122
Views
6
CrossRef citations to date
0
Altmetric
Articles

A hybrid approach based on linguistic analysis and fuzzy logic to ensure the surveillance of people having paranoid personality disorder towards Covid-19 on social media

, &
Pages 251-274 | Received 03 Jan 2022, Accepted 26 Feb 2023, Published online: 16 Apr 2023

References

  • Abu Alfeilat, H. A., A. B. Hassanat, O. Lasassmeh, A. S. Tarawneh, M. B. Alhasanat, H. S. Eyal Salman, and V. S. Prasath. 2019. “Effects of Distance Measure Choice on K-nearest Neighbor Classifier Performance: A Review.” Big Data 7 (4): 221–248. doi:10.1089/big.2018.0175.
  • Ahmad, N., and J. Siddique. 2017. “Personality Assessment Using Twitter Tweets.” Procedia Computer Science 112: 1964–1973. doi:10.1016/j.procs.2017.08.067.
  • Al-Atwi, A. A., Y. Cai, and J. Amankwah-Amoah. 2020. “Workplace Ostracism, Paranoid Employees, and Service Performance: A Multilevel Investigation.” Journal of Managerial Psychology 36 (2): 121–137. doi:10.1108/JMP-01-2020-0008.
  • Alipour, H., and A. Malekian. 2018. “Analyzing of Trend Changes in the Frost Threshold (Case Study: Northwest of Iran).” Journal of Natural Environmental Hazards 7 (17): 69–82. doi:10.22111/JNEH.2017.3277.
  • Baik, J., K. Lee, S. Lee, Y. Kim, and J. Choi. 2016. “Predicting Personality Traits Related to Consumer Behavior Using SNS Analysis.” New Review of Hypermedia and Multimedia 22 (3): 189–206. doi:10.1080/13614568.2016.1152313.
  • Bleidorn, W., and C. James Hopwood. 2019. “Using Machine Learning to Advance Personality Assessment and Theory.” Personality and Social Psychology Review23 (2): 190–203. doi:10.1177/1088868318772990.
  • Casalino, G., C. Castiello, N. Del Buono, and C. Mencar. 2017. “Intelligent Twitter data analysis based on nonnegative matrix factorizations.” In International Conference on Computational Science and Its Applications, 188–202. Springer.
  • Celli, F., A. Ghosh, F. Alam, and G. Riccardi. 2016. “In the Mood for Sharing Contents: Emotions, Personality and Interaction Styles in the Diffusion of News.” Information Processing & Management 52 (1): 93–98. doi:10.1016/j.ipm.2015.08.002.
  • Cer, D., Y. Yang, S.-Y. Kong, N. Hua, N. Limtiaco, R. S. John, N. Constant, M. Guajardo-Cespedes, S. Yuan, C. Tar, and Y. H. Sung. 2018. “Universal sentence encoder.” arXiv preprint arXiv:1803.11175.
  • Diener, E., and R. E. Lucas. 2019. “Personality traits.” In General psychology: Required reading, 278.
  • Ellouze, M., and L. H. Belguith. 2022. “A Hybrid Approach for the Detection and Monitoring of People Having Personality Disorders on Social Networks.” Social Network Analysis and Mining 12 (1): 67. doi:10.1007/s13278-022-00884-x.
  • Ellouze, M., S. Mechti, and L. H. Belguith. 2020. “Automatic Profile Recognition of Authors on Social Media Based on Hybrid Approach.” Procedia Computer Science 176: 1111–1120. doi:10.1016/j.procs.2020.09.107.
  • Ellouze, M., S. Mechti, and L. H. Belguith. 2021. “Approach Based on Ontology and Machine Learning for Identifying Causes Affecting Personality Disorder Disease on Twitter.” In International Conference on Knowledge Science, Engineering and Management, 659–669. Springer.
  • Ellouze, M., S. Mechti, M. Krichen, V. Ravi, and L. H. Belguith. 2022. “A Deep Learning Approach for Detecting the Behaviour of People Having Personality Disorders Towards COVID-19 From Twitter.” International Journal of Computational Science and Engineering 25 (4): 353–366. doi:10.1504/IJCSE.2022.124553.
