Twitter based Analytics for Business Footprints of the Banking Sector in India

  • Authors

    • Sheetal Ambulkar
    • Akshay Saraf
    • Neeranjan Chitre
    2018-11-27
    https://doi.org/10.14419/ijet.v7i4.19.22092
  • Big data applications, Data mining, Data visualization, Machine learning algorithms, Natural language processing, Sentiment Analysis, Social computing, Social Intelligence, Twitter.
  • Twitter is one of the world’s most popular social media platforms with over 330 million users. Many businesses use Twitter to reach and connect with their customers. There are a number of advantages that using twitter can bring to a business. Some of the prominent advantages of tweeter platform to the businesses are the reach to broad spectrum of customers worldwide, delivery of customer services, establishment of brand identity, gathering customer feedback etc. The best part of it is that these advantages are at the free of cost. This paper proposes a system, that can help the banking sector in India, to compare their impression on the general customer by analyzing the tweets by the banking organizations and the replies by their customers The analysis includes the tweet handles by two nationalized banks (State Bank of India and Punjab National Bank) and two private sector banks (ICICI and HDFC). 

     

  • References

    1. [1] Shamanth Kumar, Fred Morstatter, HuanLiu, “Twitter Data Analytics†in Springer, Aug 2013, Pages –1-5

      [2] Jennifer. Q. Trelewicz, Big Data and Big Money: The Role of Data in the Financial Sector , Accession Number: 16948585 , DOI: 10.1109/MITP.2017.45, Publisher: IEEE

      [3] Anber, H., A. Salah, and A. A. Abd El-Aziz, "A Literature Review on Twitter Data Analysis", International Journal of Computer and Electrical Engineering, vol 8(3), 2016: Journal of Computers, 2016..

      [4] Spin-offs in Indian Stock Market owing to Twitter Sentiments, Commodity Prices and Analyst Recommendations Voice of Customers: Text Analysis of Hotel Customer Reviews (Cleanliness, Overall Environment & Value for Money)

      [5] Bongsug (Kevin)Chae, Insights from hashtag #supplychain and Twitter Analytics: Considering Twitter and Twitter data for supply chain practice and research, International Journal of Production Economics Volume 165, July 2015,

      [6] Bangalore paper

      [7] Anber, H., A. Salah, and A. A. Abd El-Aziz, "A Literature Review on Twitter Data Analysis", International Journal of Computer and Electrical Engineering, vol 8(3), 2016: Journal of Computers, 2016..

      [8] Crockett, KA and Mclean, D and Latham, A and Alnajran, N (2017) Cluster Analysis of Twitter Data: A Review of Algorithms. In: 9th International Conference on Agents and Artificial Intelligence (ICAART), 24 February 2017 - 26 February 2017, Portugal.

      [9] Anshul Mittal , ArpitGoel , “Stock Prediction Using Twitter Sentiment Analysisâ€, Stanford University

      [10] Zhichao Han, DATA AND TEXT MINING OF FINANCIAL MARKETS USING NEWS AND SOCIAL MEDIA, A Dissertation submitted to the University of Manchester

      [11] M. Budde, J. De Melo Borges, S. Tomov, T. Riedel,and M. Beigl. Leveraging spatio-temporal clustering for participatory urban infrastructure monitoring. In Proceedings of the First International Conference onIoT in Urban Space, pages 32{37. ICST (Institute for Computer Sciences, Social-Informatics and Tele-communications Engineering), 2014.

      [12] Tarmazakov, E.I., Silnov, D.S. Modern approaches to prevent fraud in mobile communications networks (2018) Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018, 2018-January, pp. 379-381. https://www.scopus.com/inward/record.uri?eid=2-s2.0- 85048047820&doi=10.1109%2fEIConRus.2018.8317111&partnerID=40&md5=fd2de2dd9837e66316a7f042763b9927 DOI: 10.1109/EIConRus.2018.8317111

      [13] Balanyuk, Y.B., Silnov, D.S., Goncharov, D.E. Applying memshift technology to increase GPU performance (2018) Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018, 2018-January, pp. 275-276. https://www.scopus.com/inward/record.uri?eid=2-s2.0- 85048035288&doi=10.1109%2fEIConRus.2018.8317084&partnerID=40&md5=b8306ca07043e666227858a7e4ef6cb1 DOI: 10.1109/EIConRus.2018.8317084

