Advertisement

Influence Ranking Model for Social Networks Users

  • Nouran AymanEmail author
  • Tarek F. Gharib
  • Mohamed Hamdy
  • Yasmine Afify
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 921)

Abstract

Microblogging is the most important feature for Social Networks (SN) nowadays. It allows users to interact together by sharing and posting contents. The concept of spreading content between users raises an important question: Who are the users responsible for this content? In other words, the detection of content spreaders becomes one of the most important analytic issues. The common belief is that the best content spreaders are the best connected users (the most central users within network). Specifically, k-shell decomposition methodology defines the most efficient content spreaders as those located within the core of the network. In this paper, influence ranking model (IRM) is presented to rank SN users based on their contribution in spreading a specific content. The proposed model is inspired by the pruning process of the powerful k-shell decomposition methodology. IRM has been evaluated in realistic experiments using the famous datasets of Advogato trust network and Bitcoin Alpha trust weighted signed network. The proposed model was assessed in terms of distinction of nodes ranking and dissemination capability.

Results have shown that IRM has promising results in SN users ranking.

Keywords

Influential users Microblogging Social Networks K-shell 

References

  1. 1.
    Chai, W., et al.: ACQR: a novel framework to identify and predict influential users in micro-blogging. In: PACIS (2013)Google Scholar
  2. 2.
    Sadri, A.M., Hasan, S., Ukkusuri, S.V., Lopez, J.E.S.: Analysis of social interaction network properties and growth on Twitter. Soc. Netw. Anal. Min. 8(1), 56 (2018)CrossRefGoogle Scholar
  3. 3.
    Tabassum, S., Pereira, F.S.F., Fernandes, S., Gama, J.: Social network analysis: an overview. Wiley Interdisciplinary Reviews: Data Min. Knowl. Disc. 8(5), e1256 (2018)Google Scholar
  4. 4.
    Chen, W., Teng, S.-H.: Interplay between social influence and network centrality: a comparative study on Shapley centrality and single-node-influence centrality. In: 26th International Conference on World Wide Web. WWW Conferences Steering Committee (2017)Google Scholar
  5. 5.
    Wei, B., Liu, J., Wei, D., Gao, C., Deng, Y.: Weighted k-shell decomposition for complex networks based on potential edge weights. Physica A 420, 277–283 (2015)CrossRefGoogle Scholar
  6. 6.
    Kitsak, M., et al.: Identification of influential spreaders in complex networks. Nat. Phys. 6(11), 888 (2010)CrossRefGoogle Scholar
  7. 7.
    Hao, F., Chen, M., Zhu, C., Guizani, M.: Discovering influential users in micro-blog marketing with influence maximization mechanism. In: GLOBECOM. IEEE (2012)Google Scholar
  8. 8.
    Hu, Q., Gao, Y., Ma, P., Yin, Y., Zhang, Y., Xing, C.: A new approach to identify influential spreaders in complex networks. In: International Conference on Web-Age Information Management. Springer (2013)Google Scholar
  9. 9.
    Rad, A.A., Benyoucef, M.: Towards detecting influential users in social networks. In: International Conference on E-technologies. Springer (2011)Google Scholar
  10. 10.
    Wu, X., Wang, J.: Micro-blog in China: identify influential users and automatically classify posts on Sina micro-blog. J. Ambient Intell. Humanized Comput. 5(1), 51–63 (2014)CrossRefGoogle Scholar
  11. 11.
    Nafis, M.T., et al.: To find influential’s in Twitter based on information propagation. Int. J. Comput. Appl. (2015)Google Scholar
  12. 12.
    Mao, G.-J., Zhang, J.: A PageRank-based mining algorithm for user influences on micro-blogs. In: PACIS (2016)Google Scholar
  13. 13.
    Massa, P., Salvetti, M., Tomasoni, D.: Bowling alone and trust decline in social network sites. In: DASC 2009. IEEE (2009)Google Scholar
  14. 14.
    Kumar, S., Spezzano, F., Subrahmanian, V.S., Faloutsos, C.: Edge weight prediction in weighted signed networks. In: ICDM. IEEE (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Nouran Ayman
    • 1
    Email author
  • Tarek F. Gharib
    • 1
  • Mohamed Hamdy
    • 1
  • Yasmine Afify
    • 1
  1. 1.Information Systems Department, Faculty of Computer and Information SciencesAin Shams UniversityCairoEgypt

Personalised recommendations