期刊首页 优先出版 当期阅读 过刊浏览 作者中心 关于期刊 English

《工程(英文)》 >> 2018年 第4卷 第1期 doi: 10.1016/j.eng.2018.02.004

社会影响力分析——模型、方法和评价

School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China

收稿日期: 2017-12-10 修回日期: 2018-01-05 录用日期: 2018-01-08 发布日期: 2018-02-16

下一篇 上一篇

摘要

社会影响力分析(SIA)是一个广泛的研究领域,吸引了诸多研究者的兴趣。本文总结了SIA 相关的模型、方法和评价方面代表性的工作,并将SIA 模型归纳为两种类型:微观模型和宏观模型。微观模型考虑人与人之间的相互影响和影响的过程,而宏观模型认为每个人具有相同的传播概率和影响力。本文分析了包括影响最大化、影响最小化、影响流和个人影响力等的社会影响力分析方法;介绍了影响力评价指标,并分析了社会影响力评价模型。本文的目标是对社会影响力提供全面的分析,旨在辅助理解社会行为,为舆论影响提供理论基础,并揭示未来的研究方向和潜在的应用。

参考文献

[ 1 ]   Travers J, Milgram S. The small world problem. Psychol Today 1967;1:61–7. 链接1

[ 2 ]   Chen W, Lakshmanan LV, Castillo C. Information and influence propagation in social networks. San Rafael: Morgan & Claypool; 2013. 链接1

[ 3 ]   Freeman LC. A set of measures of centrality based on betweenness. Sociome- try 1977;40(1):35–41. 链接1

[ 4 ]   Baas F. A new product growth model for consumer durables. Manage Sci 1969;15(5):215–27. 链接1

[ 5 ]   Brown JJ, Reingen PH. Social ties and word-of-mouth referral behavior. J Con- sum Res 1987;14(3):350–62. 链接1

[ 6 ]   Mahajan V, Muller E, Bass FM. New product diffusion models in marketing: A review and directions for research. J Mark 1990;54(1):1–26.

[ 7 ]   Domingos P, Richardson M. Mining the network value of customers. In: Pro- ceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2001 Aug 26–29; San Francisco, CA, USA; 2001. p. 57–66. 链接1

[ 8 ]   Goldenberg J, Libai B, Muller E. Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark Lett 2001;12(3):211–23. 链接1

[ 9 ] Richardson M, Domingos P. Mining knowledge-sharing sites for viral mar- keting. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2002 Jul 23–26; Edmonton, AB, Can- ada; 2002. p. 61–70. 链接1

[10] Leskovec J, Adamic LA, Huberman BA. The dynamics of viral marketing. J ACM Trans Web 2007;1(1):5. 链接1

[11] Pálovics R, Benczúr AA, Kocsis L, Kiss T, Frigó E. Exploiting temporal influence in online recommendation. In: Proceedings of the 8th ACM Conference on Recommender Systems; 2014 Oct 6–10; Foster City, CA, USA; 2014. p. 273–80. 链接1

[12]   Wang G, Jiang W, Wu J, Xiong Z. Fine-grained feature-based social influence evaluation in online social networks. IEEE Trans Parallel Distrib Syst 2014;25 (9):2286–96.

[13] Christakis NA, Fowler JH. The spread of obesity in a large social network over 32 years. N Engl J Med 2007;357(4):370–9. 链接1

[14] Fowler JH, Christakis NA. Dynamic spread of happiness in a large social net- work: longitudinal analysis over 20 years in the Framingham Heart Study. Br Med J 2009;338(7685):23–7.

[15]   Franks H, Griffiths N, Anand SS. Learning influence in complex social net- works. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems; 2013 May 6–10; Saint Paul, MN, USA; 2013. p. 447–54.

[16]   Dong W, Pentland A. Modeling influence between experts. In: Proceedings of the ICMI 2006 and IJCAI 2007 International Conference on Artificial In- telligence for Human Computing; 2006 Nov 3; Banff, AB, Canada; 2007. p. 170–89. 链接1

[17]   Tang J, Sun J, Wang C, Yang Z. Social influence analysis in large-scale net- works. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2009 Jun 28–Jul 1; Paris, France; 2009. p. 807–16. 链接1

[18]   He Z, Cai Z, Wang X. Modeling propagation dynamics and developing opti- mized countermeasures for rumor spreading in online social networks. In: Proceedings of the 2005 IEEE 35th International Conference on Distributed Computing Systems; 2015 Jun 29–Jul 2; Columbus, OH, USA; 2015. p. 205–14. 链接1

[19]   Katz E, Lazarsfeld PF. Personal influence: The part played by people in the flow of mass communications. New York: Free Press; 1965. 链接1

[20]   Rogers EM. Diffusion of innovations. 5th ed. New York: Free Press; 2003. 链接1

[21]   Keller E, Berry J. The influentials: one American in ten tells the other nine how to vote, where to eat, and what to buy. New York: Free Press; 2003. 链接1

[22]   Peng S, Yang A, Cao L, Yu S, Xie D. Social influence modeling using informa- tion theory in mobile social networks. Inf Sci 2017;379:146–59. 链接1

[23] Kempe D, Kleinberg J, Tardos É. Maximizing the spread of influence through a social network. In: Proceedings of the 9th ACM SIGKDD International Confer- ence on Knowledge Discovery and Data Mining; 2003 Aug 24–27; Washing- ton, DC, USA; 2003. p. 137–46. 链接1

[24] Leskovec J, Mcglohon M, Faloutsos C, Glance NS, Hurst M. Patterns of cascad- ing behavior in large blog graphs. In: Proceedings of the 2007 SIAM Interna- tional Conference on Data Mining; 2007 Apr 26–28; Minneapolis, MN, USA; 2007. 链接1

[25]   Gruhl D, Guha R, Liben-Nowell D, Tomkins A. Information diffusion through blogspace. In: Proceedings of the 13th International Conference on World Wide Web; 2004 May 17–20; New York, NY, USA; 2004. p. 491–501.

[26]   Granovetter M. Threshold models of collective behavior. Am J Sociol 1978;83 (6):1420–43. 链接1

[27]   Chen W, Lu W, Zhang N. Time-critical influence maximization in social net- works with time-delayed diffusion process. In: Proceedings of the 26th AAAI Conference on Artificial Intelligence; 2012 Jul 22–26; Toronto, ON, Canada; 2012. p. 592–8. 链接1

[28]   Feng S, Chen X, Cong G, Zeng Y, Chee YM, Xiang Y. Influence maximization with novelty decay in social networks. In: Proceedings of the 28th AAAI Con- ference on Artificial Intelligence; 2014 Jul 27–31; Québec City, QC, Canada; 2014. p. 37–43. 链接1

[29]   Mohamadi-Baghmolaei R, Mozafari N, Hamzeh A. Trust based latency aware influence maximization in social networks. J Eng App Artif Intell 2015;41 (C):195–206. 链接1

[30]   Budak C, Agrawal D, Abbadi AE. Limiting the spread of misinformation in so- cial networks. In: Proceedings of the 20th International Conference on World Wide Web; 2011 Mar 28–Apr 1; Hyderabad, India; 2011. p. 665–74. 链接1

[31] Liu W, Yue K, Wu H, Li J, Liu D, Tang D. Containment of competitive influence spread in social networks. Knowl Base Syst 2016;109(C):266–75. 链接1

[32]   Borodin A, Filmus Y, Oren J. Threshold models for competitive influence in social networks. In: Proceedings of the 6th International Conference on In- ternet and Network Economics; 2010 Dec 13–17; Stanford, CA, USA; 2010. p. 539–50. 链接1

[33]   Mohammadi A, Saraee M, Mirzaei A. Time-sensitive influence maximization in social networks. J Inf Sci 2015;41(6):765–78.

[34] Saito K, Ohara K, Yamagishi Y, Kimura M, Motoda H. Learning diffusion proba- bility based on node attributes in social networks. In: Proceedings of the 19th International Conference on Foundations of Intelligent Systems; 2011 Jun 28–30; Warsaw, Poland; 2011. p. 153–62. 链接1

[35]   Guille A, Hacid H. A predictive model for the temporal dynamics of informa- tion diffusion in online social networks. In: Proceedings of the 21st Interna- tional Conference on World Wide Web; 2012 Apr 16–20; Lyon, France; 2012. p. 1145–52. 链接1

[36]   Bharathi S, Kempe D, Salek M. Competitive influence maximization in social networks. In: Proceedings of the 3rd International Conference on Internet and Network Economics; 2007 Dec 12–14; San Diego, CA, USA; 2007. p. 306–11. 链接1

[37]   Carnes T, Nagarajan C, Wild SM, Zuylen AV. Maximizing influence in a competitive social network: A follower’s perspective. In: Proceedings of the 9th International Conference on Electronic Commerce; 2007 Aug 19–22; Minne- apolis, MN, USA; 2007. p. 351–60. 链接1

[38]   Fan L, Lu Z, Wu W, Thuraisingham B, Ma H, Bi Y. Least cost rumor blocking in social networks. In: Proceedings of the 2013 IEEE 33rd International Con- ference on Distributed Computing Systems; 2013 Jul 8–11; Philadelphia, PA, USA; 2013. p. 540–9. 链接1

[39]   Lee W, Kim J, Yu H. CT-IC: Continuously activated and time-restricted inde- pendent cascade model for viral marketing. In: Proceedings of the 2012 IEEE 12th International Conference on Data Mining; 2012 Dec 10–13; Brussels, Belgium; 2013. p. 960–5. 链接1

[40]   Kostka J, Oswald YA, Wattenhofer R. Word of mouth: Rumor dissemination in social networks. In: Proceedings of the 15th International Colloquium on Structural Information and Communication Complexity; 2008 Jun 17–20; Vil- lars-sur-Ollon, Switzerland; 2008. p. 185–96. 链接1

[41]   Chen W,WangY, Yang S. Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowl- edge Discovery and Data Mining; 2009 Jun 28–Jul 1; Paris, France; 2009. p. 199–208. 链接1

[42]   Wang Y, Wang H, Li J, Gao H. Efficient influence maximization in weighted independent cascade model. In: Proceedings of the 21st International Con- ference on Database Systems for Advanced Applications; 2016 Mar 27– 30; Dallas, TX, USA; 2016. p. 49–64. 链接1

[43]   Pathak N, Banerjee A, Srivastava J. A generalized linear threshold model for multiple cascades. In: Proceedings of the 2010 IEEE International Conference on Data Mining; 2010 Dec 13–17; Sydney, Australia; 2010. p. 965–70. 链接1

[44]   Bharathi S, Kempe D, Salek M. Competitive influence maximization in social networks. In: Proceedings of the 3rd International Workshop on Web and Internet Economics; 2007 Dec 12–14; San Diego, CA, USA; 2007. p. 306–11. 链接1

[45]   Galam S. Modelling rumors: the no plane Pentagon French hoax case. Phys A 2003;320:571–80. 链接1

[46]   Lin SC, Lin SD, Chen MS. A learning-based framework to handle multi-round multi-party influence maximization on social networks. In: Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2015 Aug 10–13; Sydney, Australia; 2015. p. 695–704. 链接1

[47]   Golnari G, Asiaee A, Banerjee A, Zhang ZL. Revisiting non-progressive influ- ence models: Scalable influence maximization. In: Proceedings of the 31st Conference on Uncertainty in Artificial Intelligence; 2015 Jul 12–16; Amster- dam, The Netherlands; 2015. 链接1

[48]   Wang X, Jia J, Tang J, Wu B, Cai L, Xie L. Modeling emotion influence in image social networks. IEEE Trans Affect Comp 2015;6(3):286–97. 链接1

[49]   Gao D. Opinion influence and diffusion in social network. In: Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information; 2012 Aug 12–16; Portland, OR, USA; 2012. p. 997. 链接1

[50]   Daley DJ, Kendall DG. Epidemics and rumors. Nature 1964;204(4963):1118.