  • Erdal, K., and M. A. Khanesar. 2016. “Chapter 2 – Fundamentals of Type-1 Fuzzy Logic Theory.” In Fuzzy Neural Networks for Real Time Control Applications, 13–24. Butterworth-Heinemann. http://www.sciencedirect.com/science/article/pii/B9780128026878000025.
  • Gardner, A., N. Elhami, and R. R. Selmic. 2019. “Classifying unordered feature sets with convolutional deep averaging networks.” In 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), 3447–3453. IEEE.
  • Hall, M., and S. Caton. 2017. “Am I Who I Say I Am? Unobtrusive Self-representation and Personality Recognition on Facebook.” PloS One 12 (9): e0184417. doi:10.1371/journal.pone.0184417.
  • Hardeniya, N., J. Perkins, D. Chopra, N. Joshi, and I. Mathur. 2016. Natural Language Processing: Python and NLTK. Packt Publishing Ltd.
  • Hofmann, M., and R. Klinkenberg. 2016. RapidMiner: Data Mining Use Cases and Business Analytics Applications. CRC Press.
  • Holtzman, N. S., A. M. Tackman, A. L. Carey, M. S. Brucks, A. C. Küfner, F. G. Deters, M. D. Back, M. B. Donnellan, J. W. Pennebaker, R. A. Sherman, and M. R. Mehl. 2019. “Linguistic Markers of Grandiose Narcissism: A LIWC Analysis of 15 Samples.” Journal of Language and Social Psychology38 (5-6): 773–786. doi:10.1177/0261927X19871084.
  • Hoogman, M., J. Bralten, D. P. Hibar, M. Mennes, M. P. Zwiers, L. S. Schweren, K. J. van Hulzen, S. E. Medland, E. Shumskaya, N. Jahanshad, and P. de Zeeuw. 2017. “Subcortical Brain Volume Differences in Participants with Attention Deficit Hyperactivity Disorder in Children and Adults: a Cross-sectional Mega-analysis.” The Lancet Psychiatry 4 (4): 310–319. doi:10.1016/S2215-0366(17)30049-4.
  • Hribar, L., and D. Duka. 2010. “Software component quality prediction using KNN and Fuzzy logic.” In The 33rd International Convention MIPRO, 402–408. IEEE.
  • Hu, B., and A. Naseer. 2015. “Human centric ICT support to young persons with mental disorders.” In 2015 IEEE 28th International Symposium on Computer-Based Medical Systems, 354–355. IEEE.
  • Hurtado, F. 2020. “Extractive summarization using siamese hierarchical transformer encoders.” Journal of Intelligent & Fuzzy Systems (Preprint): 1–11.
  • Khan, M. L., A. Malik, U. Ruhi, and A. Al-Busaidi. 2022. “Conflicting Attitudes: Analyzing Social Media Data to Understand the Early Discourse on COVID-19 Passports.” Technology in Society 68: 101830. doi:10.1016/j.techsoc.2021.101830.
  • Kirk, H., A. Gilmour, R. Dudley, and D. M. Riby. 2013. “Paranoid Ideation and Assessments of Trust.” Journal of Experimental Psychopathology 4 (4): 360–367. doi:10.5127/jep.027812.
  • Krishnaiah, V., G. Narsimha, and N. S. Chandra. 2015. “Heart disease prediction system using data mining technique by fuzzy K-NN approach.” In Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1, 371–384. Springer.
  • Mbarek, A., S. Jamoussi, A. Charfi, and A. B. Hamadou. 2019. “Suicidal Profiles Detection in Twitter.” In WEBIST, 289–296.
  • Morera-Fumero, A. L, E. Diaz-Mesa, P. Abreu-Gonzalez, L. Fernandez-Lopez, and M. del Rosario Cejas-Mendez. 2017. “Low Levels of Serum Total Antioxidant Capacity and Presence At Admission and Absence At Discharge of a Day/night Change As a Marker of Acute Paranoid Schizophrenia Relapse.” Psychiatry Research 249: 200–205. doi:10.1016/j.psychres.2017.01.043.
  • Ombabi, A. H., W. Ouarda, and A. M. Alimi. 2020. “Deep Learning CNN-LSTM Framework for Arabic Sentiment Analysis Using Textual Information Shared in Social Networks.” Social Network Analysis and Mining 10 (1): 1–13. doi:10.1007/s13278-020-00668-1.
  • Pennebaker, J. W., M. R. Mehl, and K. G. Niederhoffer. 2003. “Psychological Aspects of Natural Language Use: Our Words, Our Selves.” Annual Review of Psychology 54 (1): 547–577. doi:10.1146/psych.2003.54.issue-1.
  • Pramodh, K. C., and Y. Vijayalata. 2016. “Automatic personality recognition of authors using big five factor model.” In 2016 IEEE International Conference on Advances in Computer Applications (ICACA), 32–37. IEEE.
  • Rekik, A., S. Jamoussi, and A. B. Hamadou. 2019. “Violent vocabulary extraction methodology: Application to the radicalism detection on social media.” In International Conference on Computational Collective Intelligence, 97–109. Springer.
  • Roesslein, J. 2009. “tweepy Documentation.” Online] http://tweepy. readthedocs. io/en/v3 5.
  • Ron, O., E. Oren, and R. Dar. 2016. “The Doubt-certainty Continuum in Psychopathology, Lay Thinking, and Science.” Journal of Behavior Therapy and Experimental Psychiatry 53: 68–74. doi:10.1016/j.jbtep.2015.08.005.
  • Ruffner, M., and M. Burgoon. 1981. “The Relationship Between Writing Style and Personality Structure.” Newspaper Research Journal 2 (2): 28–35. doi:10.1177/073953298100200203.
  • Salem, M. S, S. S. Ismail, and M. Aref. 2019. “Personality Traits for Egyptian Twitter Users Dataset.” In Proceedings of the 2019 8th International Conference on Software and Information Engineering, 206–211.
  • Schwartz, H. A., J. C. Eichstaedt, M. L. Kern, L. Dziurzynski, S. M. Ramones, M. Agrawal, A. Shah, M. Kosinski, D. Stillwell, M. E. Seligman, and L. H. Ungar. 2013. “Personality, Gender, and Age in the Language of Social Media: The Open-vocabulary Approach.” PloS One 8 (9): e73791. doi:10.1371/journal.pone.0073791.
  • Scocco, P., A. Preti, S. Totaro, P. W. Corrigan, and C. Castriotta. 2019. “SOPROXI Team. Stigma, Grief and Depressive Symptoms in Help-seeking People Bereaved Through Suicide.” Journal of Affective Disorders 244: 223–230. doi:10.1016/j.jad.2018.10.098.
  • Teng, S., K. W. Khong, and N. C. Ha. 2020. “Palm Oil and Its Environmental Impacts: A Big Data Analytics Study.” Journal of Cleaner Production 274: 122901. doi:10.1016/j.jclepro.2020.122901.
  • Triebwasser, J., E. Chemerinski, P. Roussos, and L. J. Siever. 2013. “Paranoid Personality Disorder.” Journal of Personality Disorders 27 (6): 795–805. doi:10.1521/pedi_2012_26_055.
  • West, E. N., and O. Kempthorne. 1972. “A Comparison of the Chi2 and Likelihood Ratio Tests for Composite Alternatives1.” Journal of Statistical Computation and Simulation 1 (1): 1–33. doi:10.1080/00949657208810001.
  • Zhang, S., D. Cheng, Z. Deng, M. Zong, and X. Deng. 2018. “A Novel KNN Algorithm with Data-driven K Parameter Computation.” Pattern Recognition Letters 109: 44–54. doi:10.1016/j.patrec.2017.09.036.
  • Zhang, Y., W. He, and L. Peng. 2022. “How Perceived Pressure Affects Users' Social Media Fatigue Behavior: a Case on WeChat.” Journal of Computer Information Systems 62 (2): 337–348. doi:10.1080/08874417.2020.1824596.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.