      [14] Goncharov, D.E., Zareshin, S.V., Bulychev, R.V., Silnov, D.S. Vulnerability analysis of the Wifi spots using WPS by modified scanner vistumbler (2018) Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018, 2018-January, pp. 48-51.
      https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048157038&doi=10.1109%2fEIConRus.2018.8317027&partnerID=40&md5=bcc54f5086136ebe0d68e414ef303a46 DOI: 10.1109/EIConRus.2018.8317027

      [15] Mushtakov, R.E., Silnov, D.S., Tarakanov, O.V., Bukharov, V.A. Investigation of modern attacks using proxy honeypot (2018) Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018, 2018-January, pp. 86-89. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85048016646&doi=10.1109%2fEIConRus.2018.8317036&partnerID=40&md5=9a6ad869d7cf18b4bf8f26edfc218093 DOI: 10.1109/EIConRus.2018.8317036

      [16] Frolov, A.A., Silnov, D.S., Geraschencko, Y.Y., Sadretdinov, A.M., Kiamov, A.A. Research of mechanisms counteracting the distribution of prohibited content on the Internet (2018) Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018, 2018- January, pp. 298-302. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85047985123&doi=10.1109%2fEIConRus.2018.8317092&partnerID=40&md5=0dc4ec2fb660a7ed2d24babd6ea93734 DOI: 10.1109/EIConRus.2018.8317092

      [17] Prokofiev, A.O., Smirnova, Y.S., Silnov, D.S. Examination of cybercriminal behaviour while interacting with the RTSP-Server(2017) International Conference on Industrial Engineering, Applications and Manufacturing, ICIEAM 2017 - Proceedings, art. no. 8076437. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85039927486&doi=10.1109%2fICIEAM.2017.8076437&partnerID=40&md5=ad99910201c39909410085d73349a039 DOI: 10.1109/ICIEAM.2017.8076437

      [18] Prokofiev, A.O., Smirnova, Y.S., Silnov, D.S. The Internet of Things cybersecurity examination (2017) Proceedings - 2017 Siberian Symposium on Data Science and Engineering, SSDSE 2017, art. no. 8071962, pp. 44-48. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85040368095&doi=10.1109%2fSSDSE.2017.8071962&partnerID=40&md5=d949f724d5786343634f9e49ba0d65a2 DOI: 10.1109/SSDSE.2017.8071962

      [19] Arzhakov, A.V., Silnov, D.S. Architecture of multithreaded network scanner (2017) International Conference of Young Specialists onMicro/Nanotechnologies and Electron Devices, EDM, art. no. 7981704, pp. 43-45. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85027159579&doi=10.1109%2fEDM.2017.7981704&partnerID=40&md5=b8dda0ef229557a5383568bbb688dfbe DOI: 10.1109/EDM.2017.7981704

      [20] Mushtakov, R.E., Silnov, D.S. New approach to detect suspicious activity using HTTP-proxy honeypots (2017) Proceedings of the 2017 IEEE Russia Section Young Researchers in Electrical and Electronic Engineering Conference, ElConRus 2017, art. no. 7910525, pp. 187-189. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019479586&doi=10.1109%2fEIConRus.2017.7910525&partnerID=40&md5=ce6f84a452a95b67057221e22900a6ce DOI: 10.1109/EIConRus.2017.7910525

      [21] Taran, A., Silnov, D.S. Research of attacks on MySQL servers using HoneyPot technology (2017) Proceedings of the 2017 IEEE Russia Section Young Researchers in Electrical and Electronic Engineering Conference, ElConRus 2017, art. no. 7910533, pp. 224-226. https://www.scopus.com/inward/record.uri?eid=2-s2.0-85019476121&doi=10.1109%2fEIConRus.2017.7910533&partnerID=40&md5=066268db0f19141b80a6be0edc0ee8c1 DOI: 10.1109/EIConRus.2017.7910533.

  • Downloads

  • How to Cite

    Ambulkar, S., Saraf, A., & Chitre, N. (2018). Twitter based Analytics for Business Footprints of the Banking Sector in India. International Journal of Engineering & Technology, 7(4.19), 366-368. https://doi.org/10.14419/ijet.v7i4.19.22092