Skip to main content

An Efficient Critical Incident Propagation Model for Social Networks Based on Trust Factor

  • Conference paper
  • First Online:
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2017)

Abstract

Studying patterns of social behavior among users based on micro blogs, QQ posts, and comments is essential to understanding the information propagation process during critical incidents. A common problem of information propagation models based on epidemic dynamics is that they regard the probability of information being propagated successfully across different nodes as a constant. But in real-world scenarios, infection probability varies depending on the trust relationship between people. In this paper, a novel information propagation model for critical incidents is proposed that takes into account the trust factor based on information propagation theory.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Roshani, F., Naimi, Y.: Effects of degree-biased transmission rate and nonlinear infectivity on rumor spreading in complex social networks. Phys. Rev. E 85, 036109 (2012)

    Article  Google Scholar 

  2. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 618–644 (2007)

    Article  Google Scholar 

  3. Jøsang, A.: A logic for uncertain probabilities. Int. J. Uncertain. Fuzz. 9, 279–311 (2001)

    Article  MathSciNet  Google Scholar 

  4. Yu, B., Singh, M.P.: An evidential model of distributed reputation management. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, Bologna, Italy, July 15–19, 2002, pp. 294–301 (2002)

    Google Scholar 

  5. Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM 43, 45–48 (2000)

    Article  Google Scholar 

  6. Wang, Y., Vassileva, J.: Bayesian network-based trust model. In: Proceedings of IEEE/WIC International Conference on Web Intelligence, Halifax, NS, Canada, Canada, 27 October 2003, pp. 372–378 (2003)

    Google Scholar 

  7. Alves, L.G., Ribeiro, H.V., Lenzi, E.K., Mendes, R.S.: Distance to the scaling law: a useful approach for unveiling relationships between crime and urban metrics. PLoS ONE 8, e69580 (2013)

    Article  Google Scholar 

  8. Song, X., Yan, X.: Influencing factors of emergency information spreading in online social networks: a simulation approach. J. Homel. Secur. Emerg. Manag. 9, 1–14 (2012)

    Google Scholar 

  9. Kenett, D.Y., Portugali, J.: Population movement under extreme events. Proc. Natl. Acad. Sci. USA 109, 11472–11473 (2012)

    Article  Google Scholar 

  10. Lu, X., Bengtsson, L., Holme, P.: Predictability of population displacement after the 2010 Haiti earthquake. Proc. Natl. Acad. Sci. USA 109, 11576–11581 (2012)

    Article  Google Scholar 

  11. Wesolowski, A., et al.: Quantifying the impact of human mobility on malaria. Science 338, 267–270 (2012)

    Article  Google Scholar 

  12. Clauset, A., Gleditsch, K.S.: The developmental dynamics of terrorist organizations. PLoS ONE 7, e48633 (2012)

    Article  Google Scholar 

  13. Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distr. 27, 2546–2559 (2016)

    Article  Google Scholar 

  14. Ma, T., et al.: Social network and tag sources based augmenting collaborative recommender system. IEICE Trans. Inf. Syst. 98, 902–910 (2015)

    Article  Google Scholar 

  15. Xie, S., Wang, Y.: Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel. Pers. Commun. 78, 231–246 (2014)

    Article  Google Scholar 

Download references

Acknowledgment

This research is partially supported by the Major Project of National Social Science Fund of China (Grant No. 14ZDB153), the National Science Foundation of China (61572355), and Tianjin Research Program of Application Foundation and Advanced Technology under Grant No. 15JCYBJC15700, and the fundamental research of Xinjiang Corps (Grant No. 2016AC015).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guangquan Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, X., Yuan, L., Liu, C., Yu, W., Chen, X., Xu, G. (2018). An Efficient Critical Incident Propagation Model for Social Networks Based on Trust Factor. In: Romdhani, I., Shu, L., Takahiro, H., Zhou, Z., Gordon, T., Zeng, D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 252. Springer, Cham. https://doi.org/10.1007/978-3-030-00916-8_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00916-8_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00915-1

  • Online ISBN: 978-3-030-00916-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics