{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T11:08:31Z","timestamp":1768475311606,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,12]],"date-time":"2020-01-12T00:00:00Z","timestamp":1578787200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,12]]},"DOI":"10.1145\/3378936.3378973","type":"proceedings-article","created":{"date-parts":[[2020,3,7]],"date-time":"2020-03-07T12:09:51Z","timestamp":1583582991000},"page":"63-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Automated Detection of Social Roles in Online Communities using Deep Learning"],"prefix":"10.1145","author":[{"given":"Piyumini","family":"Wijenayake","sequence":"first","affiliation":[{"name":"Research Centre for Data Analytics and Cognition, La Trobe University, Melbourne, Australia"}]},{"given":"Daswin de","family":"Silva","sequence":"additional","affiliation":[{"name":"Research Centre for Data Analytics and Cognition, La Trobe University, Melbourne, Australia"}]},{"given":"Damminda","family":"Alahakoon","sequence":"additional","affiliation":[{"name":"Research Centre for Data Analytics and Cognition, La Trobe University, Melbourne, Australia"}]},{"given":"Saliya","family":"Kirigeeganage","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, University of Louisville, Louisville, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,7]]},"reference":[{"issue":"1","key":"e_1_3_2_2_1_1","first-page":"C10110","article-title":"Virtual community attraction: Why people hang out online","volume":"10","author":"Ridings C. M.","year":"2004","unstructured":"C. M. Ridings and D. Gefen , \" Virtual community attraction: Why people hang out online ,\" J. Comput. Commun. , vol. 10 , no. 1 , p. JCM C10110 , 2004 . C. M. Ridings and D. Gefen, \"Virtual community attraction: Why people hang out online,\" J. Comput. Commun., vol. 10, no. 1, p. JCMC10110, 2004.","journal-title":"J. Comput. Commun."},{"issue":"6","key":"e_1_3_2_2_2_1","first-page":"337","article-title":"The Identification and Influence of Social Roles in a Social Media Product Community","volume":"22","author":"Benamar L.","year":"2017","unstructured":"L. Benamar , C. Balagu\u00e9 , and M. Ghassany , \" The Identification and Influence of Social Roles in a Social Media Product Community ,\" J. Comput. Commun. , vol. 22 , no. 6 , pp. 337 -- 362 , 2017 . L. Benamar, C. Balagu\u00e9, and M. Ghassany, \"The Identification and Influence of Social Roles in a Social Media Product Community,\" J. Comput. Commun., vol. 22, no. 6, pp. 337--362, 2017.","journal-title":"J. Comput. Commun."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.08.010"},{"issue":"4","key":"e_1_3_2_2_4_1","first-page":"771","article-title":"Discussion catalysts in online political discussions: Content importers and conversation starters","volume":"14","author":"Himelboim I.","year":"2009","unstructured":"I. Himelboim , E. Gleave , and M. Smith , \" Discussion catalysts in online political discussions: Content importers and conversation starters ,\" J. Comput. Commun. , vol. 14 , no. 4 , pp. 771 -- 789 , 2009 . I. Himelboim, E. Gleave, and M. Smith, \"Discussion catalysts in online political discussions: Content importers and conversation starters,\" J. Comput. Commun., vol. 14, no. 4, pp. 771--789, 2009.","journal-title":"J. Comput. Commun."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.008"},{"key":"e_1_3_2_2_6_1","volume-title":"A Concise Guide to Market Research The Process, Data, and Methods Using IBM SPSS Statistics","author":"Mooi E.","year":"2011","unstructured":"E. Mooi and M. Sarstedt , \" A Concise Guide to Market Research The Process, Data, and Methods Using IBM SPSS Statistics . 2011 .\" Berlin : Springer . E. Mooi and M. Sarstedt, \"A Concise Guide to Market Research The Process, Data, and Methods Using IBM SPSS Statistics. 2011.\" Berlin: Springer."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.2190\/7MQV-X9UJ-C7Q3-NRAG"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12647"},{"key":"e_1_3_2_2_9_1","volume-title":"Cultural boundaries of science: Credibility on the line","author":"Gieryn T. F.","year":"1999","unstructured":"T. F. Gieryn , Cultural boundaries of science: Credibility on the line . University of Chicago Press , 1999 . T. F. Gieryn, Cultural boundaries of science: Credibility on the line. University of Chicago Press, 1999."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11186-014-9216-5"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310111"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2895536.2895545"},{"issue":"2","key":"e_1_3_2_2_13_1","first-page":"1","article-title":"Visualizing the signatures of social roles in online discussion groups","volume":"8","author":"Welser H. T.","year":"2006","unstructured":"H. T. Welser , E. Gleave , D. Fisher , and M. Smith , \" Visualizing the signatures of social roles in online discussion groups ,\" J. Soc. Struct. , vol. 8 , no. 2 , pp. 1 -- 21 , 2006 . H. T. Welser, E. Gleave, D. Fisher, and M. Smith, \"Visualizing the signatures of social roles in online discussion groups,\" J. Soc. Struct., vol. 8, no. 2, pp. 1--21, 2006.","journal-title":"J. Soc. Struct."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25952-7_27"},{"key":"e_1_3_2_2_15_1","first-page":"59b","volume-title":"You Are Who You Talk To: Detecting Roles in Usenet Newsgroups,\" in Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)","author":"Fisher D.","year":"2006","unstructured":"D. Fisher , M. Smith , and H. T. Welser , \" You Are Who You Talk To: Detecting Roles in Usenet Newsgroups,\" in Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) , 2006 , vol. 3 , pp. 59b -- 59b . D. Fisher, M. Smith, and H. T. Welser, \"You Are Who You Talk To: Detecting Roles in Usenet Newsgroups,\" in Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006, vol. 3, pp. 59b--59b."},{"key":"e_1_3_2_2_16_1","volume-title":"Machine Translation: Mining Text for Social Theory,\" Ssrn","author":"Evans J. A.","year":"2016","unstructured":"J. A. Evans and P. Aceves , \" Machine Translation: Mining Text for Social Theory,\" Ssrn , 2016 . J. A. Evans and P. Aceves, \"Machine Translation: Mining Text for Social Theory,\" Ssrn, 2016."},{"key":"e_1_3_2_2_17_1","volume-title":"Bridging or bonding: do individuals gain social capital from participation in enterprise social networks?","author":"Riemer K.","year":"2015","unstructured":"K. Riemer , J. Finke , and D. Hovorka , \" Bridging or bonding: do individuals gain social capital from participation in enterprise social networks? ,\" 2015 . K. Riemer, J. Finke, and D. Hovorka, \"Bridging or bonding: do individuals gain social capital from participation in enterprise social networks?,\" 2015."},{"key":"e_1_3_2_2_18_1","volume-title":"Investigating the impact of network effects on content generation: Evidence from a large online student network,\" arXiv Prepr. arXiv1512.06469","author":"Bhattacharya P.","year":"2015","unstructured":"P. Bhattacharya , T. Q. Phan , X. Bai , and E. Airoldi , \" Investigating the impact of network effects on content generation: Evidence from a large online student network,\" arXiv Prepr. arXiv1512.06469 , 2015 . P. Bhattacharya, T. Q. Phan, X. Bai, and E. Airoldi, \"Investigating the impact of network effects on content generation: Evidence from a large online student network,\" arXiv Prepr. arXiv1512.06469, 2015."},{"issue":"1","key":"e_1_3_2_2_19_1","first-page":"2","article-title":"Expanding the horizons of digital social networks: Mixing big trace datasets with qualitative approaches","volume":"26","author":"Whelan E.","year":"2016","unstructured":"E. Whelan , R. Teigland , E. Vaast , and B. Butler , \" Expanding the horizons of digital social networks: Mixing big trace datasets with qualitative approaches ,\" Inf. Organ. , vol. 26 , no. 1 -- 2 , pp. 1--12, 2016 . E. Whelan, R. Teigland, E. Vaast, and B. Butler, \"Expanding the horizons of digital social networks: Mixing big trace datasets with qualitative approaches,\" Inf. Organ., vol. 26, no. 1--2, pp. 1--12, 2016.","journal-title":"Inf. Organ."