to achieve accurate traceability of massive public opinion data, this study carried out a study on the traceability method of network public opinion big data based on data mining algorithm. First of all, the network public opinion data is cleaned up and its data characteristics are mined. Then, the extracted public opinion features are taken as the input of the recursive neural network, which is used to construct the attention model and output the prediction results of the network public opinion. Finally, determine the network public opinion information to be tracked. Support vector machine is used to improve the probability packet tagging tracking algorithm and output the tracking results of public opinion information. The experimental results show that the implementation efficiency of this method is higher than 99%, and the average error of data tracing is less than 0.1, which has great application value.
    Keywords: data mining algorithms; online public opinion; big data; traceability methods; kernel fuzzy clustering; probability packet labelling.
    DOI: 10.1504/IJWBC.2024.10061794
  • Comprehensive evaluation method of live streaming business model in online marketing environment   Order a copy of this article
    by Miaomiao Zhang, Pianpian Zhao, Pei Wang 
    Abstract: In order to effectively analyse the business model of live streaming, this article studies a comprehensive evaluation method for live streaming business models in an online marketing environment. Firstly, the analytic hierarchy process is used to determine the 20 evaluation indicators of the indicator layer. Then, calculate the indicator weights based on the entropy method. Finally, based on comprehensive evaluation indicators, conduct a comprehensive evaluation of the live streaming business model. Through experiments, it can be seen that the evaluation method proposed in this article can accurately analyse the importance of evaluation indicators, and the evaluation results are consistent with the actual state of the live streaming sales business model. Multiple secondary indicators designed can better measure economic effectiveness, marketing effectiveness, market competition, and consumer influence, which can reflect the good practical application performance of the proposed method in this article.
    Keywords: network marketing; live streaming with goods; business model; comprehensive assessment; evaluation metrics.
    DOI: 10.1504/IJWBC.2024.10061795
  • Feature Extraction of News Communication on Microblog Platform Based on Multilevel Sliding Window Model   Order a copy of this article
    by Cheng Cui 
    Abstract: In order to fully understand the characteristics of news dissemination on Microblog platforms, this article proposes a method for extracting news dissemination features on Microblog platforms based on a multi-level sliding window model. Firstly, identify the four major characteristics of Microblog platform news, including high timeliness, free writing style, rich personal emotional bias, and the ability to restore the truth of the news. Secondly, a Microblog platform news communication representation model is constructed using the news communication theme content as input and the Microblog platform news communication representation vector as output. Finally, determine the multi-level sliding window counter, correspond to the sub window positions, and segment the feature data to complete the feature extraction of news dissemination on Microblog platform. The experimental results show that the proposed method has a high recall rate for feature extraction and good feature data balance.
    Keywords: multilevel sliding window model; Microblog platform; news dissemination; feature extraction.
    DOI: 10.1504/IJWBC.2024.10061796
  • A Method for Identifying Consumer Emotional Tendency in the   Order a copy of this article
    by Jie Liu 
    Abstract: In order to achieve accurate and rapid identification of consumer emotional tendencies, a method for identifying consumer emotional tendencies under the
    Keywords: the ‘live streaming+e-commerce’ model; consumer; emotional orientation identification; HowNet similarity; Google Similarity.
    DOI: 10.1504/IJWBC.2024.10061797
  • Abnormal Behavior Detection of E-commerce Consumers Based on Improved Hidden Markov Model   Order a copy of this article
    by Meng Su  
    Abstract: To address the issues of low anomaly detection rate, high false positive rate, and long detection time in traditional methods, an abnormal behaviour detection method for e-commerce consumers based on an improved hidden Markov model is proposed. The Scrapy spider framework is used to collect e-commerce consumer behaviour data, including purchase data, browsing data, search data, and evaluation data. The collected data is processed using an improved K-means algorithm for clustering, with normalisation, missing value imputation, and outlier removal applied to the clustering results. The MOPSO algorithm is used to optimise the parameters of the hidden Markov model, and the processed data is then input into the improved hidden Markov model to output the relevant detection results. Experimental results show that the maximum anomaly detection rate of this method is 96.7%, the maximum false positive rate is 4.7%, and the average detection time is 0.73 s.
    Keywords: improved hidden Markov model; e-commerce consumers; abnormal behaviour detection; Scrapy crawler architecture; improved k-means algorithm; MOPSO algorithm.
