Skip to main content

Modeling and Propagation Analysis on Social Influence Using Social Big Data

  • Conference paper
  • First Online:
Book cover Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2016)

Abstract

Although most existing models focus on the evaluation of social influence in online social networks, failing to characterize indirect influence. So we present a novel framework for modeling and propagation analysis on social influence using social big data. We design a method to transform the social big data into a social graph to characterize the connections between the social interaction and the spreading of short message service or multimedia messaging service (SMS/MMS) by using bidirectional weighted graph, and measure direct influence of individual by computing each node’s strength, which includes the degree of node and the total number of SMS/MMS sent by each user to his/her friends. Then, we present an algorithm to construct an influence spreading tree for each node using the breadth first search algorithm, and measure indirect influence of individual by traversing the influence spreading tree. We extend the susceptible-infectious-recovery (SIR) model to characterize propagation dynamics process of social influence. Simulation results show that influence can spread easily in contact social network due to the good connectivity. The greater the degree of initial spread node is, the faster the influence spreads in social network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Peng, S., Wang, G., Xie, D.: Social influence analysis in social networking big data: opportunities and challenges. In: IEEE Network, pp. 12–18 (2016)

    Google Scholar 

  2. Chen, C.L.P., Zhang, C.: Data-intensive applications, challenges, techniques and technologies: a survey on big data. Inf. Sci. 275, 314–347 (2014)

    Article  Google Scholar 

  3. Wang, G., Jiang, W., Wu, J., Xiong, Z.: Fine-grained featurebased social influence evaluation in online social networks. IEEE Trans. Parallel Distrib. Syst. 25(9), 286–2296 (2014)

    Google Scholar 

  4. Domingos, P., Riehardson, M.: Mining the network value of customers. In: Proceedings of the 7th ACM Conference on Knowledge Discovery and Data Mining, pp. 57–66 (2001)

    Google Scholar 

  5. Huang, J., Cheng, X., Shen, H., Zhou, T., Jin, X.: Exploring social influence via posterior effect of word-of-mouth recommendations. In: Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, pp. 573–582 (2012)

    Google Scholar 

  6. Li, N., Gillet, D.: Identifying influential scholars in academic social media platforms. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 608–614 (2013)

    Google Scholar 

  7. Sathanur, A.V., Jandhyala, V.: An activity-based information-theoretic annotation of social graphs. In: Proceedings of the 2014 ACM Conference on Web Science, Bloomington, USA, pp. 187–191 (2014)

    Google Scholar 

  8. Wang, Z., Shinkuma, R., Takahashi, T.: Dynamic social influence modeling from perspective of gray-scale mixing process. In: Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking, pp. 1–6 (2015)

    Google Scholar 

  9. Ye, M., Liu, X., Lee, W.-C.: Exploring social influence for recommendation: a generative model approach. In: Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 671–680 (2012)

    Google Scholar 

  10. Dietz, L., Bickel, S., Scheffer, T.: Unsupervised prediction of citation influences. In: Proceedings of the 24th International Conference on Machine Learning (ICML 2007) (2007)

    Google Scholar 

  11. Ding, Z., Jia, Y., Zhou, B., Han, Y.: Mining topical influencers based on the multi-relational network in micro-blogging sites. China Commun. 10(1), 93–104 (2013)

    Article  Google Scholar 

  12. Sang, J., Xu, C.: Social influence analysis and application on multimedia sharing websites. ACM Trans. Multimedia Comput. Commun. Appl. 9(1s), 1–24 (2013)

    Article  MathSciNet  Google Scholar 

  13. Tang, J., Wu, S., Sun, J.: Confluence: conformity influence in large social networks. In: Proceeding of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2013), pp. 347–355 (2013)

    Google Scholar 

  14. Cui, P., Wang, F., Liu, S., Ou, M., Yang, S., Sun, L.: Who should share what?: Item-level social influence prediction for users and postsranking. In: Proceedings of the 34th International ACM Conference on Research and Development in Information Retrieval (SIGIR 2011), pp. 185–194 (2011)

    Google Scholar 

  15. Herzig, J., Mass, Y., Roitman, H.: An author-reader influence model for detecting topic-based influencers in social media. In: Proceedings of the 25th ACM Conference on Hypertext and Social Media (HT 2014), pp. 46–55 (2014)

    Google Scholar 

  16. Peng, S., Wang, G., Yu, S.: Mining mechanism of top-k influential nodes based on voting algorithm in mobile social networks. In: Proceedings of the 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2013), pp. 2194–2199 (2013)

    Google Scholar 

  17. Aral, S., Walker, D.: Identifying influential and susceptible members of social networks. Science 337(6092), 337–341 (2012)

    Article  MathSciNet  Google Scholar 

  18. Su, C., Du, Y., Guan, X., Wu, C.: Maximizing topic propagation driven by multiple user nodes in micro-blogging. In: Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, pp. 751–754 (2013)

    Google Scholar 

  19. Li, X., Liu, Y., Jiang, Y., Liu, X.: Identifying social influence in complex networks: a novel conductance eigenvector centrality model. Neurocomputing 210, 141–154 (2016)

    Article  Google Scholar 

  20. Phan, N., Ebrahimi, J., Kil, D., Piniewski, B., Dou, D.: Topic-aware physical activity propagation in a health social network. IEEE Intell. Syst. 31, 5–14 (2016)

    Article  Google Scholar 

  21. Peng, S., Yu, S., Yang, A.: Smartphone malware and its propagation modeling: a survey. IEEE Commun. Surv. Tutorials 16(2), 925–941 (2014)

    Article  Google Scholar 

  22. Yu, S., Gu, G., Barnawi, A., Guo, S., Stojmenovic, I.: Malware propagation in large-scale networks. IEEE Trans. Knowl. Data Eng. 27(1), 170–179 (2015)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China under Grant Nos. 61379041 and 61572145.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Shengyi Jiang or Pengfei Yin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Peng, S., Jiang, S., Yin, P. (2016). Modeling and Propagation Analysis on Social Influence Using Social Big Data. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49148-6_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49147-9

  • Online ISBN: 978-3-319-49148-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics