Abstract
Online social networks (OSNs) are structures that help users to interact, exchange, and propagate new ideas. The identification of the influential users in OSNs is a significant process for accelerating the propagation of information that includes marketing applications or hindering the dissemination of unwanted contents, such as viruses, negative online behaviors, and rumors. This article presents a detailed survey of influential users’ identification algorithms and their performance evaluation approaches in OSNs. The survey covers recent techniques, applications, and open research issues on analysis of OSN connections for identification of influential users.
- A. Abbas, M. U. Khan, M. Ali, S. U. Khan, and L. T. A. Yang. 2015. Cloud based framework for identification of influential health experts from Twitter. In 15th International Conference on Scalable Computing and Communications (ScalCom).Google ScholarCross Ref
- M. A. Al-Garadi, K. D. Varathan, and S. D. Ravana. 2017. Identification of influential spreaders in online social networks using interaction weighted K-core decomposition method. Physica A: Statistical Mechanics and its Applications 468, 278--288.Google Scholar
- M. A. AL-Garadi, K. D. Varathan, S. D. Ravana, E. Ahmed, and V. Chang. 2016. Identifying the influential spreaders in multilayer interactions of online social networks. Journal of Intelligent and Fuzzy Systems 31, 2721--2735.Google ScholarCross Ref
- R. Albert, H. Jeong, and A.-L. Barabási. 2000. Error and attack tolerance of complex networks. Nature 406, 378--382.Google ScholarCross Ref
- K. Alfalahi, Y. Atif, and A. Abraham. 2014. Models of influence in online social networks. International Journal of Intelligent Systems 29, 161--183.Google ScholarCross Ref
- F. Altarelli, A. Braunstein, L. Dall'asta, J. R. Wakeling, and R. Zecchina. 2014. Containing epidemic outbreaks by message-passing techniques. Physical Review X 4, 021024.Google Scholar
- F. Altarelli, A. Braunstein, L. Dall'asta, and R. Zecchina. 2013. Optimizing spread dynamics on graphs by message passing. Journal of Statistical Mechanics: Theory and Experiment 2013, P09011.Google ScholarCross Ref
- S. Aral. 2012. Social science: Poked to vote. Nature 489, 212--214.Google ScholarCross Ref
- S. Aral, L. Muchnik, and A. Sundararajan. 2013. Engineering social contagions: Optimal network seeding in the presence of homophily. Network Science 1, 125--153.Google ScholarCross Ref
- S. Aral and D. Walker. 2012. Identifying influential and susceptible members of social networks. Science 337, 337--341.Google ScholarCross Ref
- E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts. 2011. Everyone's an influencer: Quantifying influence on Twitter. Proceedings of the 4th ACM International Conference on Web Search and Data Mining. ACM, 65--74. Google ScholarDigital Library
- E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic. 2012. The role of social networks in information diffusion. Proceedings of the 21st International Conference on World Wide Web. ACM, 519--528. Google ScholarDigital Library
- A.-L. Barabási and R. Albert. 1999. Emergence of scaling in random networks. Science 286, 509--512.Google ScholarCross Ref
- V. Batagelj and M. Zaversnik. 2003. An O (m) algorithm for cores decomposition of networks. ArXiv Preprint cs/0310049.Google Scholar
- F. Battiston, V. Nicosia, and V. Latora. 2014. Structural measures for multiplex networks. Physical Review E 89, 032804.Google ScholarCross Ref
- A. Bavelas. 1950. Communication patterns in task-oriented groups. Journal of the Acoustical Society of America. 22, 6 (1950), 725--730.Google ScholarCross Ref
- C. Bigonha, T. N. Cardoso, M. M. Moro, M. A. Gonçalves, and V. A. Almeida. 2012. Sentiment-based influence detection on Twitter. Journal of the Brazilian Computer Society 18, 169--183.Google ScholarCross Ref
- D. M. Blei, A. Y. Ng, and M. I. Jordan. 2003. Latent Dirichlet allocation. Journal of Machine Learning Research 3, 993--1022. Google ScholarDigital Library
- P. Bonacich. 2007. Some unique properties of eigenvector centrality. Social Networks 29, 555--564.Google ScholarCross Ref
- R. M. Bond, C. J. Fariss, J. J. Jones, A. D. Kramer, C. Marlow, J. E. Settle, and J. H. Fowler. 2012. A 61-million-person experiment in social influence and political mobilization. Nature 489, 295--298.Google ScholarCross Ref
- S. P. Borgatti and M. G. Everett. 2006. A graph-theoretic perspective on centrality. Social Networks 28, 466--484.Google ScholarCross Ref
- J. Borge-Holthoefer and Y. Moreno. 2012. Absence of influential spreaders in rumor dynamics. Physical Review E 85, 026116.Google ScholarCross Ref
- M. Bouguessa. 2011. An unsupervised approach for identifying spammers in social networks. 23rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI’11). IEEE, 832--840. Google ScholarDigital Library
- U. Brandes. 2001. A faster algorithm for betweenness centrality*. Journal of Mathematical Sociology 25, 163--177.Google ScholarCross Ref
- S. Brin and L. Page. 2012. Reprint of: The anatomy of a large-scale hypertextual web search engine. Computer Networks 56, 3825--3833. Google ScholarDigital Library
- C. Budak, D. Agrawal, and A. El Abbadi. 2011. Limiting the spread of misinformation in social networks. Proceedings of the 20th International Conference on World Wide Web. ACM, 665--674. Google ScholarDigital Library
- S. Catanese, P. De Meo, E. Ferrara, G. Fiumara, and A. Provetti. 2012. Extraction and analysis of Facebook friendship relations. Computational Social Networks. Springer, 291--324.Google Scholar
- D. Centola and M. Macy. 2007. Complex contagions and the weakness of long ties. American Journal of Sociology 113, 702--734.Google ScholarCross Ref
- M. Cha, F. Benevenuto, H. Haddadi, and K. Gummadi. 2012. The world of connections and information flow in Twitter. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 42, 991--998. Google ScholarDigital Library
- M. Cha, H. Haddadi, F. Benevenuto, and P. K. Gummadi. 2010. Measuring user influence in Twitter: The million follower fallacy. Icwsm, 10, 30.Google Scholar
- W. Chai, W. Xu, M. Zuo, and X. Wen. 2013. ACQR: A novel framework to identify and predict influential users in micro-blogging. PACIS. 20.Google Scholar
- D. H. Chau, S. Pandit, S. Wang, and C. Faloutsos. 2007. Parallel crawling for online social networks. In Proceedings of the 16th International Conference on World Wide Web. ACM, 1283--1284. Google ScholarDigital Library
- D.-B. Chen, R. Xiao, and A. Zeng. 2014. Predicting the evolution of spreading on complex networks. Scientific Reports 4, 6108.Google ScholarCross Ref
- D. Chen, L. Lü, M.-S. Shang, Y.-C. Zhang, and T. Zhou. 2012a. Identifying influential nodes in complex networks. Physica a: Statistical Mechanics and Its Applications 391, 1777--1787.Google ScholarCross Ref
- K. Chen, P. Zhu, and Y. Xiong. 2013. Mining spam accounts with user influence. In International Conference on Information Science and Cloud Computing Companion (ISCC-C’13). IEEE, 167--173. Google ScholarDigital Library
- W. Chen, S. Cheng, X. He, and F. Jiang. 2012b. Influencerank: An efficient social influence measurement for millions of users in microblog. In 2nd International Conference on Cloud and Green Computing (CGC’12). IEEE, 563--570. Google ScholarDigital Library
- W. Chen, A. Collins, R. Cummings, T. Ke, Z. Liu, D. Rincon, X. Sun, Y. Wang, W. Wei, and Y. Yuan. 2011. Influence maximization in social networks when negative opinions may emerge and propagate. SDM. SIAM, 379--390.Google Scholar
- W. Chen, Y. Wang, and S. Yang. 2009. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 199--208. Google ScholarDigital Library
- J.-J. Cheng, Y. Liu, B. Shen, and W.-G. Yuan. 2013. An epidemic model of rumor diffusion in online social networks. The European Physical Journal B 86, 1--7.Google ScholarCross Ref
- S. Cobb. 2017. RoT: Ransomware of Things. cdn2-prodint.esetstatic.com 2017. https://cdn2prodint.esetstatic.com/ESET/US/Newsroom/2017/03/ESET_Trends-and-Prediction_2017_Ransomware.pdf.Google Scholar
- V. Colizza, A. Flammini, M. A. Serrano, and A. Vespignani. 2006. Detecting rich-club ordering in complex networks. Nature Physics 2, 110--115.Google ScholarCross Ref
- C. H. Comin and L. Da Fontoura Costa. 2011. Identifying the starting point of a spreading process in complex networks. Physical Review E 84, 056105.Google ScholarCross Ref
- D. Cosley, D. P. Huttenlocher, J. M. Kleinberg, X. Lan, and S. Suri. 2010. Sequential influence models in social networks. ICWSM, 10, 26.Google Scholar
- J.-V. Cossu, N. Dugué, and V. Labatut. 2015. Detecting real-world influence through Twitter. ArXiv Preprint ArXiv:1506.05903. Google ScholarDigital Library
- M. De Domenico, A. Solé-Ribalta, E. Omodei, S. Gómez, and A. Arenas. 2015. Ranking in interconnected multilayer networks reveals versatile nodes. Nature Communications 6, 6868.Google ScholarCross Ref
- Z.-Y. Ding, Y. Jia, B. Zhou, Y. Han, L. He, and J.-F. Zhang. 2013. Measuring the spreadability of users in microblogs. Journal of Zhejiang University SCIENCE C 14, 701--710.Google ScholarCross Ref
- B. Doerr, M. Fouz, and T. Friedrich. 2012. Why rumors spread so quickly in social networks. Communications of the ACM 55, 70--75. Google ScholarDigital Library
- P. Domingos. 2005. Mining social networks for viral marketing. IEEE Intelligent Systems, 20, 80--82.Google ScholarDigital Library
- P. Domingos. 2012. A few useful things to know about machine learning. Communications of the ACM 55, 78--87. Google ScholarDigital Library
- S. N. Dorogovtsev, A. V. Goltsev, and J. F. F. Mendes. 2006. K-core organization of complex networks. Physical Review Letters 96, 040601.Google ScholarCross Ref
- R. O. Duda, P. E. Hart, and D. G. Stork. 2012. Pattern Classification, John Wiley 8 Sons, Hoboken, NJ.Google Scholar
- N. Dufty. 2012. Using social media to build community disaster resilience. Australian Journal of Emergency Management 27, 40.Google Scholar
- D. Easley and J. Kleinberg. 2010. Networks, Crowds, and Markets: Reasoning About a Highly Connected World, Cambridge University Press, New York, NY. Google ScholarDigital Library
- H. Ebel, L.-I. Mielsch, and S. Bornholdt. 2002. Scale-free topology of e-mail networks. Physical Review E 66, 035103.Google ScholarCross Ref
- K. Faust. 1997. Centrality in affiliation networks. Social Networks 19, 157--191.Google ScholarCross Ref
- P. E. Brown and J. Feng. 2011. Measuring user influence on twitter using modified k-shell decomposition. In Fifth International AAAI Conference on Weblogs and Social Media.Google Scholar
- M. Fire, R. Goldschmidt, and Y. Elovici. 2014. Online social networks: Threats and solutions. IEEE Communications Surveys 8 Tutorials 16, 2019--2036.Google Scholar
- C. Francalanci and A. Hussain. 2015. A visual analysis of social influencers and influence in the tourism domain. Information and Communication Technologies in Tourism 2015. Springer, New York, NY.Google Scholar
- L. C. Freeman. 1977. A set of measures of centrality based on betweenness. Sociometry 35--41.Google Scholar
- L. C. Freeman. 1979. Centrality in social networks conceptual clarification. Social Networks 1, 215--239.Google ScholarCross Ref
- C. Gao, J. Liu, and N. Zhong. 2011a. Network immunization and virus propagation in email networks: experimental evaluation and analysis. Knowledge and Information Systems 27, 253--279. Google ScholarDigital Library
- C. Gao, J. Liu, and N. Zhong. 2011b. Network immunization with distributed autonomy-oriented entities. IEEE Transactions on Parallel and Distributed Systems 22, 1222--1229. Google ScholarDigital Library
- H. Gao, G. Barbier, and R. Goolsby. 2011c. Harnessing the crowdsourcing power of social media for disaster relief. IEEE Intelligent Systems 26, 10--14. Google ScholarDigital Library
- A. Garas, F. Schweitzer, and S. Havlin. 2012. A k-shell decomposition method for weighted networks. New Journal of Physics 14, 083030.Google ScholarCross Ref
- S. Garg, T. Gupta, N. Carlsson, and A. Mahanti. 2009. Evolution of an online social aggregation network: an empirical study. Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference. ACM, 315--321. Google ScholarDigital Library
- S. Gensler, F. Völckner, Y. Liu-Thompkins, and C. Wiertz. 2013. Managing brands in the social media environment. Journal of Interactive Marketing 27, 242--256.Google ScholarCross Ref
- G. Ghoshal and A.-L. Barabási. 2011. Ranking stability and super-stable nodes in complex networks. Nature Communications 2, 394.Google ScholarCross Ref
- E. Gilbert and K. Karahalios. 2009. Predicting tie strength with social media. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 211--220. Google ScholarDigital Library
- M. Gjoka, M. Kurant, C. T. Butts, and A. Markopoulou. 2010. Walking in Facebook: A case study of unbiased sampling of OSNs. Proceedings of IEEE Infocom. IEEE, 1--9. Google ScholarDigital Library
- S. Goel, D. J. Watts, and D. G. Goldstein. 2012. The structure of online diffusion networks. Proceedings of the 13th ACM Conference on Electronic Commerce. ACM, 623--638. Google ScholarDigital Library
- J. Goldenberg, S. Han, D. R. Lehmann, and J. W. Hong. 2009. The role of hubs in the adoption process. Journal of Marketing 73, 1--13.Google ScholarCross Ref
- S. Gomez, A. Diaz-Guilera, J. Gomez-Gardeñes, C. J. Perez-Vicente, Y. Moreno, and A. Arenas. 2013. Diffusion dynamics on multiplex networks. Physical Review Letters 110, 028701.Google ScholarCross Ref
- S. González-Bailón, J. Borge-Holthoefer, A. Rivero, and Y. Moreno. 2011. The dynamics of protest recruitment through an online network. Scientific Reports, 1, 197.Google ScholarCross Ref
- A. Goyal, F. Bonchi, and L. V. Lakshmanan. 2010. Learning influence probabilities in social networks. In Proceedings of the 3rd ACM International Conference on Web Search and Data Mining. ACM, 241--250. Google ScholarDigital Library
- M. S. Granovetter. 1973. The strength of weak ties. American Journal of Sociology 1360--1380.Google Scholar
- T. L. Griffiths and M. Steyvers. 2004. Finding scientific topics. In Proceedings of the National Academy of Sciences 101, 5228--5235.Google ScholarCross Ref
- A. Guille, H. Hacid, C. Favre, and D. A. Zighed. 2013. Information diffusion in online social networks: A survey. ACM SIGMOD Record 42, 17--28. Google ScholarDigital Library
- A. Halu, R. J. Mondragón, P. Panzarasa, and G. Bianconi. 2013. Multiplex pagerank. PLoS ONE 8, 10 (2013), e78293.Google ScholarCross Ref
- T. Haveliwala. 1999. Efficient computation of PageRank. Stanford University Technical Report.Google Scholar
- H. He. 2007. Eigenvectors and reconstruction. The Electronic Journal of Combinatorics 14, N14.Google ScholarCross Ref
- H. W. Hethcote. 2000. The mathematics of infectious diseases. SIAM Review 42, 599--653. Google ScholarDigital Library
- G. E. Hinton, S. Osindero, and Y.-W. Teh. 2006. A fast learning algorithm for deep belief nets. Neural Computation 18, 1527--1554. Google ScholarDigital Library
- J. Y. Ho and M. Dempsey. 2010. Viral marketing: Motivations to forward online content. Journal of Business Research 63, 1000--1006.Google ScholarCross Ref
- G. Hogben. 2007. Security issues and recommendations for online social networks. ENISA Position Paper.Google Scholar
- S. Hong and D. Nadler. 2011. Does the early bird move the polls?: The use of the social media tool ‘Twitter’ by US politicians and its impact on public opinion. Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times. ACM, 182--186. Google ScholarDigital Library
- J. Howison and A. Wiggins. 2011. Validity issues in the use of social network analysis with digital trace data Journal of the Association for Information Systems 12, 767--797.Google Scholar
- M. Hu, S. Liu, F. Wei, Y. Wu, J. Stasko, and K.-L. Ma. 2012. Breaking news on Twitter. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2751--2754. Google ScholarDigital Library
- J. L. Iribarren and E. Moro. 2009. Impact of human activity patterns on the dynamics of information diffusion. Physical Review Letters 103, 038702.Google ScholarCross Ref
- L. B. Jabeur, L. Tamine, and M. Boughanem. 2012. Active microbloggers: Identifying influencers, leaders and discussers in microblogging networks. In String Processing and Information Retrieval. Springer, 111--117. Google ScholarDigital Library
- A. Java, P. Kolari, T. Finin, and T. Oates. 2006. Modeling the spread of influence on the blogosphere. In Proceedings of the 15th International World Wide Web Conference. 22--26.Google Scholar
- J. Jiang, C. Wilson, X. Wang, W. Sha, P. Huang, Y. Dai, and B. Y. Zhao. 2013. Understanding latent interactions in online social networks. ACM Transactions on the Web 7, 18. Google ScholarDigital Library
- Q. Jiang, G. Song, C. Gao, Y. Wang, W. Si, and K. Xie. 2011. Simulated annealing based influence maximization in social networks. In 25th AAAI Conference on Artificial Intelligence, 2011. Google ScholarDigital Library
- P. S. Jothi, M. Neelamalar, and R. S. Prasad. 2011. Analysis of social networking sites: A study on effective communication strategy in developing brand communication. Journal of Media and Communication Studies 3, 234.Google Scholar
- G. Katsimpras, D. Vogiatzis, and G. Paliouras. Determining Influential users with supervised random walks. Proceedings of the 24th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 787--792. Google ScholarDigital Library
- E. Katz and P. F. Lazarsfeld. 1955. Personal Influence, The Part Played by People in the Flow of Mass Communications. Transaction Publishers, Piscataway, NJ.Google Scholar
- L. Katz. 1953. A new status index derived from sociometric analysis. Psychometrika 18, 39--43.Google ScholarCross Ref
- D. Kempe, J. Kleinberg, and É. Tardos. 2003. Maximizing the spread of influence through a social network. Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 137--146. Google ScholarDigital Library
- M. S. Khan, A. W. A. Wahab, T. Herawan, G. Mujtaba, S. Danjuma, and M. A. AL-Garadi. 2016a. Virtual community detection through the association between prime nodes in online social networks and its application to ranking algorithms. IEEE Access 4, 9614--9624.Google ScholarCross Ref
- M. U. S. Khan, M. Ali, A. Abbas, S. Khan, and A. Zomaya. 2016b. Segregating spammers and unsolicited bloggers from genuine experts on Twitter. IEEE Transactions on Dependable and Secure Computing.Google ScholarCross Ref
- E. S. Kim and S. S. Han. 2009. An analytical way to find influencers on social networks and validate their effects in disseminating social games. International Conference on Advances in Social Network Analysis and Mining (ASONAM'09). IEEE, 41--46. Google ScholarDigital Library
- J. Kim, S.-K. Kim, and H. Yu. 2013. Scalable and parallelizable processing of influence maximization for large-scale social networks? IEEE 29th International Conference on Data Engineering (ICDE’13). IEEE, 266--277. Google ScholarDigital Library
- M. Kitsak, L. K. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. E. Stanley, and H. A. Makse. 2010. Identification of influential spreaders in complex networks. Nature Physics 6, 888--893.Google ScholarCross Ref
- C. Kohlschütter, P.-A. Chirita, and W. Nejdl. 2006. Efficient parallel computation of PageRank. ECIR, 2006. Springer, 241--252. Google ScholarDigital Library
- G. E. Kreindler and H. P. Young. 2014. Rapid innovation diffusion in social networks. Proceedings of the National Academy of Sciences 111, 10881--10888.Google ScholarCross Ref
