Abstract
The past few years have witnessed the rapid growth of online social networks, which have become important hubs of social activity and conduits of information. Identifying social influence in these newly emerging platforms can provide us with significant insights to better understand the interaction behaviors among online users. However, it is difficult for us to measure the influence quantitatively among user peers, since many key factors such as homophily and heterogeneity, can not be observed in our real world conveniently. More recent work mainly focuses on developing theoretical models based on explicit causal knowledge. Nevertheless, such knowledge is usually not available and often needs to be discovered. In this paper, we introduce a model free approach to formulate causal inferences of behaviors among user peers. Experimental results show that influence measured by our approach could successfully reconstruct the underlying networks structure. Furthermore, two additional case studies based on this approach reveal that influentials wield power through specific venues, which constitute a comparatively small portion of the whole channels.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Romero, D.M., Galuba, W., Asur, S., Huberman, B.A.: Influence and passivity in social media. In: Gunopulos, D., Hofmann, T., Malerba, D., Vazirgiannis, M. (eds.) ECML PKDD 2011, Part III. LNCS, vol. 6913, pp. 18–33. Springer, Heidelberg (2011)
Zheng, X., Li, H., Sun, A.: Exploring social dynamics in online bookmarking systems. In: Yang, C.C., et al. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 390–391. Springer, Heidelberg (2008)
Granovetter, M.: Threshold models of collective behavior. American Journal of Sociology, 1420–1443 (1978)
Watts, D.J., Strogatz, S.H.: Collective dynamics of ‘small-world’ networks. Nature 393, 440–442 (1998)
Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137–146. ACM (2003)
Gruhl, D., Guha, R., Liben-Nowell, D., Tomkins, A.: Information diffusion through blogspace. In: Proceedings of the 13th International Conference on World Wide Web, pp. 491–501. ACM (2004)
Leskovec, J., Adamic, L.A., Huberman, B.A.: The dynamics of viral marketing. ACM Transactions on the Web (TWEB) 1, 5 (2007)
Adamic, L., Adar, E.: How to search a social network. Social Networks 27, 187–203 (2005)
Glass, K., Colbaugh, R.: Web analytics for security informatics. In: 2011 European Intelligence and Security Informatics Conference (EISIC), pp. 214–219. IEEE (2011)
Ghosh, R., Lerman, K.: Predicting influential users in online social networks. arXiv preprint arXiv:1005.4882 (2010)
Aral, S., Muchnik, L., Sundararajan, A.: Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences 106, 21544–21549 (2009)
Van den Bulte, C., Lilien, G.L.: Medical Innovation Revisited: Social Contagion versus Marketing Effort1. American Journal of Sociology 106, 1409–1435 (2001)
Godes, D., Mayzlin, D.: Using online conversations to study word-of-mouth communication. Marketing Science 23, 545–560 (2004)
Bemmaor, A.C.: Modeling the diffusion of new durable goods: Word-of-mouth effect versus consumer heterogeneity. In: Research Traditions in Marketing, pp. 201–229. Springer (1994)
Manski, C.F.: Identification of endogenous social effects: The reflection problem. The Review of Economic Studies 60, 531–542 (1993)
Cha, M., Haddadi, H., Benevenuto, F., Gummadi, K.P.: Measuring user influence in twitter: The million follower fallacy. In: 4th International AAAI Conference on Weblogs and Social Media (ICWSM), vol. 14, p. 8 (2010)
Wu, S., Hofman, J.M., Mason, W.A., Watts, D.J.: Who says what to whom on twitter. In: Proceedings of the 20th International Conference on World Wide Web, pp. 705–714. ACM (2011)
Bakshy, E., Hofman, J.M., Mason, W.A., Watts, D.J.: Everyone’s an influencer: quantifying influence on twitter. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, pp. 65–74. ACM (2011)
Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a social network or a news media? In: Proceedings of the 19th International Conference on World Wide Web, pp. 591–600. ACM (2010)
Bailey, N.T.: The mathematical theory of infectious diseases and its applications. Charles Griffin & Company Ltd, 5a Crendon Street, High Wycombe, Bucks HP13 6LE (1975)
Anderson, R.M., May, R.M., Anderson, B.: Infectious diseases of humans: dynamics and control. Wiley Online Library (1992)
Granger, C.W.: Investigating causal relations by econometric models and cross-spectral methods. Econometrica: Journal of the Econometric Society, 424–438 (1969)
Saito, Y., Harashima, H.: Tracking of Information within Multichannel {EEG} record Causal analysis in {EEG}. In: Yamaguchi, N., Fujisawa, K. (eds.) Recent Advances in {EEG} and {EMG} Data Processing, pp. 133–146. Elsevier (1981)
