Competitive Information Diffusion Model in Social Network with Negative Information Propagation

Social networks can be used to exchange effectively information among people. But some networks also became the channels for spreading of information competing against to the information being diffused in network. In fact, when people adopted a positively recommend then one may have a high probability to refuse the recommend with a presence of a reasonable negative comment. Such exchanges make modeling information diffusion becomes more difficult. There are no much previous models have studied the spreading of positive and negative information flows simultaneously. In this paper, it is dealt with a proposed model for negative information diffusion in competition against a positive information flow. This problem is referred to the competitive information diffusion model or CID for short. In consideration of mechanism and realization the model, experimental case study shows some feasible contribution of the CID model.

[1]  Noga Alon,et al.  Information Processing Letters a Note on Competitive Diffusion through Social Networks , 2022 .

[2]  Khu P. Nguyen,et al.  An adaptive Latent Semantic Analysis for text mining , 2017, 2017 International Conference on System Science and Engineering (ICSSE).

[3]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[4]  Stefan M. Wild,et al.  Maximizing influence in a competitive social network: a follower's perspective , 2007, ICEC.

[5]  Yifei Yuan,et al.  Influence Maximization in Social Networks When Negative Opinions May Emerge and Propagate , 2011, SDM.

[6]  Zhong Yao,et al.  Evolutionary Game Analysis of Competitive Information Dissemination on Social Networks: An Agent-Based Computational Approach , 2015 .

[7]  G. Geethakumari,et al.  Detecting misinformation in online social networks using cognitive psychology , 2014, Human-centric Computing and Information Sciences.

[8]  My T. Thai,et al.  Monitor placement to timely detect misinformation in Online Social Networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[9]  G. Hu,et al.  The weighted logarithmic matrix norm and bounds of the matrix exponential , 2004 .

[10]  Barbara Poblete,et al.  Information credibility on twitter , 2011, WWW.

[11]  Hong Tuyet Tu,et al.  Kernel-based similarity and discovering documents of similar interests , 2017, 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD).

[12]  Michael R. Lyu,et al.  Mining social networks using heat diffusion processes for marketing candidates selection , 2008, CIKM '08.

[13]  Vincenzo Auletta,et al.  Contrasting the Spread of Misinformation in Online Social Networks , 2017, AAMAS.

[14]  T. Landauer,et al.  Indexing by Latent Semantic Analysis , 1990 .

[15]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[16]  Edward B. Royzman,et al.  Negativity Bias, Negativity Dominance, and Contagion , 2001 .