[51] Moreno Y, Nekovee M, Pacheco AF. Dynamics of rumor spreading in complex networks. Phys Rev E Stat Nonlin Soft Matter Phys 2004;69(6 Pt 2):066130. 链接1

[52]   Nekovee M, Moreno Y, Bianconi G, Marsili M. Theory of rumor spreading in complex social networks. Phys A 2007;374(1):457–70. 链接1

[53]   Zhou J, Liu Z, Li B. Influence of network structure on rumor propagation. Phys Lett A 2007;368(6):458–63. 链接1

[54]   Wang H, Deng L, Xie F, Xu H, Han J. A new rumor propagation model on SNS structure. In: Proceedings of the 2012 IEEE International Conference on Gran- ular Computing; 2012 Aug 11–13; Hangzhou, China; 2012. p. 499–503. 链接1

[55]   Wang Y, Yang X, Han Y, Wang X. Rumor spreading model with trust mecha- nism in complex social networks. Commum Theor Phys 2013;59(4):510–6.

[56]   Xia L, Jiang G, Song B, Song Y. Rumor spreading model considering hesitating mechanism in complex social networks. Phys A 2015;437:295–303. 链接1

[57] Su Q, Huang J, Zhao X. An information propagation model considering incom- plete reading behavior in microblog. Phys A 2015;419:55–63. 链接1

[58]   Liu Q, Li T, Sun M. The analysis of an SEIR rumor propagation model on heter- ogeneous network. Phys A 2017;469:372–80. 链接1

[59]   Zhao L, Wang J, Chen Y, Wang Q, Cheng J, Cui H. SIHR rumor spreading model in social networks. Phys A 2012;391(7):2444–53. 链接1

[60]   Zhao L, Qiu X, Wang X, Wang J. Rumor spreading model considering forget- ting and remembering mechanisms in inhomogeneous networks. Phys A 2013;392 (4):987–94. 链接1

[61]   Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N. Coste- ffective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2007 Aug 12–15; San Jose, CA, USA; 2007. p. 420–9. 链接1

[62]   Zhou C, Zhang P, Zang W, Guo L. On the upper bounds of spread for greedy algorithms in social network influence maximization. IEEE Trans Knowl Data Eng 2015;27(10):2770–83. 链接1

[63]   Chen W, Wang C, Wang Y. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2010 Jul 25–28, Washington, DC, USA; 2010. p. 1029–38. 链接1

[64]   Goyal A, Lu W, Lakshmanan LVS. SIMPATH: An efficient algorithm for influ- ence maximization under the linear threshold model.Vancouver, BC, Canada; 2012. p. 211–20. In: Proceedings of the 2011 IEEE 11th International Conference on Data Mining; 2011 Dec 11–14; 链接1

[65]   Jung K, Heo W, Chen W. IRIE: a scalable influence maximization algorithm for independent cascade model and its extensions. Rev Crim 2011;56 (10):1451–5. 链接1

[66]   Borgs C, Brautbar M, Chayes J, Lucier B. Maximizing social influence in nearly optimal time. In: Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms; 2014 Jan 5–7; Portland, OR, USA; 2014. p. 946–57. 链接1

[67]   Tang Y, Xiao X, Shi Y. Influence maximization: Near-optimal time complexity meets practical efficiency. In: Proceedings of the 2014 ACM SIGMOD Interna- tional Conference on Management of Data; 2014 June 22–27; Snowbird, UT, USA; 2014. p. 75–86. 链接1

[68]   Li CT, Lin SD, Shan MK. Influence propagation and maximization for heteroge- neous social networks. In: Proceedings of the 21st International Conference on World Wide Web; 2012 Apr 16–20; Lyon, France; 2012. p. 559– 60. 链接1

[69]   Subbian K, Sharma D, Wen Z, Srivastava J. Social capital: The power of influ- encers in networks. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems; 2013 May 6–10; Saint Paul, MN, USA; 2013. p. 1243–4. 链接1

[70]   Li H, Bhowmick SS, Sun A. CINEMA: Conformity-aware greedy algorithm for influence maximization in online social networks. In: Proceedings of the 16th International Conference on Extending Database Technology; 2013 Mar 18– 22; Genoa, Italy; 2013. p. 323–34. 链接1

[71]   Lee JR, Chung CW. A query approach for influence maximization on specific users in social networks. IEEE Trans Knowl Data Eng 2015;27(2):340–53. 链接1

[72]   Deng X, Pan Y, Shen H, Gui J. Credit distribution for influence maximization in online social networks with node features. J Intell Fuzzy Syst 2016;31 (2):979–90.

[73]   Yao Q, Zhou C, Shi R, Wang P, Guo L. Topic-aware social influence minimiza- tion. In: Proceedings of the 24th International Conference on World Wide Web; 2015 May 18–22; Florence, Italy; 2015. p. 139–40. 链接1

[74]   Wang B, Chen G, Fu L, Song L, Wang X. DRIMUX: dynamic rumor influence minimization with user experience in social networks. IEEE Trans Knowl Data Eng 2017;29(10):2168–81. 链接1

[75]   Groeber P, Lorenz J, Schweitzer F. Dissonance minimization as a microfoun- dation of social influence in models of opinion formation. J Math Sociol 2014;38(3):147–74. 链接1

[76]   Chang CW, Yeh MY, Chuang KT. On the guarantee of containment probability in influence minimization. In: Proceedings of the 2016 IEEE/ACM Internation- al Conference on Advances in Social Networks Analysis and Mining; 2016 Aug 18–21; San Francisco, CA, USA; 2016. p. 231–8. 链接1

[77]   Faisan MM, Bhavani SD. Maximizing information or influence spread using flow authority model in social networks. In: Proceedings of the 10th Interna- tional Conference on Distributed Computing and Internet Technology; 2014 Feb 6–9; Bhubaneswar, India; 2014. p. 233–8. 链接1

[78]   Subbian K, Aggarwal C, Srivastava J. Content-centric flow mining for influence analysis in social streams. In: Proceedings of the 22nd ACM International Conference on Information & Knowledge Management; 2013 Oct 27–Nov 1; San Francisco, CA, USA; 2013. p. 841–6. 链接1

[79]   Kutzkov K, Bifet A, Bonchi F, Gionis A. STRIP: Stream learning of influence probabilities. In: Proceedings of the 19th ACM SIGKDD International Confer- ence on Knowledge Discovery and Data Mining; 2013 Aug 11–14; Chicago, IL, USA; 2013. p. 275–83. 链接1

[80]   Teng X, Pei S, Morone F, Makse HA. Collective influence of multiple spreaders evaluated by tracing real information flow in large-scale social networks. Sci Rep 2016;6(1):36043. 链接1

[81] Chintakunta H, Gentimis A. Influence of topology in information flow in social networks. In: Proceedings of the 2016 Asilomar Conference on Signals, Sys- tems and Computers; 2016 Nov 6–9; Pacific Grove, CA, USA; 2017. p. 67–71. 链接1

[82]   Subbian K, Sharma D, Wen Z, Srivastava J. Finding influencers in networks us- ing social capital. In: Proceedings of the 2013 IEEE/ACM International Confer- ence on Advances in Social Networks Analysis and Mining; 2013 Aug 25–28; Niagara Falls, ON, Canada; 2013. p. 592–9.

[83]   Liu G, Zhu F, Zheng K, Liu A, Li Z, Zhao L, et al. TOSI: a trust-oriented social influence evaluation method in contextual social networks. Neurocomputing 2016;210:130–40. 链接1

[84]   Deng X, Pan Y, Wu Y, Gui J. Credit distribution and influence maximization in online social networks using node features. In: Proceedings of the 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery; 2015 Aug 15–17; Zhangjiajie, China; 2016. p. 2093–100.

[85]   Zhu Y, Wu W, Bi Y, Wu L, Jiang Y, Xu W. Better approximation algorithms for influence maximization in online social networks. J Comb Optim 2015;30 (1):97–108. 链接1

[86] He J, Hu M, Shi M, Liu Y. Research on the measure method of complaint theme influence on online social network. Expert Syst Appl 2014;41(13):6039–46. 链接1

[87]   Gehrke J, Ginsparg P, Kleinberg J. Overview of the 2003 KDD cup. ACM SIGK- DD Explor Newslett 2003;5(2):149–51. 链接1

[88] Yang J, Leskovec J. Defining and evaluating network communities based on ground-truth. Knowl Inf Syst 2015;42(1):181–213. 链接1

[89] Tang J, Zhang J, Yao L, Li J, Zhang L, Su Z. ArnetMiner: Extraction and mining of academic social networks. In: Proceedings of the 14th ACM SIGKDD Inter- national Conference on Knowledge Discovery and Data Mining; 2008 Aug 24–27; Las Vegas, NV, USA; 2008. p. 990–8. 链接1

相关研究