Kamitake, T., Harashima, H., Miyakawa, H.: A time-series analysis method based on the directed transformation. Electronics and Communications in Japan 67, 1–9 (1984)
Varn, D.P., Crutchfield, J.P.: From finite to infinite range order via annealing: The causal architecture of deformation faulting in annealed close-packed crystals. Physics Letters A 324, 299–307 (2004)
Klyubin, A.S., Polani, D., Nehaniv, C.L.: All else being equal be empowered. In: Capcarrère, M.S., Freitas, A.A., Bentley, P.J., Johnson, C.G., Timmis, J. (eds.) ECAL 2005. LNCS (LNAI), vol. 3630, pp. 744–753. Springer, Heidelberg (2005)
Lungarella, M., Sporns, O.: Mapping information flow in sensorimotor networks. PLoS Computational Biology 2, e144 (2006)
Ver Steeg, G., Galstyan, A.: Information transfer in social media. In: Proceedings of the 21st International Conference on World Wide Web, pp. 509–518. ACM (2012)
Barnett, L., Barrett, A.B., Seth, A.K.: Granger causality and transfer entropy are equivalent for Gaussian variables. Physical Review Letters 103, 238701 (2009)
Pillai, S.U.: Probability, Random Variables, and Stochastic Processes. Tata McGraw-Hill Education (2002)
Paluš, M., Komárek, V., Hrnčíř, Z., Štěrbová, K.: Synchronization as adjustment of information rates: detection from bivariate time series. Physical Review E 63, 046211 (2001)
Hlaváčková-Schindler, K., Paluš, M., Vejmelka, M., Bhattacharya, J.: Causality detection based on information-theoretic approaches in time series analysis. Physics Reports 441, 1–46 (2007)
Zheng, X., Zhong, Y., Zeng, D., Wang, F.-Y.: Social influence and spread dynamics in social networks. Frontiers of Computer Science 6(5), 611–620
Ohara, K., Saito, K., Kimura, M., Motoda, H.: Effect of in/out-degree correlation on influence degree of two contrasting information diffusion models. In: Yang, S.J., Greenberg, A.M., Endsley, M. (eds.) SBP 2012. LNCS, vol. 7227, pp. 131–138. Springer, Heidelberg (2012)
Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: bringing order to the web (1999)
Jeh, G., Widom, J.: Scaling personalized web search. In: Proceedings of the 12th International Conference on World Wide Web, pp. 271–279. ACM (2003)
Wu, B., Davison, B.D.: Identifying link farm spam pages. Special Interest Tracks and Posters of the 14th International Conference on World Wide Web, pp. 820–829 (2005)
Gyöngyi, Z., Garcia-Molina, H.: Link spam alliances. In: Proceedings of the 31st International Conference on Very Large Data Bases, pp. 517–528. VLDB Endowment (2005)
Castillo, C., Donato, D., Gionis, A., Murdock, V., Silvestri, F.: Know your neighbors: Web spam detection using the web topology. In: Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 423–430. ACM (2007)
Bass, F.M.: A New Product Growth for Model Consumer Durables. Management Science 15, 215–227 (1969)
Schreiber, T.: Measuring information transfer. Physical Review Letters 85, 461–464 (2000)
Friston, K.J., Harrison, L., Penny, W.: Dynamic causal modelling. Neuroimage 19, 1273–1302 (2003)
Vicente, R., Wibral, M., Lindner, M., Pipa, G.: Transfer entropy—a model-free measure of effective connectivity for the neurosciences. Journal of Computational Neuroscience 30, 45–67 (2011)
Barabasi, A.-L.: The origin of bursts and heavy tails in human dynamics. Nature 435, 207–211 (2005)
Kraskov, A., Stögbauer, H., Grassberger, P.: Estimating mutual information. Physical Review E 69, 066138 (2004)
Victor, J.D.: Approaches to information-theoretic analysis of neural activity. Biological Theory 1, 302–316 (2006)
Hildebrand, F.B.: Introduction to numerical analysis. Dover Publications (1987)
Hopcroft, J., Lou, T., Tang, J.: Who will follow you back?: reciprocal relationship prediction. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pp. 1137–1146. ACM (2011)
Leavitt, A., Burchard, E., Fisher, D., Gilbert, S.: The influentials: New approaches for analyzing influence on twitter. Web Ecology Project 29 (2009), http://tinyurl.com/lzjlzq
Katz, E.: The two-step flow of communication: An up-to-date report on an hypothesis. Public Opinion Quarterly 21, 61–78 (1957)
Valente, T.W.: Network models of the diffusion of innovations. Computational & Mathematical Organization Theory 2, 163–164 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
He, S., Zheng, X., Zeng, D., Cui, K., Zhang, Z., Luo, C. (2013). Identifying Peer Influence in Online Social Networks Using Transfer Entropy. In: Wang, G.A., Zheng, X., Chau, M., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2013. Lecture Notes in Computer Science, vol 8039. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39693-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-39693-9_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39692-2
Online ISBN: 978-3-642-39693-9
eBook Packages: Computer ScienceComputer Science (R0)