Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Engineering >> 2018, Volume 4, Issue 1 doi: 10.1016/j.eng.2018.02.004

Social Influence Analysis: Models, Methods, and Evaluation

School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China

Received: 2017-12-10 Revised: 2018-01-05 Accepted: 2018-01-08 Available online: 2018-02-16

Next Previous

Abstract

Social influence analysis (SIA) is a vast research field that has attracted research interest in many areas. In this paper, we present a survey of representative and state-of-the-art work in models, methods, and evaluation aspects related to SIA. We divide SIA models into two types: microscopic and macroscopic models. Microscopic models consider human interactions and the structure of the influence process, whereas macroscopic models consider the same transmission probability and identical influential power for all users. We analyze social influence methods including influence maximization, influence minimization, flow of influence, and individual influence. In social influence evaluation, influence evaluation metrics are introduced and social influence evaluation models are then analyzed. The objectives of this paper are to provide a comprehensive analysis, aid in understanding social behaviors, provide a theoretical basis for influencing public opinion, and unveil future research directions and potential applications.

References

[ 1 ]   Travers J, Milgram S. The small world problem. Psychol Today 1967;1:61–7. link1

[ 2 ]   Chen W, Lakshmanan LV, Castillo C. Information and influence propagation in social networks. San Rafael: Morgan & Claypool; 2013. link1

[ 3 ]   Freeman LC. A set of measures of centrality based on betweenness. Sociome- try 1977;40(1):35–41. link1

[ 4 ]   Baas F. A new product growth model for consumer durables. Manage Sci 1969;15(5):215–27. link1

[ 5 ]   Brown JJ, Reingen PH. Social ties and word-of-mouth referral behavior. J Con- sum Res 1987;14(3):350–62. link1

[ 6 ]   Mahajan V, Muller E, Bass FM. New product diffusion models in marketing: A review and directions for research. J Mark 1990;54(1):1–26.

[ 7 ]   Domingos P, Richardson M. Mining the network value of customers. In: Pro- ceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2001 Aug 26–29; San Francisco, CA, USA; 2001. p. 57–66. link1

[ 8 ]   Goldenberg J, Libai B, Muller E. Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark Lett 2001;12(3):211–23. link1

[ 9 ] Richardson M, Domingos P. Mining knowledge-sharing sites for viral mar- keting. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2002 Jul 23–26; Edmonton, AB, Can- ada; 2002. p. 61–70. link1

[10] Leskovec J, Adamic LA, Huberman BA. The dynamics of viral marketing. J ACM Trans Web 2007;1(1):5. link1

[11] Pálovics R, Benczúr AA, Kocsis L, Kiss T, Frigó E. Exploiting temporal influence in online recommendation. In: Proceedings of the 8th ACM Conference on Recommender Systems; 2014 Oct 6–10; Foster City, CA, USA; 2014. p. 273–80. link1

[12]   Wang G, Jiang W, Wu J, Xiong Z. Fine-grained feature-based social influence evaluation in online social networks. IEEE Trans Parallel Distrib Syst 2014;25 (9):2286–96.

[13] Christakis NA, Fowler JH. The spread of obesity in a large social network over 32 years. N Engl J Med 2007;357(4):370–9. link1

[14] Fowler JH, Christakis NA. Dynamic spread of happiness in a large social net- work: longitudinal analysis over 20 years in the Framingham Heart Study. Br Med J 2009;338(7685):23–7.

[15]   Franks H, Griffiths N, Anand SS. Learning influence in complex social net- works. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems; 2013 May 6–10; Saint Paul, MN, USA; 2013. p. 447–54.

[16]   Dong W, Pentland A. Modeling influence between experts. In: Proceedings of the ICMI 2006 and IJCAI 2007 International Conference on Artificial In- telligence for Human Computing; 2006 Nov 3; Banff, AB, Canada; 2007. p. 170–89. link1

[17]   Tang J, Sun J, Wang C, Yang Z. Social influence analysis in large-scale net- works. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2009 Jun 28–Jul 1; Paris, France; 2009. p. 807–16. link1

[18]   He Z, Cai Z, Wang X. Modeling propagation dynamics and developing opti- mized countermeasures for rumor spreading in online social networks. In: Proceedings of the 2005 IEEE 35th International Conference on Distributed Computing Systems; 2015 Jun 29–Jul 2; Columbus, OH, USA; 2015. p. 205–14. link1

[19]   Katz E, Lazarsfeld PF. Personal influence: The part played by people in the flow of mass communications. New York: Free Press; 1965. link1

[20]   Rogers EM. Diffusion of innovations. 5th ed. New York: Free Press; 2003. link1

[21]   Keller E, Berry J. The influentials: one American in ten tells the other nine how to vote, where to eat, and what to buy. New York: Free Press; 2003. link1

[22]   Peng S, Yang A, Cao L, Yu S, Xie D. Social influence modeling using informa- tion theory in mobile social networks. Inf Sci 2017;379:146–59. link1

[23] Kempe D, Kleinberg J, Tardos É. Maximizing the spread of influence through a social network. In: Proceedings of the 9th ACM SIGKDD International Confer- ence on Knowledge Discovery and Data Mining; 2003 Aug 24–27; Washing- ton, DC, USA; 2003. p. 137–46. link1

[24] Leskovec J, Mcglohon M, Faloutsos C, Glance NS, Hurst M. Patterns of cascad- ing behavior in large blog graphs. In: Proceedings of the 2007 SIAM Interna- tional Conference on Data Mining; 2007 Apr 26–28; Minneapolis, MN, USA; 2007. link1

[25]   Gruhl D, Guha R, Liben-Nowell D, Tomkins A. Information diffusion through blogspace. In: Proceedings of the 13th International Conference on World Wide Web; 2004 May 17–20; New York, NY, USA; 2004. p. 491–501.

[26]   Granovetter M. Threshold models of collective behavior. Am J Sociol 1978;83 (6):1420–43. link1

[27]   Chen W, Lu W, Zhang N. Time-critical influence maximization in social net- works with time-delayed diffusion process. In: Proceedings of the 26th AAAI Conference on Artificial Intelligence; 2012 Jul 22–26; Toronto, ON, Canada; 2012. p. 592–8. link1

[28]   Feng S, Chen X, Cong G, Zeng Y, Chee YM, Xiang Y. Influence maximization with novelty decay in social networks. In: Proceedings of the 28th AAAI Con- ference on Artificial Intelligence; 2014 Jul 27–31; Québec City, QC, Canada; 2014. p. 37–43. link1

[29]   Mohamadi-Baghmolaei R, Mozafari N, Hamzeh A. Trust based latency aware influence maximization in social networks. J Eng App Artif Intell 2015;41 (C):195–206. link1

[30]   Budak C, Agrawal D, Abbadi AE. Limiting the spread of misinformation in so- cial networks. In: Proceedings of the 20th International Conference on World Wide Web; 2011 Mar 28–Apr 1; Hyderabad, India; 2011. p. 665–74. link1

[31] Liu W, Yue K, Wu H, Li J, Liu D, Tang D. Containment of competitive influence spread in social networks. Knowl Base Syst 2016;109(C):266–75. link1

[32]   Borodin A, Filmus Y, Oren J. Threshold models for competitive influence in social networks. In: Proceedings of the 6th International Conference on In- ternet and Network Economics; 2010 Dec 13–17; Stanford, CA, USA; 2010. p. 539–50. link1

[33]   Mohammadi A, Saraee M, Mirzaei A. Time-sensitive influence maximization in social networks. J Inf Sci 2015;41(6):765–78.

[34] Saito K, Ohara K, Yamagishi Y, Kimura M, Motoda H. Learning diffusion proba- bility based on node attributes in social networks. In: Proceedings of the 19th International Conference on Foundations of Intelligent Systems; 2011 Jun 28–30; Warsaw, Poland; 2011. p. 153–62. link1

[35]   Guille A, Hacid H. A predictive model for the temporal dynamics of informa- tion diffusion in online social networks. In: Proceedings of the 21st Interna- tional Conference on World Wide Web; 2012 Apr 16–20; Lyon, France; 2012. p. 1145–52. link1

[36]   Bharathi S, Kempe D, Salek M. Competitive influence maximization in social networks. In: Proceedings of the 3rd International Conference on Internet and Network Economics; 2007 Dec 12–14; San Diego, CA, USA; 2007. p. 306–11. link1

[37]   Carnes T, Nagarajan C, Wild SM, Zuylen AV. Maximizing influence in a competitive social network: A follower’s perspective. In: Proceedings of the 9th International Conference on Electronic Commerce; 2007 Aug 19–22; Minne- apolis, MN, USA; 2007. p. 351–60. link1

[38]   Fan L, Lu Z, Wu W, Thuraisingham B, Ma H, Bi Y. Least cost rumor blocking in social networks. In: Proceedings of the 2013 IEEE 33rd International Con- ference on Distributed Computing Systems; 2013 Jul 8–11; Philadelphia, PA, USA; 2013. p. 540–9. link1

[39]   Lee W, Kim J, Yu H. CT-IC: Continuously activated and time-restricted inde- pendent cascade model for viral marketing. In: Proceedings of the 2012 IEEE 12th International Conference on Data Mining; 2012 Dec 10–13; Brussels, Belgium; 2013. p. 960–5. link1

[40]   Kostka J, Oswald YA, Wattenhofer R. Word of mouth: Rumor dissemination in social networks. In: Proceedings of the 15th International Colloquium on Structural Information and Communication Complexity; 2008 Jun 17–20; Vil- lars-sur-Ollon, Switzerland; 2008. p. 185–96. link1

[41]   Chen W,WangY, Yang S. Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowl- edge Discovery and Data Mining; 2009 Jun 28–Jul 1; Paris, France; 2009. p. 199–208. link1

[42]   Wang Y, Wang H, Li J, Gao H. Efficient influence maximization in weighted independent cascade model. In: Proceedings of the 21st International Con- ference on Database Systems for Advanced Applications; 2016 Mar 27– 30; Dallas, TX, USA; 2016. p. 49–64. link1

[43]   Pathak N, Banerjee A, Srivastava J. A generalized linear threshold model for multiple cascades. In: Proceedings of the 2010 IEEE International Conference on Data Mining; 2010 Dec 13–17; Sydney, Australia; 2010. p. 965–70. link1

[44]   Bharathi S, Kempe D, Salek M. Competitive influence maximization in social networks. In: Proceedings of the 3rd International Workshop on Web and Internet Economics; 2007 Dec 12–14; San Diego, CA, USA; 2007. p. 306–11. link1

[45]   Galam S. Modelling rumors: the no plane Pentagon French hoax case. Phys A 2003;320:571–80. link1

[46]   Lin SC, Lin SD, Chen MS. A learning-based framework to handle multi-round multi-party influence maximization on social networks. In: Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2015 Aug 10–13; Sydney, Australia; 2015. p. 695–704. link1

[47]   Golnari G, Asiaee A, Banerjee A, Zhang ZL. Revisiting non-progressive influ- ence models: Scalable influence maximization. In: Proceedings of the 31st Conference on Uncertainty in Artificial Intelligence; 2015 Jul 12–16; Amster- dam, The Netherlands; 2015. link1

[48]   Wang X, Jia J, Tang J, Wu B, Cai L, Xie L. Modeling emotion influence in image social networks. IEEE Trans Affect Comp 2015;6(3):286–97. link1

[49]   Gao D. Opinion influence and diffusion in social network. In: Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information; 2012 Aug 12–16; Portland, OR, USA; 2012. p. 997. link1

[50]   Daley DJ, Kendall DG. Epidemics and rumors. Nature 1964;204(4963):1118.

[51] Moreno Y, Nekovee M, Pacheco AF. Dynamics of rumor spreading in complex networks. Phys Rev E Stat Nonlin Soft Matter Phys 2004;69(6 Pt 2):066130. link1

[52]   Nekovee M, Moreno Y, Bianconi G, Marsili M. Theory of rumor spreading in complex social networks. Phys A 2007;374(1):457–70. link1

[53]   Zhou J, Liu Z, Li B. Influence of network structure on rumor propagation. Phys Lett A 2007;368(6):458–63. link1

[54]   Wang H, Deng L, Xie F, Xu H, Han J. A new rumor propagation model on SNS structure. In: Proceedings of the 2012 IEEE International Conference on Gran- ular Computing; 2012 Aug 11–13; Hangzhou, China; 2012. p. 499–503. link1

[55]   Wang Y, Yang X, Han Y, Wang X. Rumor spreading model with trust mecha- nism in complex social networks. Commum Theor Phys 2013;59(4):510–6.

[56]   Xia L, Jiang G, Song B, Song Y. Rumor spreading model considering hesitating mechanism in complex social networks. Phys A 2015;437:295–303. link1

[57] Su Q, Huang J, Zhao X. An information propagation model considering incom- plete reading behavior in microblog. Phys A 2015;419:55–63. link1

[58]   Liu Q, Li T, Sun M. The analysis of an SEIR rumor propagation model on heter- ogeneous network. Phys A 2017;469:372–80. link1

[59]   Zhao L, Wang J, Chen Y, Wang Q, Cheng J, Cui H. SIHR rumor spreading model in social networks. Phys A 2012;391(7):2444–53. link1

[60]   Zhao L, Qiu X, Wang X, Wang J. Rumor spreading model considering forget- ting and remembering mechanisms in inhomogeneous networks. Phys A 2013;392 (4):987–94. link1

[61]   Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N. Coste- ffective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2007 Aug 12–15; San Jose, CA, USA; 2007. p. 420–9. link1

[62]   Zhou C, Zhang P, Zang W, Guo L. On the upper bounds of spread for greedy algorithms in social network influence maximization. IEEE Trans Knowl Data Eng 2015;27(10):2770–83. link1

[63]   Chen W, Wang C, Wang Y. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; 2010 Jul 25–28, Washington, DC, USA; 2010. p. 1029–38. link1

[64]   Goyal A, Lu W, Lakshmanan LVS. SIMPATH: An efficient algorithm for influ- ence maximization under the linear threshold model.Vancouver, BC, Canada; 2012. p. 211–20. In: Proceedings of the 2011 IEEE 11th International Conference on Data Mining; 2011 Dec 11–14; link1

[65]   Jung K, Heo W, Chen W. IRIE: a scalable influence maximization algorithm for independent cascade model and its extensions. Rev Crim 2011;56 (10):1451–5. link1

[66]   Borgs C, Brautbar M, Chayes J, Lucier B. Maximizing social influence in nearly optimal time. In: Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms; 2014 Jan 5–7; Portland, OR, USA; 2014. p. 946–57. link1

[67]   Tang Y, Xiao X, Shi Y. Influence maximization: Near-optimal time complexity meets practical efficiency. In: Proceedings of the 2014 ACM SIGMOD Interna- tional Conference on Management of Data; 2014 June 22–27; Snowbird, UT, USA; 2014. p. 75–86. link1

[68]   Li CT, Lin SD, Shan MK. Influence propagation and maximization for heteroge- neous social networks. In: Proceedings of the 21st International Conference on World Wide Web; 2012 Apr 16–20; Lyon, France; 2012. p. 559– 60. link1

[69]   Subbian K, Sharma D, Wen Z, Srivastava J. Social capital: The power of influ- encers in networks. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-agent Systems; 2013 May 6–10; Saint Paul, MN, USA; 2013. p. 1243–4. link1

[70]   Li H, Bhowmick SS, Sun A. CINEMA: Conformity-aware greedy algorithm for influence maximization in online social networks. In: Proceedings of the 16th International Conference on Extending Database Technology; 2013 Mar 18– 22; Genoa, Italy; 2013. p. 323–34. link1

[71]   Lee JR, Chung CW. A query approach for influence maximization on specific users in social networks. IEEE Trans Knowl Data Eng 2015;27(2):340–53. link1

[72]   Deng X, Pan Y, Shen H, Gui J. Credit distribution for influence maximization in online social networks with node features. J Intell Fuzzy Syst 2016;31 (2):979–90.

[73]   Yao Q, Zhou C, Shi R, Wang P, Guo L. Topic-aware social influence minimiza- tion. In: Proceedings of the 24th International Conference on World Wide Web; 2015 May 18–22; Florence, Italy; 2015. p. 139–40. link1

[74]   Wang B, Chen G, Fu L, Song L, Wang X. DRIMUX: dynamic rumor influence minimization with user experience in social networks. IEEE Trans Knowl Data Eng 2017;29(10):2168–81. link1

[75]   Groeber P, Lorenz J, Schweitzer F. Dissonance minimization as a microfoun- dation of social influence in models of opinion formation. J Math Sociol 2014;38(3):147–74. link1

[76]   Chang CW, Yeh MY, Chuang KT. On the guarantee of containment probability in influence minimization. In: Proceedings of the 2016 IEEE/ACM Internation- al Conference on Advances in Social Networks Analysis and Mining; 2016 Aug 18–21; San Francisco, CA, USA; 2016. p. 231–8. link1

[77]   Faisan MM, Bhavani SD. Maximizing information or influence spread using flow authority model in social networks. In: Proceedings of the 10th Interna- tional Conference on Distributed Computing and Internet Technology; 2014 Feb 6–9; Bhubaneswar, India; 2014. p. 233–8. link1

[78]   Subbian K, Aggarwal C, Srivastava J. Content-centric flow mining for influence analysis in social streams. In: Proceedings of the 22nd ACM International Conference on Information & Knowledge Management; 2013 Oct 27–Nov 1; San Francisco, CA, USA; 2013. p. 841–6. link1

[79]   Kutzkov K, Bifet A, Bonchi F, Gionis A. STRIP: Stream learning of influence probabilities. In: Proceedings of the 19th ACM SIGKDD International Confer- ence on Knowledge Discovery and Data Mining; 2013 Aug 11–14; Chicago, IL, USA; 2013. p. 275–83. link1

[80]   Teng X, Pei S, Morone F, Makse HA. Collective influence of multiple spreaders evaluated by tracing real information flow in large-scale social networks. Sci Rep 2016;6(1):36043. link1

[81] Chintakunta H, Gentimis A. Influence of topology in information flow in social networks. In: Proceedings of the 2016 Asilomar Conference on Signals, Sys- tems and Computers; 2016 Nov 6–9; Pacific Grove, CA, USA; 2017. p. 67–71. link1

[82]   Subbian K, Sharma D, Wen Z, Srivastava J. Finding influencers in networks us- ing social capital. In: Proceedings of the 2013 IEEE/ACM International Confer- ence on Advances in Social Networks Analysis and Mining; 2013 Aug 25–28; Niagara Falls, ON, Canada; 2013. p. 592–9.

[83]   Liu G, Zhu F, Zheng K, Liu A, Li Z, Zhao L, et al. TOSI: a trust-oriented social influence evaluation method in contextual social networks. Neurocomputing 2016;210:130–40. link1

[84]   Deng X, Pan Y, Wu Y, Gui J. Credit distribution and influence maximization in online social networks using node features. In: Proceedings of the 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery; 2015 Aug 15–17; Zhangjiajie, China; 2016. p. 2093–100.

[85]   Zhu Y, Wu W, Bi Y, Wu L, Jiang Y, Xu W. Better approximation algorithms for influence maximization in online social networks. J Comb Optim 2015;30 (1):97–108. link1

[86] He J, Hu M, Shi M, Liu Y. Research on the measure method of complaint theme influence on online social network. Expert Syst Appl 2014;41(13):6039–46. link1

[87]   Gehrke J, Ginsparg P, Kleinberg J. Overview of the 2003 KDD cup. ACM SIGK- DD Explor Newslett 2003;5(2):149–51. link1

[88] Yang J, Leskovec J. Defining and evaluating network communities based on ground-truth. Knowl Inf Syst 2015;42(1):181–213. link1

[89] Tang J, Zhang J, Yao L, Li J, Zhang L, Su Z. ArnetMiner: Extraction and mining of academic social networks. In: Proceedings of the 14th ACM SIGKDD Inter- national Conference on Knowledge Discovery and Data Mining; 2008 Aug 24–27; Las Vegas, NV, USA; 2008. p. 990–8. link1

Related Research