skip to main content
10.1145/3548785.3548807acmotherconferencesArticle/Chapter ViewAbstractPublication PagesideasConference Proceedingsconference-collections
research-article

Identification of Weak Signals in a Temporal Graph of Social Interactions

Published:13 September 2022Publication History

ABSTRACT

Social networks are becoming increasingly a source of wealth for people to connect with others in the society and express themselves. These networks store huge amounts of data related to individual and collective behavior, and relationships. Despite their importance, there exists few research that explains the factors leading to the evolution of these relationships, as well as abrupt changes in the behavior of individuals in contact. This paper proposes an approach based on the topology of social networks to detect early warnings of such changes, called weak signals. Our approach is in contrast to existing works that focus on analyzing major themes and trends, i.e. strong signals, prevalent in a social network at a particular point in time. We rely on a temporal interaction graph, and extract patterns that characterize weak signals. We demonstrate our approach and validate the detected signals through the analysis of social interactions between individuals of a captive Guinea baboons group, and confirm the existence of weak signals prior to the occurrence of an aggressive behavior.

References

  1. Jamey L Ackley, Tejas G Puranik, and Dimitri Mavris. 2020. A supervised learning approach for safety event precursor identification in commercial aviation. In AIAA Aviation 2020 Forum. AIAA, Virtual, 2880.Google ScholarGoogle Scholar
  2. Jeanne Altmann. 1974. Observational study of behavior: sampling methods. Behaviour 49, 3-4 (1974), 227–266.Google ScholarGoogle ScholarCross RefCross Ref
  3. Harry Igor Ansoff. 1975. Managing surprise and discontinuity: strategic response to weak signals. European Institute for Advanced Studies in Management, California.Google ScholarGoogle Scholar
  4. H Igor Ansoff and Edward J McDonnell. 1990. Implanting strategic management.Google ScholarGoogle Scholar
  5. Vincent Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. 2008. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment 2008, 10(2008), P10008.Google ScholarGoogle Scholar
  6. Brian Coffman. 1997. Weak signal research, part I: Introduction. Journal of Transition Management 2, 1 (1997), 4.Google ScholarGoogle Scholar
  7. Toby Davies and Elio Marchione. 2015. Event networks and the identification of crime pattern motifs. PloS one 10, 11 (2015), e0143638.Google ScholarGoogle ScholarCross RefCross Ref
  8. Valeria Gelardi, Jeanne Godard, Dany Paleressompoulle, Nicolas Claidière, and Alain Barrat. 2020. Measuring social networks in primates: wearable sensors versus direct observations. Proceedings of the Royal Society A 476, 2236 (2020), 20190737.Google ScholarGoogle ScholarCross RefCross Ref
  9. Michel Godet. 1994. From anticipation to action: a handbook of strategic prospective. UNESCO publishing, Michigan.Google ScholarGoogle Scholar
  10. Khim-Yong Goh, Cheng-Suang Heng, and Zhijie Lin. 2013. Social media brand community and consumer behavior: Quantifying the relative impact of user-and marketer-generated content. Information systems research 24, 1 (2013), 88–107.Google ScholarGoogle Scholar
  11. Dina Q Goldin and Paris C Kanellakis. 1995. On similarity queries for time-series data: constraint specification and implementation. In International Conference on Principles and Practice of Constraint Programming. Springer, Berlin, Heidelberg, 137–153.Google ScholarGoogle ScholarCross RefCross Ref
  12. Elina Hiltunen. 2008. The future sign and its three dimensions. Futures 40, 3 (2008), 247–260.Google ScholarGoogle Scholar
  13. Tomaž Hočevar and Janez Demšar. 2014. A combinatorial approach to graphlet counting. Bioinformatics 30, 4 (12 2014), 559–565. https://doi.org/10.1093/bioinformatics/btt717 arXiv:https://academic.oup.com/bioinformatics/article-pdf/30/4/559/17345305/btt717.pdfGoogle ScholarGoogle Scholar
  14. Jiajia Huang, Min Peng, Hua Wang, Jinli Cao, Wang Gao, and Xiuzhen Zhang. 2017. A probabilistic method for emerging topic tracking in Microblog stream. World Wide Web 20 (03 2017). https://doi.org/10.1007/s11280-016-0390-4Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Hiba Abou Jamra, Marinette Savonnet, and Éric Leclercq. 2021. Detection of Event Precursors in Social Networks: A Graphlet-Based Method. In Research Challenges in Information Science - 15th International Conference, RCIS 2021, May 11-14, 2021, Proceedings(Lecture Notes in Business Information Processing, Vol. 415), Samira Si-Said Cherfi, Anna Perini, and Selmin Nurcan (Eds.). Springer, Limassol, Cyprus, 205–220. https://doi.org/10.1007/978-3-030-75018-3_13Google ScholarGoogle Scholar
  16. Hiba Abou Jamra, Marinette Savonnet, and Éric Leclercq. 2022. BEAM: A Network Topology Framework to Detect Weak Signals. International Journal of Advanced Computer Science and Applications 13, 4(2022), 12.Google ScholarGoogle ScholarCross RefCross Ref
  17. Hyunuk Kim, Sang-Jin Ahn, and Woo-Sung Jung. 2019. Horizon scanning in policy research database with a probabilistic topic model. Technological Forecasting and Social Change 146 (2019), 588–594.Google ScholarGoogle ScholarCross RefCross Ref
  18. Hayoung Kim, Yoonsun Han, Juyoung Song, and Tae Min Song. 2019. Application of social big data to identify trends of school bullying forms in South Korea. International journal of environmental research and public health 16, 14(2019), 2596.Google ScholarGoogle Scholar
  19. Lee-Nam Kwon, Jun-Hwan Park, Yeong-Ho Moon, Bangrae Lee, YoungHo Shin, and Young-Kuk Kim. 2018. Weak signal detecting of industry convergence using information of products and services of global listed companies-focusing on growth engine industry in South Korea. Journal of Open Innovation: Technology, Market, and Complexity 4, 1(2018), 10.Google ScholarGoogle ScholarCross RefCross Ref
  20. Xueming Luo, Jie Zhang, and Wenjing Duan. 2013. Social media and firm equity value. Information Systems Research 24, 1 (2013), 146–163.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Julien Maitre, Michel Ménard, Guillaume Chiron, Alain Bouju, and Nicolas Sidère. 2019. A Meaningful Information Extraction System for Interactive Analysis of Documents. In International Conference on Document Analysis and Recognition (ICDAR). IEEE, Sydney, Australia, 92–99. https://doi.org/10.1109/ICDAR.2019.00024Google ScholarGoogle ScholarCross RefCross Ref
  22. Benjamin A Miller, Michelle S Beard, and Nadya T Bliss. 2011. Eigenspace analysis for threat detection in social networks. In 14th International Conference on Information Fusion. IEEE, USA, 1–7.Google ScholarGoogle Scholar
  23. Yue Ning, Sathappan Muthiah, Huzefa Rangwala, and Naren Ramakrishnan. 2016. Modeling Precursors for Event Forecasting via Nested Multi-Instance Learning. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining (San Francisco, California, USA) (KDD ’16). Association for Computing Machinery, New York, NY, USA, 1095–1104. https://doi.org/10.1145/2939672.2939802Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Fernando Perez and Brian E Granger. 2015. Project Jupyter: Computational narratives as the engine of collaborative data science. Retrieved September 11, 207 (2015), 108.Google ScholarGoogle Scholar
  25. Nataša Pržulj. 2007. Biological network comparison using graphlet degree distribution. Bioinformatics 23, 2 (2007), e177–e183.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Natasa Pržulj, Derek G Corneil, and Igor Jurisica. 2004. Modeling interactome: scale-free or geometric?Bioinformatics 20, 18 (2004), 3508–3515.Google ScholarGoogle Scholar
  27. Pedro Ribeiro, Pedro Paredes, Miguel EP Silva, David Aparicio, and Fernando Silva. 2019. A survey on subgraph counting: concepts, algorithms and applications to network motifs and graphlets. arXiv preprint arXiv:1910.13011 54, 2 (2019), pp. 1–36.Google ScholarGoogle Scholar
  28. Pauline Rousseau, Daniel Camara, and Dimitris Kotzinos. 2021. Weak signal detection and identification in large data sets: a review of methods and applications.Google ScholarGoogle Scholar
  29. Barbara L. van Veen, J. Roland Ortt, and P.G. Badke-Schaub. 2019. Compensating for perceptual filters in weak signal assessments. Futures 108(2019), 1–11. https://doi.org/10.1016/j.futures.2019.02.018Google ScholarGoogle ScholarCross RefCross Ref
  30. Janghyeok Yoon. 2012. Detecting weak signals for long-term business opportunities using text mining of Web news. Expert Systems with Applications 39, 16 (2012), 12543–12550.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Fattane Zarrinkalam and Ebrahim Bagheri. 2017. Event identification in social networks. Encyclopedia with Semantic Computing and Robotic Intelligence 1, 01(2017), 1630002.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Identification of Weak Signals in a Temporal Graph of Social Interactions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        IDEAS '22: Proceedings of the 26th International Database Engineered Applications Symposium
        August 2022
        174 pages
        ISBN:9781450397094
        DOI:10.1145/3548785

        Copyright © 2022 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 September 2022

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate74of210submissions,35%
      • Article Metrics

        • Downloads (Last 12 months)20
        • Downloads (Last 6 weeks)5

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format