Advertisement

Frontiers of Computer Science

, Volume 13, Issue 6, pp 1296–1308 | Cite as

Understanding the mechanism of social tie in the propagation process of social network with communication channel

  • Kai Li
  • Guangyi Lv
  • Zhefeng Wang
  • Qi Liu
  • Enhong ChenEmail author
  • Lisheng Qiao
Research Article

Abstract

The propagation of information in online social networks plays a critical role in modern life, and thus has been studied broadly. Researchers have proposed a series of propagation models, generally, which use a single transition probability or consider factors such as content and time to describe the way how a user activates her/his neighbors. However, the research on the mechanism how social ties between users play roles in propagation process is still limited. Specifically, comprehensive summary of factors which affect user’s decision whether to share neighbor’s content was lacked in existing works, so that the existing models failed to clearly describe the process a user be activated by a neighbor. To this end, in this paper, we analyze the close correspondence between social tie in propagation process and communication channel, thus we propose to exploit the communication channel to describe the information propagation process between users, and design a social tie channel (STC) model. The model can naturally incorporate many factors affecting the information propagation through edges such as content topic and user preference, and thus can effectively capture the user behavior and relationship characteristics which indicate the property of a social tie. Extensive experiments conducted on two real-world datasets demonstrate the effectiveness of our model on content sharing prediction between users.

Keywords

information propagation social networks mechanism of social tie communication channel 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

Acknowledgements

The authors thank Biao Chang for his valuable suggestions. This research was partially supported by the National Natural Science Foundation of China (Grants Nos. U1605251, 61727809 and 91546110), the Youth Innovation Promotion Association of CAS (2014299), and Special Program for Applied Research on Super Computation of the NSFCGuangdong Joint Fund (the second phase).

Supplementary material

11704_2018_7453_MOESM1_ESM.ppt (189 kb)
Supplementary material, approximately 189 KB.

