skip to main content
10.1145/2557977.2557996acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

Don't count the number of friends when you are spreading information in social networks

Published:09 January 2014Publication History

ABSTRACT

The problem of spreading information in social networks is a topic of considerable recent interest, but the conventional influence maximisation problem which selects a set of any arbitrary k nodes in a network as the initially activated nodes might be inadequate in a real-world social network -- cyber-stalkers try to initially spread a rumour through their neighbours only rather than arbitrary users selected from the entire network. To consider this more practical scenario, Kim and Eiko [16] introduced the optimisation problem to find influential neighbours to maximise information diffusion. We extend this model by introducing several important parameters such as user propagation rate on his (or her) neighbours to provide a more general and practical information diffusion model. We performed intensive simulations on several real-world network topologies (emails, blogs, Twitter and Facebook) to develop more effective information spreading schemes under this model. Unlike the results of previous research, our experimental results shows that information can be efficiently propagated in social networks using the propagation rate alone, even without consideration of the "number of friends" information. Moreover, we found that the naive random spreading would be used to efficiently spread information if k increases sufficiently (e.g. k = 4).

References

  1. L. A. Adamic and N. Glance. The political blogosphere and the 2004 u.s. election: divided they blog. In Proceedings of the 3rd international workshop on Link discovery, LinkKDD '05, pages 36--43, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Anagnostopoulos, R. Kumar, and M. Mahdian. Influence and correlation in social networks. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '08, pages 7--15, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Cha, H. Haddadi, F. Benevenuto, and K. Gummadi. Measuring user influence in twitter: The million follower fallacy. 2010.Google ScholarGoogle Scholar
  4. W. Chen, C. Wang, and Y. Wang. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '10, pages 1029--1038, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pages 199--208, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. M. Daly and M. Haahr. Social network analysis for routing in disconnected delay-tolerant MANETs. In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, MobiHoc '07, pages 32--40, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Domingos and M. Richardson. Mining the network value of customers. In Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '01, pages 57--66, New York, NY, USA, 2001. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Goldenberg, B. Libai, and E. Muller. Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth. Marketing Letters, pages 211--223, 2001.Google ScholarGoogle Scholar
  9. A. Goyal, F. Bonchi, and L. V. Lakshmanan. Learning influence probabilities in social networks. In Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, pages 241--250, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Gruhl, R. Guha, D. Liben-Nowell, and A. Tomkins. Information diffusion through blogspace. In Proceedings of the 13th international conference on World Wide Web, pages 491--501, New York, NY, USA, 2004. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Guimerà, L. Danon, D. A. Guilera, F. Giralt, and A. Arenas. Self-similar community structure in a network of human interactions. Physical Review E, 68(6), 2003.Google ScholarGoogle ScholarCross RefCross Ref
  12. L. K. Hansen, A. Arvidsson, F. A. Nielsen, E. Colleoni, and M. Etter. Good friends, bad news - affect and virality in twitter. In Future Information Technology, volume 185 of Communications in Computer and Information Science, pages 34--43. Springer Berlin Heidelberg, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  13. P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, and C. Diot. Pocket switched networks and human mobility in conference environments. In Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, WDTN '05, pages 244--251, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. P. Hui, J. Crowcroft, and E. Yoneki. Bubble rap: social-based forwarding in delay tolerant networks. In Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, MobiHoc '08, pages 241--250, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 137--146, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. H. Kim and E. Yoneki. Influential neighbours selection for information diffusion in online social networks. In IEEE ICCCN 2012, Munich, Germany, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  17. M. Kimura and K. Saito. Tractable models for information diffusion in social networks. In Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases, PKDD'06, pages 259--271, Berlin, Heidelberg, 2006. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '07, pages 420--429, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. F. J. Massey. The Kolmogorov-Smirnov test for goodness of fit. Journal of the American Statistical Association, 46(253):68--78, 1951.Google ScholarGoogle ScholarCross RefCross Ref
  20. P. Metaxas, E. Mustafaraj, and D. Gayo-Avello. How (not) to predict elections. In Proceedings of the 3rd international conference on Privacy, Security, Risk and Trust (PASSAT) and the 3rd international conference on Social Computing (SocialCom), pages 165--171, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  21. H. Per and H. Frank. Eccentricity and Centrality in Networks. Social Networks, 17(1):57--63, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  22. D. M. Romero, W. Galuba, S. Asur, and B. A. Huberman. Influence and passivity in social media. In Proceedings of the 20th international conference on World wide web, WWW '11, pages 113--114, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. K. Saito, M. Kimura, K. Ohara, and H. Motoda. Selecting information diffusion models over social networks for behavioral analysis. In Proceedings of the 2010 European conference on Machine learning and knowledge discovery in databases: Part III, ECML PKDD'10, pages 180--195, Berlin, Heidelberg, 2010. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Tang, J. Sun, C. Wang, and Z. Yang. Social influence analysis in large-scale networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pages 807--816, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Y. Wang, G. Cong, G. Song, and K. Xie. Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '10, pages 1039--1048, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. K. Wehmuth and A. Ziviani. Daccer: Distributed assessment of the closeness {CEntrality} ranking in complex networks. Computer Networks, 57(13):2536--2548, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Z. Zhou, R. Bandari, J. Kong, H. Qian, and V. Roychowdhury. Information resonance on twitter: watching iran. In Proceedings of the First Workshop on Social Media Analytics, SOMA '10, pages 123--131, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Don't count the number of friends when you are spreading information in social networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ICUIMC '14: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
          January 2014
          757 pages
          ISBN:9781450326445
          DOI:10.1145/2557977

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 9 January 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          ICUIMC '14 Paper Acceptance Rate116of407submissions,29%Overall Acceptance Rate251of941submissions,27%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader