User role identification based on social behavior and networking analysis for information dissemination

Abstract Nowadays, along with the high development of emerging computational paradigms, more and more populations have been involved into the social revolution across various intelligent systems, which results in dynamic user connections associated with a variety of social behaviors. The associated users with different properties, who can be regarded as one kind of information resources, have become increasingly important, especially in social knowledge creation and human intelligence utilization processes. In this study, we concentrate on user role identification based on their social connections and influential behaviors, in order to facilitate information sharing and propagation in social networking environments. Following the construction of a dynamic user networking model, we propose a network-aware method to identify four kinds of special users, who may play an important role in information delivery among a group of users, or knowledge sharing between pairs of users. A set of attributes and measures is proposed and calculated to identify and represent these users based on the analysis of their influence-related social behaviors and dynamic connections. Experiments and evaluations are conducted to demonstrate the practicability and usefulness of the proposed method using Twitter data. Analysis results show the effectiveness of our approach in identifying the distinct features of four kinds of users from the user networking model. Comparison experiments indicate that the proposed identification method outperforms two other related works. Finally, a questionnaire-based evaluation demonstrates the accuracy and efficiency of the proposed method in terms of finding these users in a real social networking environment.

[1]  Ye Na,et al.  User identification based on multiple attribute decision making in social networks , 2013, China Communications.

[2]  Yan Yu,et al.  Role analysis of social network users based on neighborhood dissemination capability , 2014, 2014 IEEE 5th International Conference on Software Engineering and Service Science.

[3]  Xin Xu,et al.  Identifying related users in Weibo platform , 2015, 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).

[4]  Aravind Srinivasan,et al.  Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random-Walk Sampling , 2014, IEEE/ACM Transactions on Networking.

[5]  Wei Chen,et al.  Diffusion of “Following” Links in Microblogging Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.

[6]  Wei Chen,et al.  Information diffusion efficiency in online social networks , 2015, 2015 IEEE International Conference on Digital Signal Processing (DSP).

[7]  Carson Kai-Sang Leung,et al.  Finding Popular Friends in Social Networks , 2012, 2012 Second International Conference on Cloud and Green Computing.

[8]  Jiming Chen,et al.  Social Discovery: Exploring the Correlation Among Three-Dimensional Social Relationships , 2015, IEEE Transactions on Computational Social Systems.

[9]  Bofeng Zhang,et al.  Friend Recommendation Based on the Similarity of Micro-blog User Model , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[10]  Pasquale De Meo,et al.  Analysis of a Heterogeneous Social Network of Humans and Cultural Objects , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[11]  Carson Kai-Sang Leung,et al.  Finding groups of friends who are significant across multiple domains in social networks , 2013, 2013 Fifth International Conference on Computational Aspects of Social Networks.

[12]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .

[13]  Hui Zhao,et al.  Group Recommendation Using Topic Identification in Social Networks , 2014, 2014 Sixth International Conference on Intelligent Human-Machine Systems and Cybernetics.

[14]  Ee-Peng Lim,et al.  Who is Retweeting the Tweeters? Modeling, Originating, and Promoting Behaviors in the Twitter Network , 2012, TMIS.

[15]  Carson Kai-Sang Leung,et al.  Finding Strong Groups of Friends among Friends in Social Networks , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[16]  Wanlei Zhou,et al.  Are the popular users always important for information dissemination in online social networks? , 2014, IEEE Network.

[17]  Ray-Guang Cheng,et al.  Modeling Information Dissemination in Generalized Social Networks , 2013, IEEE Communications Letters.

[18]  Qun Jin,et al.  User Correlation Discovery and Dynamical Profiling Based on Social Streams , 2012, AMT.

[19]  Amedapu Srinivas,et al.  Identification of influential nodes from social networks based on Enhanced Degree Centrality Measure , 2015, 2015 IEEE International Advance Computing Conference (IACC).

[20]  B. Latané The psychology of social impact. , 1981 .

[21]  Jure Leskovec,et al.  Modeling Information Diffusion in Implicit Networks , 2010, 2010 IEEE International Conference on Data Mining.

[22]  Haibin Zhu,et al.  Policy evaluation and analysis of choosing whom to tweet information on social media , 2014, 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[23]  Salvatore Marano,et al.  Multi-layer sociality in opportunistic networks: An extensive analysis of online and offline node social behaviors , 2015, 2015 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS).

[24]  Zhongjie Wang,et al.  Data Collection and Modeling of Personal Social Behaviors , 2015, 2015 International Conference on Service Science (ICSS).

[25]  Jin Xie,et al.  Make best use of social networks via more valuable friend recommendations , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[26]  J. Jackson,et al.  Social Impact Theory: A Social Forces Model of Influence , 1987 .

[27]  Hua Lu,et al.  Finding top-k local users in geo-tagged social media data , 2015, 2015 IEEE 31st International Conference on Data Engineering.

[28]  M. McPherson,et al.  Birds of a Feather: Homophily in Social Networks , 2001 .

[29]  Sushil Jajodia,et al.  Profiling Online Social Behaviors for Compromised Account Detection , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Aravind Srinivasan,et al.  Your friends have more friends than you do: identifying influential mobile users through random walks , 2012, MobiHoc '12.

[31]  Edward Y. Chang,et al.  AdHeat: an influence-based diffusion model for propagating hints to match ads , 2010, WWW '10.

[32]  Wei Wang,et al.  Multi-dimensional attributes and measures for dynamical user profiling in social networking environments , 2014, Multimedia Tools and Applications.

[33]  M. Shamim Hossain,et al.  Relational User Attribute Inference in Social Media , 2015, IEEE Transactions on Multimedia.

[34]  Wen-Hai Chih,et al.  Investigating the ripple effect in virtual communities: An example of Facebook Fan Pages , 2015, Comput. Hum. Behav..

[35]  Xu Yan,et al.  Friend recommendation of microblog in classification framework: Using multiple social behavior features , 2014, 2014 International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC2014).

[36]  Jiming Hu,et al.  Mechanism of information dissemination under socialization networking environment , 2013, Proceedings of 2013 IEEE International Conference on Service Operations and Logistics, and Informatics.

[37]  Sibel Adali,et al.  Predicting Personality with Social Behavior , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[38]  Ling Liu,et al.  Probabilistic Diffusion of Social Influence with Incentives , 2014, IEEE Transactions on Services Computing.

[39]  Barry Smyth,et al.  Uncovering Measurements of Social and Demographic Behavior From Smartphone Location Data , 2013, IEEE Transactions on Human-Machine Systems.