    DOI: 10.1504/IJWBC.2024.10062542

Special Issue on: Research Advances on User Interactions in Social Media Using Data Science Approaches

  • Large Scale MicroBlog Location Data Capture Method Based on Dynamic Web Page Parsing   Order a copy of this article
    by Yu Ji, Huanhuan Liu, Zhenzhen Wang, Rui Sun 
    Abstract: Due to the large scale of data, the deviation coefficient of the captured data is large and the capture efficiency is low. To this end, a large-scale Weibo location data retrieval method based on dynamic web page parsing is proposed. Firstly, based on the source of Weibo location data, artificial neural models and random functions are introduced to calculate the weights of feature data. Next, generate a feature vector table and classifier model, and filter the feature text using the established classification model. Finally, by matching the feature data of Weibo location data between dynamic script sites and web pages, a dynamic script parsing framework for Weibo location data on web pages is constructed, and dynamic web page parsing technology is used to capture Weibo location data. The experimental results show that the proposed method has only a 0.1% error in data capture bias, and the capture efficiency reaches 99%. Therefore, this method can significantly improve the crawling effect of large-scale Weibo location data and has certain feasibility.
    Keywords: dynamic web page parsing; MicroBlog location data; crawling; artificial neuron model; random function; dynamic script site.
    DOI: 10.1504/IJWBC.2025.10063048
  • Dynamic collaborative mining method of user perceived interest points in mobile e-commerce platform   Order a copy of this article
    by Aihua Mo 
    Abstract: In the process of dynamic collaborative mining of user perceived interest points on mobile e-commerce platforms, due to the lack of effective feature classification, the recall rate of interest point data in dynamic collaborative mining of interest points is low. Therefore, a dynamic collaborative mining method for user perceived interest points on mobile e-commerce platforms is proposed. Firstly, coarse grained features of user perceived interest points are initially extracted through clustering algorithms, and their feature values are further extracted using sequence feature extraction algorithms. Then, a user perceived interest prediction model is constructed, and fitting methods are used to achieve feature classification of user perceived interest points; finally, by designing a dynamic collaborative mining model for user perceived interest points on mobile e-commerce platforms, dynamic collaborative mining is achieved. The experimental results show that the dynamic convergence change of method in this paper interest point data mining is relatively small, and the maximum recall rate is 99%, effectively improving mining performance, thereby providing more accurate and accurate personalised recommendations for mobile e-commerce platforms.
    Keywords: mobile e-commerce platform; perceived points of interest; dynamic collaborative mining; coarse grained characteristics; binary classification model.
    DOI: 10.1504/IJWBC.2025.10063049

Special Issue on: Research Advances on User Interactions in Social Media Using Data Science Approaches

  • Customer Churn Prediction Based on Customer Value and User Evaluation Emotions in Online Marketing   Order a copy of this article
    by Huanan Mo  
    Abstract: In order to improve the accuracy and usefulness of the churn prediction model, the core elements of the research content were designed to include collecting data on customer purchase behaviour and reviews, quantifying and analysing customer value, analysing customer sentiment in reviews, and combining customer value factors and review sentiment factors in the model. The results of the study show that the model performs best on different indicators, and the area of the main characteristic curve is the largest, which is significantly higher than that of the traditional model. Its hit rate, coverage rate and improvement coefficient also perform well. At the same time, when the sample size increases, the improvement coefficient increases the most, reaching 0.41. In conclusion, the model performs well in customer churn prediction, and it can provide certain reference value for the research field of customer churn prediction.
    Keywords: online marketing; customer value; evaluate emotions; customer churn prediction; CCP; fusion model.
    DOI: 10.1504/IJWBC.2025.10062543
  • Personalized Recommendation Method for Live Streaming E-commerce Products Based on Multimedia Social Networks   Order a copy of this article
    by Yinyue Wan, Pin Lv 
    Abstract: There are problems in personalised recommendation of live streaming e-commerce products, such as low accuracy in user interest mining and weak user relationship strength. Therefore, a personalised recommendation method for live streaming e-commerce products based on multimedia social networks is proposed. First, the user scoring matrix is divided into two interaction matrices by the matrix decomposition method, and the fixed parameter limit matrix dimension is set, and user interest mining is realised by using Euclidean distance calculation; then, the variance expansion factor is introduced to test the multi-collinearity of the feature, and the contour coefficient is calculated to complete the feature extraction; finally, user interest and feature data are introduced into multimedia social networks to obtain product feature attention, perform personalised matching, and achieve personalised recommendation. The results show that the method proposed in this paper has good user interest mining performance and strong user relationships.
    Keywords: multimedia social network; live streaming e-commerce products; personalised recommendation; interest level; variance inflation factor; attention level.
    DOI: 10.1504/IJWBC.2025.10063050
  • A Supply Chain Risk Identification Method of Foreign Trade E-commerce Enterprises Based on Social Network Analysis   Order a copy of this article
    by Huilan Wu 
    Abstract: To improve the efficiency and accuracy of supply chain risk identification, a supply chain risk identification method for foreign trade e-commerce enterprises based on social network analysis is studied. Firstly, obtain supply chain risk indicators for foreign trade e-commerce enterprises and use the LLE-PCA method to reduce the dimensionality of the indicators; Then, using social network analysis method, construct a social network model with different risk indicators interconnected; Finally, degree centrality analysis and proximity centrality analysis are used to obtain the variable values of each indicator in the model, achieving the identification of supply chain risks for foreign trade e-commerce enterprises. The experiment shows that the application of this method for risk identification takes 0.25s, with a recognition accuracy of 82%. It has high recognition efficiency and accuracy, and the application effect is good.
    Keywords: Social network analysis; Foreign trade e-commerce enterprises; Supply chain; Risk identification; LLE-PCA; Centrality analysis.
    DOI: 10.1504/IJWBC.2025.10063051
  • False information recognition of social media platforms based on multi-modal feature fusion   Order a copy of this article
    by Yi Tang, Jiaojun Yi, Feigang Tan 
    Abstract: Traditional social media platforms have low accuracy in identifying false information. Therefore, a method based on multi-modal feature fusion is proposed to recognise false information within social media platforms. This method processes false information data on social media platforms by calculating noise during transmission, and utilises multi-layer management to establish correlations between multi-modal point cloud data. By designing modal grouping and calculating similarity, we integrate information from the three dimensions of time, space, and attributes to supplement the shortcomings of the data. By utilising multi-modal feature fusion algorithms, accurate recognition of false information on social media platforms can be achieved. The experimental results show that using this method can effectively improve the training accuracy of the model and have the ability to resist false data injection attacks, achieving high recognition accuracy.
    Keywords: multi-modal feature fusion; social media platform; false information; recognition methods.
    DOI: 10.1504/IJWBC.2025.10063052
  • A Method for Evaluating Confidence of Social Media Information Based on Time Series Analysis   Order a copy of this article
    by Qiru Zi, Maojia Hou, Qiang Gao 
    Abstract: In order to improve the accuracy of cross confidence assessment and shorten the time required for confidence assessment, this article proposes a social media information confidence assessment method based on time series analysis. Firstly, determine the evaluation indicators that affect the credibility of social media information; then, quantify the evaluation indicators for the credibility of social media information; finally, a confidence quantitative evaluation function is constructed using time series analysis, and a user information weight allocation matrix is used to configure the weight assignment scheme for each evaluation dimension. By quantitatively calculating the relative importance between various indicators in the comparison criteria layer, the user confidence is finally obtained. The experimental results show that the method proposed in this paper can effectively improve the accuracy and recall of confidence evaluation, with a FI value of 0.9, which verifies the effectiveness of the confidence evaluation method proposed in this paper.
    Keywords: time series analysis; confidence level; social media; user topology information; weight allocation.
    DOI: 10.1504/IJWBC.2025.10063053
  • Study on redundant data dimension reduction algorithm for cloud computing in the Internet of Things environment.   Order a copy of this article
    by Qiaoyun Chen, Hui Yao 
    Abstract: In order to effectively reduce the dimension of cloud computing redundant data and shorten the time of dimensionality reduction, an algorithm for dimensionality reduction of cloud computing redundant data in the Internet of Things environment is proposed. Firstly, analyze the architecture of the Internet of Things environment, and cluster and collect high-dimensional redundant data of cloud computing in the Internet of Things environment. Secondly, K-L transform is used to compress the redundant data of cloud computing. Finally, the supervised discriminant projection dimensionality reduction algorithm is used to construct the objective function model of redundant data dimensionality reduction to complete the dimensionality reduction of redundant data. The experimental results show that compared with traditional algorithms, the dimensionality reduction effect of our algorithm is higher, the dimension of redundant data is significantly reduced, and the dimensionality reduction time of our algorithm is significantly reduced when the data size is the same
    Keywords: Internet of Things environment; Cloud computing; Redundant data dimensionality reduction; Feature compression.
    DOI: 10.1504/IJWBC.2025.10063054