Influence Ranking Model for Social Networks Users
Microblogging is the most important feature for Social Networks (SN) nowadays. It allows users to interact together by sharing and posting contents. The concept of spreading content between users raises an important question: Who are the users responsible for this content? In other words, the detection of content spreaders becomes one of the most important analytic issues. The common belief is that the best content spreaders are the best connected users (the most central users within network). Specifically, k-shell decomposition methodology defines the most efficient content spreaders as those located within the core of the network. In this paper, influence ranking model (IRM) is presented to rank SN users based on their contribution in spreading a specific content. The proposed model is inspired by the pruning process of the powerful k-shell decomposition methodology. IRM has been evaluated in realistic experiments using the famous datasets of Advogato trust network and Bitcoin Alpha trust weighted signed network. The proposed model was assessed in terms of distinction of nodes ranking and dissemination capability.
Results have shown that IRM has promising results in SN users ranking.
KeywordsInfluential users Microblogging Social Networks K-shell
- 1.Chai, W., et al.: ACQR: a novel framework to identify and predict influential users in micro-blogging. In: PACIS (2013)Google Scholar
- 3.Tabassum, S., Pereira, F.S.F., Fernandes, S., Gama, J.: Social network analysis: an overview. Wiley Interdisciplinary Reviews: Data Min. Knowl. Disc. 8(5), e1256 (2018)Google Scholar
- 4.Chen, W., Teng, S.-H.: Interplay between social influence and network centrality: a comparative study on Shapley centrality and single-node-influence centrality. In: 26th International Conference on World Wide Web. WWW Conferences Steering Committee (2017)Google Scholar
- 7.Hao, F., Chen, M., Zhu, C., Guizani, M.: Discovering influential users in micro-blog marketing with influence maximization mechanism. In: GLOBECOM. IEEE (2012)Google Scholar
- 8.Hu, Q., Gao, Y., Ma, P., Yin, Y., Zhang, Y., Xing, C.: A new approach to identify influential spreaders in complex networks. In: International Conference on Web-Age Information Management. Springer (2013)Google Scholar
- 9.Rad, A.A., Benyoucef, M.: Towards detecting influential users in social networks. In: International Conference on E-technologies. Springer (2011)Google Scholar
- 11.Nafis, M.T., et al.: To find influential’s in Twitter based on information propagation. Int. J. Comput. Appl. (2015)Google Scholar
- 12.Mao, G.-J., Zhang, J.: A PageRank-based mining algorithm for user influences on micro-blogs. In: PACIS (2016)Google Scholar
- 13.Massa, P., Salvetti, M., Tomasoni, D.: Bowling alone and trust decline in social network sites. In: DASC 2009. IEEE (2009)Google Scholar
- 14.Kumar, S., Spezzano, F., Subrahmanian, V.S., Faloutsos, C.: Edge weight prediction in weighted signed networks. In: ICDM. IEEE (2016)Google Scholar