References

  1. 1.
    Kempe D, Kleinberg J, Tardos E. Maximizing the spread of influence through a social network. In: Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2003, 137–146Google Scholar
  2. 2.
    Tang J, Sun J M, Wang C, Yang Z. Social influence analysis in largescale networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2009, 807–816CrossRefGoogle Scholar
  3. 3.
    Romero D M, Meeder B, Kleinberg J. Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter. In: Proceedings of the 20th International Conference on World Wide Web. 2011, 695–704CrossRefGoogle Scholar
  4. 4.
    Myers S A, Leskovec J. Clash of the contagions: cooperation and competition in information diffusion. In: Proceedings of the 12th IEEE International Conference on Data Mining. 2012, 539–548Google Scholar
  5. 5.
    Abdullah N A, Nishioka D, Tanaka Y, Murayama Y. User’s action and decision making of retweet messages towards reducing misinformation spread during disaster. Journal of Information Processing, 2015, 23(1): 31–40CrossRefGoogle Scholar
  6. 6.
    Zhu K, Chen Z, Ying L. Catch’Em all: locating multiple diffusion sources in networks with partial observations. In: Proceedings of the 31st AAAI Conference on Artificial Intelligence. 2017, 1676–1683Google Scholar
  7. 7.
    Guille A, Hacid H, Favre C, Zighed D A. Information diffusion in online social networks: a survey. ACM Sigmod Record, 2013, 42(2): 17–28CrossRefGoogle Scholar
  8. 8.
    AlSumait L, Barbar D, Domeniconi C. On-line LDA: adaptive topic models for mining text streams with applications to topic detection and tracking. In: Proceedings of the 8th IEEE International Conference on Data Mining. 2008, 3–12Google Scholar
  9. 9.
    Lu R, Yang Q. Trend analysis of news topics on twitter. International Journal of Machine Learning and Computing, 2012, 2(3): 327–332CrossRefGoogle Scholar
  10. 10.
    Hethcote H W. The mathematics of infectious diseases. SIAM Review, 2000, 42(4): 599–653MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Gomez R M, Leskovec J, Schölkopf B. Structure and dynamics of information pathways in online media. In: Proceedings of the 6th ACM International Conference on Web Search and Data Mining. 2013, 23–32Google Scholar
  12. 12.
    Kitsak M, Gallos L K, Havlin S, Liljeros F, Muchnik L, Stanley H E, Makse H A. Identification of influential spreaders in complex networks. Nature Physics, 2010, 6(11): 888–893CrossRefGoogle Scholar
  13. 13.
    Pal A, Counts S. Identifying topical authorities in microblogs. In: Proceedings of the 4th ACM International Conference on Web Search and Data Mining. 2011, 45–54Google Scholar
  14. 14.
    Goldenberg J, Libai B, Muller E. Talk of the network: a complex systems look at the underlying process of word-of-mouth. Marketing Letters, 2001, 12(3): 211–223CrossRefGoogle Scholar
  15. 15.
    Granovetter M. Threshold models of collective behavior. American Journal of Sociology, 1978, 83(6): 1420–1443CrossRefGoogle Scholar
  16. 16.
    Liu L, Tang J, Han J, Jiang M, Yang S. Mining topic-level influence in heterogeneous networks. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management. 2010, 199–208Google Scholar
  17. 17.
    Goyal A, Bonchi F, Lakshmanan L V. A data-based approach to social influence maximization. Proceedings of the Very Large Data Bases Endowment, 2011, 5(1): 73–84Google Scholar
  18. 18.
    Barbieri N, Bonchi F, Manco G. Topic-aware social influence propagation models. In: Proceedings of the 12th IEEE International Conference on Data Mining. 2012, 81–90Google Scholar
  19. 19.
    Xiang B, Liu Q, Chen E H, Xiong H, Zheng Y, Yang Y. PageRank with priors: an influence propagation perspective. In: Proceedings of the 26th International Joint Conference on Artificial Intelligence. 2013, 2740–2746Google Scholar
  20. 20.
    Hung H J, Shuai H H, Yang D N, Huang L H, LeeW C, Pei J, Chen M S. When social influence meets item inference. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2016, 915–924CrossRefGoogle Scholar
  21. 21.
    Lei S, Maniu S, Mo L, Cheng R, Senellart P. Online influence maximization. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2015, 645–654CrossRefGoogle Scholar
  22. 22.
    Feng S, Chen X, Cong G, Zeng Y F, Chee Y M, Xiang Y P. Influence maximization with novelty decay in social networks. In: Proceedings of the 28th AAAI Conference on Artificial Intelligence. 2014, 37–43Google Scholar
  23. 23.
    Yang Y, Tang J, Leung C W, Sun Y, Chen Q, Li J, Yang Q. RAIN: social role-aware information diffusion. In: Proceedings of the 29th AAAI Conference on Artificial Intelligence. 2015, 367–373Google Scholar
  24. 24.
    Bourigault S, Lamprier S, Gallinari P. Representation learning for information diffusion through social networks: an embedded cascade model. In: Proceedings of the 9th ACM International Conference on Web Search and Data Mining. 2016, 573–582CrossRefGoogle Scholar
  25. 25.
    Zhao N, Zhang H,WangM, Hong R, Chang C. Learning content-social influential features for influence analysis. International Journal of Multimedia Information Retrieval, 2016, 5(3): 137–149CrossRefGoogle Scholar
  26. 26.
    Saito K, Nakano R, Kimura M. Prediction of information diffusion probabilities for independent cascade model. In: Proceedings of International Conference on Knowledge-Based Intelligent Information and Engineering Systems. 2008, 67–75Google Scholar
  27. 27.
    Netrapalli P, Sanghavi S. Learning the graph of epidemic cascades. ACM SIGMETRICS Performance Evaluation Review, 2012, 40(1): 211–222CrossRefGoogle Scholar
  28. 28.
    Goyal A, Bonchi F, Lakshmanan L V. Learning influence probabilities in social networks. In: Proceedings of the 3rd ACM International Conference on Web Search and Data Mining. 2008, 241–250Google Scholar
  29. 29.
    Naveed N, Gottron T, Kunegis J, Alhadi A C. Bad news travel fast: a content-based analysis of interestingness on twitter. In: Proceedings of the 3rd International Web Science Conference. 2011, 8Google Scholar
  30. 30.
    Petrovic S, Osborne M, Lavrenko V. RT to win! predicting message propagation in twitter. In: Proceedings of the 5th International AAAI Conference on Weblogs and Social Media. 2011, 586–589Google Scholar
  31. 31.
    Firdaus S N, Ding C, Sadeghian A. Retweet prediction considering user’s difference as an author and retweeter. In: Proceeding of the 8th IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 2016, 852–859Google Scholar
  32. 32.
    Wang M, Zuo W L, Wang Y. A multidimensional nonnegative matrix factorization model for retweeting behavior prediction. Mathematical Problems in Engineering, 2015, 2015: 1–10Google Scholar
  33. 33.
    Zhang K, Yun X, Liang J, Zhang X Y, Li C, Tian B. Retweeting behavior prediction using probabilistic matrix factorization. In: Proceedings of the 21st IEEE Symposium on Computers and Communication. 2016, 1185–1192Google Scholar
  34. 34.
    Jiang B, Liang J, Sha Y, Li R, Liu W, Ma H, Wang L. Retweeting behavior prediction based on one-class collaborative filtering in social networks. In: Proceedings of the 39th International ACM SIGIR Conference on Research and Development in Information Retrieval. 2016, 977–980Google Scholar
  35. 35.
    Pan R, Zhou Y, Cao B, Liu N, Lukose R, Scholz M, Yang Q. One-class collaborative filtering. In: Proceedings of the 8th IEEE International Conference on Data Mining. 2008, 502–511Google Scholar
  36. 36.
    Ryan B, Gross N C. The diffusion of hybrid seed corn in two Iowa communities. Rural Sociology, 1943, 8(1): 15Google Scholar
  37. 37.
    Zhou W, Duan W, Piramuthu S. A social network matrix for implicit and explicit social network plates. Decision Support Systems, 2014, 68: 89–97CrossRefGoogle Scholar
  38. 38.
    Metaxas P T, Mustafaraj E,Wong K, Zeng L, O’Keefe M, Finn S. What do retweets indicate? Results from user survey and meta-review of research. In: Proceedings of the 9th International AAAI Conference on Web and Social Media. 2015, 658–661Google Scholar
  39. 39.
    Cover T M, Thomas J A. Elements of Information Theory. Hoboken: John Wiley & Sons, 2012zbMATHGoogle Scholar
  40. 40.
    Zhang M L, Zhou Z H. A review on multi-label learning algorithms. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(8): 1819–1837CrossRefGoogle Scholar
  41. 41.
    Gibaja E, Ventura S. A tutorial on multilabel learning. ACM Computing Surveys, 2015, 47(3): 52CrossRefGoogle Scholar
  42. 42.
    Darling W M. A theoretical and practical implementation tutorial on topic modeling and gibbs sampling. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies. 2011, 642–647Google Scholar
  43. 43.
    Blei D M, Ng A Y, Jordan M I. Latent dirichlet allocation. Journal of Machine Learning Research, 2003, 3(Jan): 993–1022zbMATHGoogle Scholar
  44. 44.
    Liu B, Lei Z. Mining Text Data (A Survey of Opinion Mining and Sentiment Analysis). New York: Springer US, 2012, 415–463Google Scholar
  45. 45.
    Patel V, Gayatri P, Kiran B. A survey of opinion mining and sentiment analysis. International Journal of Computer Applications, 2015, 131(1): 24–27CrossRefGoogle Scholar
  46. 46.
    Macskassy S A, Provost F. A simple relational classifier. In: Proceedings of the 2nd Workshop on Multi-Relational Data Mining. 2003, 64–76Google Scholar
  47. 47.
    Zhang J, Liu B, Tang J, Chen T, Li J. Social influence locality for modeling retweeting behaviors. In: Proceedings of the 23rd International Joint Conference on Artificial Intelligence. 2013, 2761–2767Google Scholar
  48. 48.
    Mahmud J, Zhou M X, Megiddo N, Nichols J, Drews C. Recommending targeted strangers from whom to solicit information on social media. In: Proceedings of the 18th International Conference on Intelligent User Interfaces. 2013, 37–48Google Scholar
  49. 49.
    Yarkoni T. Personality in 100,000 words: a large-scale analysis of personality and word use among bloggers. Journal of Research in Personality, 2010, 44(3): 363–373CrossRefGoogle Scholar
  50. 50.
    Tausczik Y R, Pennebaker J W. The psychological meaning of words: LIWC and computerized text analysis methods. Journal of Language and Social Psychology, 2010, 29(1): 24–54CrossRefGoogle Scholar
  51. 51.
    Huang C L, Chung C K, Hui N, Lin Y C, Seih Y T, Lam B C, Chen W Q, Bond M H, Pennebaker J W. The development of the Chinese linguistic inquiry and word count dictionary. Chinese Journal of Psychology, 2012, 54(2): 185–201Google Scholar

Copyright information

© Higher Education Press and Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  • Kai Li
    • 1
  • Guangyi Lv
    • 1
  • Zhefeng Wang
    • 1
  • Qi Liu
    • 1
  • Enhong Chen
    • 1
    Email author
  • Lisheng Qiao
    • 1
  1. 1.Anhui Province Key Laboratory of Big Data Analysis and ApplicationUniversity of Science and Technology of ChinaHefeiChina

Personalised recommendations