},{"key":"e_1_3_2_2_20_1","first-page":"104","volume-title":"Overall Environment & Value for,\"","author":"Nicholas C. K.","year":"2017","unstructured":"C. K. Nicholas and A. S. Lee , \" Voice of Customers: Text Analysis of Hotel Customer Reviews (Cleanliness , Overall Environment & Value for,\" pp. 104 -- 111 , 2017 . C. K. Nicholas and A. S. Lee, \"Voice of Customers: Text Analysis of Hotel Customer Reviews (Cleanliness, Overall Environment & Value for,\" pp. 104--111, 2017."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"e_1_3_2_2_22_1","first-page":"6645","volume-title":"Speech recognition with deep recurrent neural networks,\" in Acoustics, speech and signal processing (icassp)","author":"Graves A.","year":"2013","unstructured":"A. Graves , A. Mohamed , and G. Hinton , \" Speech recognition with deep recurrent neural networks,\" in Acoustics, speech and signal processing (icassp) , 2013 ieee international conference on, 2013, pp. 6645 -- 6649 . A. Graves, A. Mohamed, and G. Hinton, \"Speech recognition with deep recurrent neural networks,\" in Acoustics, speech and signal processing (icassp), 2013 ieee international conference on, 2013, pp. 6645--6649."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2011.01.005"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/pa.1412"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/08841241.2014.920460"},{"issue":"2","key":"e_1_3_2_2_27_1","first-page":"169","article-title":"Attributes of successful university brands in the USA","volume":"3","author":"Duesterhaus A.","year":"2014","unstructured":"A. Duesterhaus and M. Duesterhaus , \" Attributes of successful university brands in the USA ,\" J. Brand Strateg. , vol. 3 , no. 2 , pp. 169 -- 183 , 2014 . A. Duesterhaus and M. Duesterhaus, \"Attributes of successful university brands in the USA,\" J. Brand Strateg., vol. 3, no. 2, pp. 169--183, 2014.","journal-title":"J. Brand Strateg."},{"key":"e_1_3_2_2_28_1","first-page":"35","volume-title":"May 2019","author":"Baym N. K.","year":"2012","unstructured":"N. K. Baym , \"The Emergence of On-Line Community,\" Cybersociety 2. 0 Revisiting Comput. Commun. Community, no . May 2019 , pp. 35 -- 68 , 2012 . N. K. Baym, \"The Emergence of On-Line Community,\" Cybersociety 2.0 Revisiting Comput. Commun. Community, no. May 2019, pp. 35--68, 2012."},{"issue":"4","key":"e_1_3_2_2_29_1","first-page":"0","article-title":"(2005)","volume":"10","author":"Turner T.","unstructured":"T. Turner , M. Smith , F. Fisher , and H. Welser , \" T. (2005) ,\" Picturing Usenet: mapping computermediated collective action,\" J. Comput. Commun. , vol. 10 , no. 4 , p. 0 . T. Turner, M. Smith, F. Fisher, and H. Welser, \"T.(2005),\" Picturing Usenet: mapping computermediated collective action,\" J. Comput. Commun., vol. 10, no. 4, p. 0.","journal-title":"Picturing Usenet: mapping computermediated collective action,\" J. Comput. Commun."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"}],"event":{"name":"ICSIM '20: The 3rd International Conference on Software Engineering and Information Management","location":"Sydney NSW Australia","acronym":"ICSIM '20","sponsor":["University of Science and Technology of China University of Science and Technology of China"]},"container-title":["Proceedings of the 3rd International Conference on Software Engineering and Information Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378936.3378973","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378936.3378973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:48Z","timestamp":1750203888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378936.3378973"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,12]]},"references-count":30,"alternative-id":["10.1145\/3378936.3378973","10.1145\/3378936"],"URL":"https:\/\/doi.org\/10.1145\/3378936.3378973","relation":{},"subject":[],"published":{"date-parts":[[2020,1,12]]},"assertion":[{"value":"2020-03-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}