Skip to main content

Multiple Social Influence: Models and Applications

  • Chapter
  • First Online:
  • 602 Accesses

Part of the book series: SpringerBriefs in Optimization ((BRIEFSOPTI))

Abstract

Cascading processes are models of network diffusion used to study phenomenon concerning the spread of new trends and innovations in social networks. Each node can be in one of two states: infected (i.e., supports an idea or a product) or uninfected. Every infected node can infect its neighbors and thus, the infection, formally called a cascade, propagates through the network. These processes have been studied in many applications such as viral marketing, blog networks, and contagion models.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. E. Bakshy, J.M. Hofman, W.A. Mason, D.J. Watts, Everyone’s an influencer: quantifying influence on twitter, in Proceedings of the Fourth ACM International Conference on Web Search and Data Mining (ACM, New York, 2011), pp. 65–74

    Google Scholar 

  2. A. Beutel, B.A. Prakash, R. Rosenfeld, C. Faloutsos, Interacting viruses in networks: can both survive? in Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, New York, 2012), pp. 426–434

    Google Scholar 

  3. S. Bharathi, D. Kempe, M. Salek, Competitive influence maximization in social networks. Internet Netw. Econ. 4858, 306–311 (2007)

    Article  Google Scholar 

  4. Y. Bi, W. Wu, Y. Zhu, Csi: charged system influence model for human behavior prediction, in ICDM (2013), pp. 31–40

    Google Scholar 

  5. C. Budak, D. Agrawal, A.E. Abbadi, Limiting the spread of misinformation in social networks. WWW (2011), pp. 665–674

    Google Scholar 

  6. T. Carnes, C. Nagarajan, S.M. Wild, A.V. Zuylen, Maximizing influence in a competitive social network: a follower’s perspective, in Proceedings of the 9th International Conference on Electronic Commerce (ICEC) (2007), pp. 351–360

    Google Scholar 

  7. P. Dodds, D. Watts, Universal behavior in a generalized model of contagion. Phys. Rev. Lett. 92, 218–701 (2004)

    Article  Google Scholar 

  8. P. Domingos, M. Richardson, Mining the network value of customers, in Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM, New York, 2001), pp. 57–66

    Google Scholar 

  9. J. Goldenberg, B. Libai, E. Muller, Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12, 211–223 (2001)

    Article  Google Scholar 

  10. S. Goyal, M. Kearns, Competitive contagion in networks, in Proceedings of the 44th Symposium on Theory of Computing (ACM, New York, 2012), pp. 759–774

    MATH  Google Scholar 

  11. A. Goyal, F. Bonchi, L.V. Lakshmanan, Learning influence probabilities in social networks, in Proceedings of the 3rd ACM International Conference on Web Search and Data Mining (2010), pp. 241–250

    Google Scholar 

  12. A. Goyal, W. Lu, L. Lakshmanan, A data-based approach to social influence maximization. Proc. VLDB Endowment5(1), 73–84 (2011)

    Article  Google Scholar 

  13. M. Granovetter, Threshold models of collective behavior. Am. J. Sociol. 83(6), 1420–1443 (1978)

    Article  Google Scholar 

  14. I. Guyon, J. Weston, S. Barnhill, V. Vapnik, Gene selection for cancer classification using support vector machines. Mach. Learn. 46(1–3), 389–422 (2002)

    Article  Google Scholar 

  15. D. Halliday, R. Resnick, J. Walker, Fundamentals of Physics, 8th edn. (Wiley, New Delhi, 2007)

    MATH  Google Scholar 

  16. S. Hill, F. Provost, C. Volinsky, Network-based marketing: identifying likely adopters via consumer networks. Stat. Sci. 21, 256–276 (2006)

    Article  MathSciNet  Google Scholar 

  17. B. Karrer, M. Newman, Competing epidemics on complex networks. Phys. Rev. E 84(3), 036106 (2011)

    Google Scholar 

  18. D. Kempe, J. Kleinberg, E. Tardos, Maximizing the spread of influence through a social network, in Proceedings of the 9th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (2003), pp. 137–146

    Google Scholar 

  19. J. Leskovec, J.M. Kleinberg, C. Faloutsos, Graph evolution: densification and shrinking diameters. ACM Trans. Knowl. Discov. Data 1(1), 2 (2007)

    Article  Google Scholar 

  20. S.A. Myers, J. Leskovec, Clash of the contagions: cooperation and competition in information diffusion, in 2012 IEEE 12th International Conference on Data Mining (ICDM) (IEEE, Piscataway, 2012), pp. 539–548

    Google Scholar 

  21. N. Pathak, A. Banerjee, J. Srivastava, A generalized linear threshold model for multiple cascades, in 2010 IEEE 10th International Conference on Data Mining (ICDM) (IEEE, Piscataway, 2010), pp. 965–970

    Book  Google Scholar 

  22. B.A. Prakash, A. Beutel, R. Rosenfeld, C. Faloutsos, Winner takes all: competing viruses or ideas on fair-play networks, in Proceedings of the 21st International Conference on World Wide Web (ACM, New York, 2012), pp. 1037–1046

    Google Scholar 

  23. M. Richardson, P. Domingos, Mining knowledge-sharing sites for viral marketing, in Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 61–70 (ACM, New York, 2002)

    Google Scholar 

  24. K. Saito, R. Nakano, M. Kimura, Prediction of information diffusion probabilities for independent cascade model, in Knowledge-Based Intelligent Information and Engineering Systems (Springer, 2008), pp. 67–75

    Google Scholar 

  25. P. Sarkar, A. Moore, Dynamic social network analysis using latent space models, in ACM SIGKDD Explorations Newsletter, vol. 7(2) (2005), pp. 31–40

    Article  Google Scholar 

  26. J. Scripps, P.N. Tan, A.H. Esfahanian, Measuring the effects of preprocessing decisions and network forces in dynamic network analysis, in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) (2009), pp. 747–756

    Google Scholar 

  27. X. Shi, J. Zhu, R. Cai, L. Zhang, User grouping behavior in online forums, in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) (2009), pp. 777–785

    Google Scholar 

  28. J. Sun, J. Tang, A survey of models and algorithms for social influence analysis, in Social Network Data Analytics (Springer, Boston, 2011), pp. 177–214

    Google Scholar 

  29. J. Tang, J. Sun, C. Wang, Z. Yang, Social influence analysis in large-scale networks, in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2009), pp. 807–816

    Google Scholar 

  30. C. Wang, W. Chen, Y. Wang, Scalable influence maximization for independent cascade model in large-scale social networks. Data Min. Knowl. Discov. 25(3), 545–576 (2012)

    Article  MathSciNet  Google Scholar 

  31. W. Xu, Z. Lu, W. Wu, Z. Chen, A novel approach to online social influence maximization. J. Soc. Netw. Anal. Min. (SNAM) 4(1), 153–164 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Xu, W., Wu, W. (2020). Multiple Social Influence: Models and Applications. In: Optimal Social Influence. SpringerBriefs in Optimization. Springer, Cham. https://doi.org/10.1007/978-3-030-37775-5_5

Download citation

Publish with us

Policies and ethics