- F. Krzakala, C. Moore, E. Mossel, J. Neeman, A. Sly, L. Zdeborová, and P. Zhang. 2013. Spectral redemption in clustering sparse networks. Proceedings of the National Academy of Sciences 110, 20935--20940.Google ScholarCross Ref
- S. Kulviwat, G. C. Bruner, and O. AL-Shuridah. 2009. The role of social influence on adoption of high tech innovations: The moderating effect of public/private consumption. Journal of Business Research 62, 706--712.Google ScholarCross Ref
- H. Kwak, C. Lee, H. Park, and S. Moon. 2010. What is Twitter, a social network or a news media? In Proceedings of the 19th International Conference on World Wide Web. ACM, 591--600. Google ScholarDigital Library
- S. Kwon, M. Cha, K. Jung, W. Chen, and Y. Wang. 2013. Prominent features of rumor propagation in online social media. In IEEE 13th International Conference on Data Mining (ICDM’13). IEEE, 1103--1108.Google Scholar
- G. Lawyer. 2015. Understanding the influence of all nodes in a network. Scientific Reports 5, 8665.Google ScholarCross Ref
- K. Lerman and R. Ghosh. 2010. Information contagion: An empirical study of the spread of news on digg and Twitter social networks. ICWSM 10, 90--97.Google Scholar
- J. Leskovec, L. A. Adamic, and B. A. Huberman. 2007a. The dynamics of viral marketing. ACM Transactions on the Web 1, 5. Google ScholarDigital Library
- J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. Vanbriesen, and N. Glance. 2007b. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 420--429. Google ScholarDigital Library
- J. Letierce, A. Passant, J. Breslin, and S. Decker. 2010. Understanding how Twitter is used to spread scientific messages. In Proceedings of the Web Science Conference (WebSci10): Extending the Frontiers of Society On-Line. Raleigh, NC, USA.Google Scholar
- H. Li, S. S. Bhowmick, A. Sun, and J. Cui. 2015a. Conformity-aware influence maximization in online social networks. The VLDB Journal—The International Journal on Very Large Data Bases 24, 117--141. Google ScholarDigital Library
- H. Li, J.-T. Cui, and J.-F. Ma. 2015b. Social influence study in online networks: A three-level review. Journal of Computer Science and Technology 30, 184--199.Google ScholarCross Ref
- Q. Li, T. Zhou, L. Lü, and D. Chen. 2014. Identifying influential spreaders by weighted LeaderRank. Physica A: Statistical Mechanics and its Applications 404, 47--55.Google Scholar
- H. Liao, M. S. Mariani, M. Medo, Y.-C. Zhang, and M.-Y. Zhou. 2017. Ranking in evolving complex networks. Physics Reports 689 (2017) 1–54.Google ScholarCross Ref
- D. Liu and X. Chen. Rumor propagation in online social networks like Twitter--a simulation study. In 3rd International Conference on Multimedia Information Networking and Security (MINES’11). IEEE, 278--282. Google ScholarDigital Library
- J.-G. Liu, Z.-M. Ren, and Q. Guo. 2013. Ranking the spreading influence in complex networks. Physica A: Statistical Mechanics and its Applications, 392, 4154--4159.Google Scholar
- N. Liu, L. Li, G. XU, and Z. Yang. 2014. Identifying domain-dependent influential microblog users: A post-feature based approach. In 28th AAAI Conference on Artificial Intelligence, 2014. Google ScholarDigital Library
- Y.-Y. Liu, J.-J. Slotine, and A.-L. Barabási. 2011. Controllability of complex networks. Nature 473, 167--173.Google ScholarCross Ref
- Y. Liu, M. Tang, T. Zhou, and Y. Do. 2015a. Core-like groups result in invalidation of identifying super-spreader by k-shell decomposition. Scientific Reports 5, 9602.Google ScholarCross Ref
- Y. Liu, M. Tang, T. Zhou, and Y. Do. 2015b. Improving the accuracy of the k-shell method by removing redundant links-from a perspective of spreading dynamics. ArXiv Preprint ArXiv:1505.07354.Google Scholar
- L. Lü, D. Chen, X.-L. Ren, Q.-M. Zhang, Y.-C. Zhang, and T. Zhou. 2016. Vital nodes identification in complex networks. Physics Reports 650, 1--63.Google ScholarCross Ref
- L. Lü, Y.-C. Zhang, C. H. Yeung, and T. Zhou. 2011. Leaders in social networks, the delicious case. PloS One 6, e21202.Google ScholarCross Ref
- D. D. Luxton, J. D. June, and J. M. Fairall. 2012. Social media and suicide: A public health perspective. American Journal of Public Health 102, S195--S200.Google ScholarCross Ref
- S. Ma, G. Chen, L. Fu, W. Wu, X. Tian, J. Zhao, and X. Wang. 2017. Seeking powerful information initial spreaders in online social networks: A dense group perspective. Wireless Networks 1--19.Google Scholar
- M. S. Mariani, M. Medo, and Y.-C. Zhang. 2015. Ranking nodes in growing networks: When PageRank fails. Scientific Reports 5, 16181.Google ScholarCross Ref
- Y. Mei, Y. Zhong, and J. Yang. Finding and analyzing principal features for measuring user influence on Twitter. In IEEE 1st International Conference on Big Data Computing Service and Applications (BigDataService’15). IEEE, 478--486. Google ScholarDigital Library
- F. Mishna, C. Cook, T. Gadalla, J. Daciuk, and S. Solomon. 2010. Cyber bullying behaviors among middle and high school students. American Journal of Orthopsychiatry 80, 362--374.Google ScholarCross Ref
- A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. 2007. Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. ACM, 29--42. Google ScholarDigital Library
- F. Morone and H. A. Makse. 2015. Influence maximization in complex networks through optimal percolation. Nature 524, 65--68.Google ScholarCross Ref
- F. Morone, B. Min, L. Bo, R. Mari, and H. A. Makse. 2016. Collective Influence algorithm to find influencers via optimal percolation in massively large social media. Scientific Reports 6, 30062.Google ScholarCross Ref
- L. Muchnik, S. Pei, L. C. Parra, S. D. Reis, J. S. Andrade Jr., S. Havlin, and H. A. Makse. 2013. Origins of power-law degree distribution in the heterogeneity of human activity in social networks. Scientific Reports 3, 1783.Google ScholarCross Ref
- T. Nepusz and T. Vicsek. 2012. Controlling edge dynamics in complex networks. Nature Physics 8, 568--573.Google ScholarCross Ref
- T. H. Nguyen and B. K. Szymanski. 2013. Social ranking techniques for the web. In IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’13). IEEE, 49--55. Google ScholarDigital Library
- R. Pastor-Satorras and A. Vespignani. 2001. Epidemic spreading in scale-free networks. Physical Review Letters 86, 3200.Google ScholarCross Ref
- R. Pastor-Satorras and A. Vespignani. 2002. Immunization of complex networks. Physical Review E 65, 036104.Google ScholarCross Ref
- S. Pei and H. A. Makse. 2013. Spreading dynamics in complex networks. Journal of Statistical Mechanics: Theory and Experiment, 2013, P12002.Google ScholarCross Ref
- S. Pei, L. Muchnik, J. S. Andrade Jr., Z. Zheng, and H. A. Makse. 2014. Searching for superspreaders of information in real-world social media. Scientific Reports, 4, 5547.Google ScholarCross Ref
- S. Pei, L. Muchnik, S. Tang, Z. Zheng, and H. A. Makse. 2015. Exploring the complex pattern of information spreading in online blog communities.Google Scholar
- F. Probst, D.-K. L. Grosswiele, and D.-K. R. Pfleger. 2013. Who will lead and who will follow: Identifying Influential users in online social networks. Business 8 Information Systems Engineering 5, 179--193.Google Scholar
- S. Räbiger and M. Spiliopoulou. 2015. A framework for validating the merit of properties that predict the influence of a Twitter user. Expert Systems with Applications 42, 2824--2834. Google ScholarDigital Library
- F. Radicchi. 2011. Who is the best player ever? A complex network analysis of the history of professional tennis. PloS One 6, e17249.Google ScholarCross Ref
- F. Radicchi and C. Castellano. 2016. Leveraging percolation theory to single out influential spreaders in networks. Physical Review E 93, 062314.Google ScholarCross Ref
- J. Ratkiewicz, M. Conover, M. Meiss, B. Gonçalves, A. Flammini, and F. Menczer. 2011. Detecting and tracking political abuse in social media. In ICWSM.Google Scholar
- M. Richardson and P. Domingos. 2002. Mining knowledge-sharing sites for viral marketing. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 61--70. Google ScholarDigital Library
- F. Riquelme and P. González-cantergiani. 2016. Measuring user influence on Twitter: A survey. Information Processing 8 Management, 52, 949--975. Google ScholarDigital Library
- D. M. Romero, W. Galuba, S. Asur, and B. A. Huberman. 2011. Influence and passivity in social media. In Proceedings of the 20th International Conference Companion on World Wide Web. ACM, 113--114. Google ScholarDigital Library
- K. Saito, M. Kimura, K. Ohara, and H. Motoda. 2012. Efficient discovery of influential nodes for SIS models in social networks. Knowledge and Information Systems 30, 613--635.Google ScholarDigital Library
- T. Sakaki, M. Okazaki, and Y. Matsuo. 2010. Earthquake shakes Twitter users: Real-time event detection by social sensors. Proceedings of the 19th International Conference on World Wide Web. ACM, 851--860. Google ScholarDigital Library
- X. T. Sen Pei, J. Shaman, F. Morone, and H. A. Makse. 2017. Efficient collective influence maximization in cascading processes with first-order transitions. Scientific Reports 7, 45240.Google ScholarCross Ref
- A. Sheikhahmadi and M. A. Nematbakhsh. 2017. Identification of multi-spreader users in social networks for viral marketing. Journal of Information Science 43, 412--423.Google ScholarDigital Library
- A. Silva, S. Guimarães, W. Meira Jr., and M. Zaki. 2013. ProfileRank: Finding relevant content and influential users based on information diffusion. In Proceedings of the 7th Workshop on Social Network Mining and Analysis. ACM, 2. Google ScholarDigital Library
- P. Singh, S. Sreenivasan, B. K. Szymanski, and G. Korniss. 2013. Threshold-limited spreading in social networks with multiple initiators. Scientific Reports 3, 2330.Google ScholarCross Ref
- X. Song, Y. Chi, K. Hino, and B.Tseng. 2007a. Identifying opinion leaders in the blogosphere. In Proceedings of the 16th ACM Conference on Conference on Information and Knowledge Management. ACM, 971--974. Google ScholarDigital Library
- X. Song, Y. Chi, K. Hino, and B. L. Tseng. 2007b. Information flow modeling based on diffusion rate for prediction and ranking. Proceedings of the 16th International Conference on World Wide Web. ACM, 191--200. Google ScholarDigital Library
- X. Song, B. L. Tseng, C.-Y. Lin, and M.-T. Sun. 2006. Personalized recommendation driven by information flow. In Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, 509--516. Google ScholarDigital Library
- S. Stieglitz and L. Dang-Xuan. 2013. Social media and political communication: A social media analytics framework. Social Network Analysis and Mining 3, 1277--1291.Google ScholarCross Ref
- S. H. Strogatz. 2001. Exploring complex networks. Nature 410, 268--276.Google ScholarCross Ref
- M. R. Subramani and B. Rajagopalan. 2003. Knowledge-sharing and influence in online social networks via viral marketing. Communications of the ACM 46, 300--307. Google ScholarDigital Library
- H. Sueki. 2015. The association of suicide-related Twitter use with suicidal behaviour: A cross-sectional study of young Internet users in Japan. Journal of Affective Disorders 170, 155--160.Google ScholarCross Ref
- Q. Sun, N. Wang, Y. Zhou, and Z. Luo. 2016. Identification of influential online social network users based on multi-features. International Journal of Pattern Recognition and Artificial Intelligence 30, 1659015.Google ScholarCross Ref
- C. W. Tan, P.-D. Yu, C.-K. Lai, W. Zhang, and H.-L. Fu. 2016. Optimal detection of influential spreaders in online social networks. In Annual Conference on Information Science and Systems (CISS’16). IEEE, 145--150.Google ScholarCross Ref
- X. Tang and C. C. Yang. 2012. Ranking user influence in healthcare social media. ACM Transactions on Intelligent Systems and Technology 3, 73. Google ScholarDigital Library
- X. Teng, S. Pei, F. Morone, and H. A. Makse. 2016. Collective influence of multiple spreaders evaluated by tracing real information flow in large-scale social networks. Scientific Reports 6, 36043.Google ScholarCross Ref
- D. Tunkelang. 2009. A Twitter analog to PageRank. Retrieved December 7, 2017 from http://thenoisychannel.com/2009/01/13/a-twitter-analog-to-PageRank.Google Scholar
- T. W. Valente. 1995. Network Models of the Diffusion of Innovations. Hampton Press, Cresskill, NJ.Google Scholar
- W. Vollenbroek, S. De Vries, E. Constantinides, and P. Kommers. 2014. Identification of influence in social media communities. International Journal of Web Based Communities 4, 10, 280--297. Google ScholarDigital Library
- Y. Wang, G. Cong, G. Song, and K. Xie. 2010. Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 1039--1048. Google ScholarDigital Library
- D. J. Watts and P. S. Dodds. 2007. Influentials, networks, and public opinion formation. Journal of Consumer Research 34, 441--458.Google ScholarCross Ref
- D. J. Watts, J. Peretti, and M. Frumin. 2007. Viral Marketing For The Real World. Harvard Business Publishing, Brighton, MA.Google Scholar
- B. Wei, J. Liu, D. Wei, C. Gao, and Y. Deng. 2015. Weighted k-shell decomposition for complex networks based on potential edge weights. Physica A: Statistical Mechanics and its Applications 420, 277--283.Google Scholar
- T. Weinberg. 2009. The New Community Rules: Marketing on the Social Web. O'Reilly Media, Sebastopol, CA. Google ScholarDigital Library
- S. Wen, J. Jiang, Y. Xiang, S. Yu, W. Zhou, and W. Jia. 2014. To shut them up or to clarify: Restraining the spread of rumors in online social networks. IEEE Transactions on Parallel and Distributed Systems 25, 3306--3316.Google ScholarCross Ref
- J. Weng, E.-P. Lim, J. Jiang, and Q. He. 2010. TwitterRank: Finding topic-sensitive influential twitterers. Proceedings of the 3rd ACM International Conference on Web Search and Data Mining. ACM, 261--270. Google ScholarDigital Library
- F. Wu, B. A. Huberman, L. A. Adamic, and J. R. Tyler. 2004. Information flow in social groups. Physica A: Statistical Mechanics and its Applications, 337, 327--335.Google Scholar
- Y. Xia, X. Ren, Z. Peng, J. Zhang, and L. She. 2016. Effectively identifying the influential spreaders in large-scale social networks. Multimedia Tools Applications 75, 8829--8841. Google ScholarDigital Library
- R. Xiang, J. Neville, and M. Rogati. 2010. Modeling relationship strength in online social networks. In Proceedings of the 19th International Conference on World Wide Web. ACM, 981--990. Google ScholarDigital Library
- C. Xiao, Y. Zhang, X. Zeng and Y. Wu. 2013. Predicting user influence in social media. Journal of Networks 8, 2649--2655.Google ScholarCross Ref
- Y. Yamaguchi, T. Takahashi, T. Amagasa, and H. Kitagawa. 2010. Turank: Twitter user ranking based on user-tweet graph analysis. In Web Information Systems Engineering (WISE’10). Springer. Google ScholarDigital Library
