Skip to main content

On Modelling Social Propagation Phenomenon

  • Conference paper
Intelligent Information and Database Systems (ACIIDS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 8398))

Included in the following conference series:

Abstract

Propagation phenomenon is an important problem that has been studied within varied research fields and application domains, leading to the development of propagation based models and techniques in social informatics. These models are briefly surveyed in this paper. This paper discusses common features and two selected scenarios of propagation mechanisms that frequently occur in social networks. In summary, a list of the most recent open issues on social propagation is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fu, X., Wang, C., Wang, Z., Ming, Z.: Threshold random walkers for community structure detection in complex networks. Journal of Software 8(2) (2013)

    Google Scholar 

  2. Barbieri, N., Bonchi, F., Manco, G.: Cascade-based community detection. In: Proceedings of the 6th International Conference on Web Search and Data Mining, WSDM 2013, pp. 33–42. ACM, New York (2013)

    Google Scholar 

  3. Kim, H., Tang, J., Anderson, R., Mascolo, C.: Centrality prediction in dynamic human contact networks. Comput. Netw. 56(3), 983–996 (2012)

    Article  Google Scholar 

  4. Doerr, B., Fouz, M., Friedrich, T.: Why rumors spread so quickly in social networks. Commun. ACM 55(6), 70–75 (2012)

    Article  Google Scholar 

  5. Zhao, L., Guan, X., Yuan, R.: Modeling collective blogging dynamics of popular incidental topics. Knowledge and Information Systems 31(2), 371–387 (2012)

    Article  Google Scholar 

  6. Garg, P., King, I., Lyu, M.R.: Information propagation in social rating networks. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, CIKM 2012, pp. 2279–2282. ACM, New York (2012)

    Google Scholar 

  7. Chen, Y.C., Peng, W.C., Lee, S.Y.: Efficient algorithms for influence maximization in social networks. Knowledge and Information Systems 33(3), 577–601 (2012)

    Article  Google Scholar 

  8. Gao, C., Liu, J., Zhong, N.: Network immunization and virus propagation in email networks: experimental evaluation and analysis. Knowledge and Information Systems 27(2), 253–279 (2011)

    Article  MathSciNet  Google Scholar 

  9. Liu, D., Chen, X.: Rumor propagation in online social networks like twitter – a simulation study. In: 2011 Third International Conference on Multimedia Information Networking and Security (MINES), pp. 278–282 (2011)

    Google Scholar 

  10. Nguyen, N.P., Yan, G., Thai, M.T., Eidenbenz, S.: Containment of misinformation spread in online social networks. In: Proceedings of the 3rd Annual ACM Web Science Conference, WebSci 2012, pp. 213–222. ACM, New York (2012)

    Google Scholar 

  11. Piraveenan, M., Uddin, S., Chung, K.: Measuring topological robustness of networks under sustained targeted attacks. In: IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 38–45 (2012)

    Google Scholar 

  12. Bonchi, F.: Influence propagation in social networks: A data mining perspective. IEEE Intelligent Informatics Bulletin 12(1), 8–16 (2011)

    Google Scholar 

  13. Sun, J., Tang, J.: A survey of models and algorithms for social influence analysis. In: Aggarwal, C.C. (ed.) Social Network Data Analytics, pp. 177–214. Springer US (2011)

    Google Scholar 

  14. Leskovec, J., Kleinberg, J., Faloutsos, C.: Graphs over time: densification laws, shrinking diameters and possible explanations. In: Proceedings of the 11th Int. Conf. on Knowledge Discovery and Data Mining, KDD 2005, pp. 177–187. ACM (2005)

    Google Scholar 

  15. Fay, D., Haddadi, H., Thomason, A., Moore, A.W., Mortier, R., Jamakovic, A., Uhlig, S., Rio, M.: Weighted spectral distribution for internet topology analysis: theory and applications. IEEE/ACM Trans. Netw. 18(1), 164–176 (2010)

    Article  Google Scholar 

  16. Buldyrev, S.V., Parshani, R., Paul, G., Stanley, H.E., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464(7291), 1025–1028 (2010)

    Article  Google Scholar 

  17. Granovetter, M.: Threshold models of collective behavior. American Journal of Sociology 83(6), 1420–1443 (1978)

    Article  Google Scholar 

  18. Doerr, B., Fouz, M., Friedrich, T.: Social networks spread rumors in sublogarithmic time. In: Proceedings of the 43rd Annual ACM Symposium on Theory of Computing, STOC 2011, pp. 21–30. ACM, New York (2011)

    Google Scholar 

  19. Castellano, C., Fortunato, S., Loreto, V.: Statistical physics of social dynamics. Rev. Mod. Phys. 81, 591–646 (2009)

    Article  Google Scholar 

  20. Shah, D., Zaman, T.: Detecting sources of computer viruses in networks: theory and experiment. SIGMETRICS Perform. Eval. Rev. 38(1), 203–214 (2010)

    Article  Google Scholar 

  21. Borge-Holthoefer, J., Banos, R.A., Gonzalez-Bailon, S., Moreno, Y.: Cascading behaviour in complex socio-technical networks. Journal of Complex Networks 1(1), 3–24 (2013)

    Article  Google Scholar 

  22. Weng, L., Ratkiewicz, J., Perra, N., Goncalves, B., Castillo, C., Bonchi, F., Schifanella, R., Menczer, F., Flammini, A.: The role of information diffusion in the evolution of social networks. In: Proceedings of the 19th International Conference on Knowledge Discovery and Data Mining, KDD 2013. ACM (2013)

    Google Scholar 

  23. Dodds, P.S., Watts, D.J.: A generalized model of social and biological contagion. Journal of Theoretical Biology 232(4), 587–604 (2005)

    Article  MathSciNet  Google Scholar 

  24. Jacquez, J.A., O’Neill, P.: Reproduction numbers and thresholds in stochastic epidemic models. Math. Biosciences 107(2), 161–186 (1991)

    Article  MATH  Google Scholar 

  25. Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Proceedings of the 9th International Conference on Knowledge Discovery and Data Mining, KDD 2003, pp. 137–146. ACM (2003)

    Google Scholar 

  26. Rodriguez, M.A., Neubauer, P.: A path algebra for multi-relational graphs. In: Proceedings of the 27th International Conference on Data Engineering Workshops, ICDEW 2011, pp. 128–131. IEEE Computer Society, Washington, DC (2011)

    Google Scholar 

  27. Hang, C.W., Wang, Y., Singh, M.P.: Operators for propagating trust and their evaluation in social networks. In: Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2009, pp. 1025–1032 (2009)

    Google Scholar 

  28. Goyal, A., Bonchi, F., Lakshmanan, L.V.: Learning influence probabilities in social networks. In: Proceedings of the 3rd ACM International Conference on Web Search and Data Mining, WSDM 2010, pp. 241–250. ACM, New York (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Król, D. (2014). On Modelling Social Propagation Phenomenon. In: Nguyen, N.T., Attachoo, B., Trawiński, B., Somboonviwat, K. (eds) Intelligent Information and Database Systems. ACIIDS 2014. Lecture Notes in Computer Science(), vol 8398. Springer, Cham. https://doi.org/10.1007/978-3-319-05458-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05458-2_24

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05457-5

  • Online ISBN: 978-3-319-05458-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics