Abstract
Although most existing models focus on the evaluation of social influence in online social networks, failing to characterize indirect influence. So we present a novel framework for modeling and propagation analysis on social influence using social big data. We design a method to transform the social big data into a social graph to characterize the connections between the social interaction and the spreading of short message service or multimedia messaging service (SMS/MMS) by using bidirectional weighted graph, and measure direct influence of individual by computing each node’s strength, which includes the degree of node and the total number of SMS/MMS sent by each user to his/her friends. Then, we present an algorithm to construct an influence spreading tree for each node using the breadth first search algorithm, and measure indirect influence of individual by traversing the influence spreading tree. We extend the susceptible-infectious-recovery (SIR) model to characterize propagation dynamics process of social influence. Simulation results show that influence can spread easily in contact social network due to the good connectivity. The greater the degree of initial spread node is, the faster the influence spreads in social network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Peng, S., Wang, G., Xie, D.: Social influence analysis in social networking big data: opportunities and challenges. In: IEEE Network, pp. 12–18 (2016)
Chen, C.L.P., Zhang, C.: Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf. Sci. 275, 314–347 (2014)
Wang, G., Jiang, W., Wu, J., Xiong, Z.: Fine-grained featurebased social influence evaluation in online social networks. IEEE Trans. Parallel Distrib. Syst. 25(9), 286–2296 (2014)
Domingos, P., Riehardson, M.: Mining the network value of customers. In: Proceedings of the 7th ACM Conference on Knowledge Discovery and Data Mining, pp. 57–66 (2001)
Huang, J., Cheng, X., Shen, H., Zhou, T., Jin, X.: Exploring social influence via posterior effect of word-of-mouth recommendations. In: Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, pp. 573–582 (2012)
Li, N., Gillet, D.: Identifying influential scholars in academic social media platforms. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 608–614 (2013)
Sathanur, A.V., Jandhyala, V.: An activity-based information-theoretic annotation of social graphs. In: Proceedings of the 2014 ACM Conference on Web Science, Bloomington, USA, pp. 187–191 (2014)
Wang, Z., Shinkuma, R., Takahashi, T.: Dynamic social influence modeling from perspective of gray-scale mixing process. In: Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking, pp. 1–6 (2015)
Ye, M., Liu, X., Lee, W.-C.: Exploring social influence for recommendation: a generative model approach. In: Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 671–680 (2012)
Dietz, L., Bickel, S., Scheffer, T.: Unsupervised prediction of citation influences. In: Proceedings of the 24th International Conference on Machine Learning (ICML 2007) (2007)
Ding, Z., Jia, Y., Zhou, B., Han, Y.: Mining topical influencers based on the multi-relational network in micro-blogging sites. China Commun. 10(1), 93–104 (2013)
Sang, J., Xu, C.: Social influence analysis and application on multimedia sharing websites. ACM Trans. Multimedia Comput. Commun. Appl. 9(1s), 1–24 (2013)
Tang, J., Wu, S., Sun, J.: Confluence: conformity influence in large social networks. In: Proceeding of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2013), pp. 347–355 (2013)
Cui, P., Wang, F., Liu, S., Ou, M., Yang, S., Sun, L.: Who should share what?: Item-level social influence prediction for users and postsranking. In: Proceedings of the 34th International ACM Conference on Research and Development in Information Retrieval (SIGIR 2011), pp. 185–194 (2011)
Herzig, J., Mass, Y., Roitman, H.: An author-reader influence model for detecting topic-based influencers in social media. In: Proceedings of the 25th ACM Conference on Hypertext and Social Media (HT 2014), pp. 46–55 (2014)
Peng, S., Wang, G., Yu, S.: Mining mechanism of top-k influential nodes based on voting algorithm in mobile social networks. In: Proceedings of the 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2013), pp. 2194–2199 (2013)
Aral, S., Walker, D.: Identifying influential and susceptible members of social networks. Science 337(6092), 337–341 (2012)
Su, C., Du, Y., Guan, X., Wu, C.: Maximizing topic propagation driven by multiple user nodes in micro-blogging. In: Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, pp. 751–754 (2013)
Li, X., Liu, Y., Jiang, Y., Liu, X.: Identifying social influence in complex networks: a novel conductance eigenvector centrality model. Neurocomputing 210, 141–154 (2016)
Phan, N., Ebrahimi, J., Kil, D., Piniewski, B., Dou, D.: Topic-aware physical activity propagation in a health social network. IEEE Intell. Syst. 31, 5–14 (2016)
Peng, S., Yu, S., Yang, A.: Smartphone malware and its propagation modeling: a survey. IEEE Commun. Surv. Tutorials 16(2), 925–941 (2014)
Yu, S., Gu, G., Barnawi, A., Guo, S., Stojmenovic, I.: Malware propagation in large-scale networks. IEEE Trans. Knowl. Data Eng. 27(1), 170–179 (2015)
Acknowledgments
This work is supported by the National Natural Science Foundation of China under Grant Nos. 61379041 and 61572145.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Peng, S., Jiang, S., Yin, P. (2016). Modeling and Propagation Analysis on Social Influence Using Social Big Data. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-49148-6_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49147-9
Online ISBN: 978-3-319-49148-6
eBook Packages: Computer ScienceComputer Science (R0)