- G. Yan, G. Chen, S. Eidenbenz, and N. Li. 2011. Malware propagation in online social networks: nature, dynamics, and defense implications. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM, 196--206. Google ScholarDigital Library
- L. Yang, Y. Qiao, Z. Liu, J. Ma, and X. Li. 2016. Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm. Soft Computing 1--12. Google ScholarDigital Library
- W. Yang, H. Wang, and Y. Yao. 2015. An immunization strategy for social network worms based on network vertex influence. Communications, China 12, 154--166.Google ScholarCross Ref
- D. Yates and S. Paquette. 2011. Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake. International Journal of Information Management 31, 6--13. Google ScholarDigital Library
- S. Ye, J. Lang, and F. Wu. 2010. Crawling online social graphs. In 12th International Asia-Pacific Web Conference (APWEB’10). IEEE, 236--242. Google ScholarDigital Library
- J. Yin, A. Lampert, M. Cameron, B. Robinson, and R. Power. 2012. Using social media to enhance emergency situation awareness. IEEE Intelligent Systems 27, 52--59. Google ScholarDigital Library
- Z. Yin and Y. Zhang. 2012. Measuring pair-wise social influence in microblog. In International Conference on Privacy, Security, Risk and Trust (PASSAT’12) and International Conference on Social Computing (SocialCom’12). IEEE, 502--507. Google ScholarDigital Library
- M. Zanin, D. Papo, P. A. Sousa, E. Menasalvas, A. Nicchi, E. Kubik, and S. Boccaletti. 2016. Combining complex networks and data mining: why and how. Physics Reports 635, 1--44.Google ScholarCross Ref
- A. Zeng and C.-J. Zhang. 2013. Ranking spreaders by decomposing complex networks. Physics Letters A 377, 1031--1035.Google ScholarCross Ref
- Z.-K. Zhang, C. Liu, X.-X. Zhan, X. Lu, C.-X. Zhang, and Y.-C. Zhang. 2016. Dynamics of information diffusion and its applications on complex networks. Physics Reports 651, 1--34.Google ScholarCross Ref
- K. Zhao, G. E. Greer, J. Yen, P. Mitra, and K. Portier. 2014a. Leader identification in an online health community for cancer survivors: a social network-based classification approach. Information Systems and e-Business Management 1--17. Google ScholarDigital Library
- K. Zhao, J. Yen, G. Greer, B. Qiu, P. Mitra, and K. Portier. 2014b. Finding influential users of online health communities: A new metric based on sentiment influence. Journal of the American Medical Informatics Association 21, e212--e218.Google ScholarCross Ref
- L. Zhao, Q. Wang, J. Cheng, Y. Chen, J. Wang, and W. Huang. 2011. Rumor spreading model with consideration of forgetting mechanism: A case of online blogging LiveJournal. Physica A: Statistical Mechanics and its Applications 390, 2619--2625.Google Scholar
- H. Zhu, C. Huang, and H. Li. 2014. MPPM: Malware propagation and prevention model in online SNS. In IEEE International Conference on Communications Workshops (ICC’14). IEEE, 682--687.Google Scholar
- Z. Zhu. 2013. Discovering the influential users oriented to viral marketing based on online social networks. Physica A: Statistical Mechanics and its Applications 392, 3459--3469.Google Scholar
- K. Zhuang, H. Shen, and H. Zhang. 2017. User spread influence measurement in microblog. Multimedia Tools and Applications 76, 3169--3185. Google ScholarDigital Library
- C. C. Zou, D. Towsley, and W. Gong. 2007. Modeling and simulation study of the propagation and defense of Internet e-mail worms. IEEE Transactions on Dependable and Secure Computing 4, 105--118. Google ScholarDigital Library
Index Terms
- Analysis of Online Social Network Connections for Identification of Influential Users: Survey and Open Research Issues
Recommendations
Finding influential users in social networks based on novel features & link-based analysis
The social web appears to enrich human lives by providing effective applications for online social interactions. Microblogs are one of the most important applications of the social Web. The Microbloggers who influence the social community users through ...
Use of FP-Growth Algorithm in Identifying Influential Users on Twitter Hashtags
ICCDA '20: Proceedings of the 2020 4th International Conference on Compute and Data AnalysisDue to the spread of technology and World Wide Web, Online Social media invaded every home in the world; hence, the analysis of such networks became an important, yet challenging, case of study for researchers. One of the most interesting fields of ...
Uses and gratifications of social networking sites for bridging and bonding social capital
Applying uses and gratifications theory (UGT) and social capital theory, our study examined users of four social networking sites (SNSs) (Facebook, Twitter, Instagram, and Snapchat), and their influence on online bridging and bonding social capital. ...
Comments