Temporal dynamics and impact of event interactions in cyber-social populations

被引:29
|
作者
Zhang, Yi-Qing [1 ]
Li, Xiang [1 ]
机构
[1] Fudan Univ, Dept Elect Engn, Adapt Networks & Control Lab, Shanghai 200433, Peoples R China
基金
高等学校博士学科点专项科研基金;
关键词
COMPLEX NETWORKS; HEAVY TAILS; ROBUSTNESS;
D O I
10.1063/1.4793540
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
The advance of information technologies provides powerful measures to digitize social interactions and facilitate quantitative investigations. To explore large-scale indoor interactions of a social population, we analyze 18 715 users' Wi-Fi access logs recorded in a Chinese university campus during 3 months, and define event interaction (EI) to characterize the concurrent interactions of multiple users inferred by their geographic coincidences-co-locating in the same small region at the same time. We propose three rules to construct a transmission graph, which depicts the topological and temporal features of event interactions. The vertex dynamics of transmission graph tells that the active durations of EIs fall into the truncated power-law distributions, which is independent on the number of involved individuals. The edge dynamics of transmission graph reports that the transmission durations present a truncated power-law pattern independent on the daily and weekly periodicities. Besides, in the aggregated transmission graph, low-degree vertices previously neglected in the aggregated static networks may participate in the large-degree EIs, which is verified by three data sets covering different sizes of social populations with various rendezvouses. This work highlights the temporal significance of event interactions in cyber-social populations. (C) 2013 American Institute of Physics. [http://dx.doi.org/10.1063/1.4793540]
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Information entropy based event detection during disaster in cyber-social networks
    Bhuvaneswari, A.
    Valliyammai, C.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (05) : 3981 - 3992
  • [2] Behavioural Profiling in Cyber-Social Systems
    Perno, Jason
    Probst, Christian W.
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 507 - 517
  • [3] Moral Cyber-Social Computing for State and University
    Hacimahmud, Abdullayev Vugar
    Mishchenko, Oleksandr
    Hahanov, Vladimir
    Soklakova, Tetiana
    2017 IEEE EAST-WEST DESIGN & TEST SYMPOSIUM (EWDTS), 2017,
  • [4] Cyber-Social Systems: Modeling, Inference, and Optimal Design
    Doostmohammadian, Mohammadreza
    Rabiee, Hamid R.
    Khan, Usman A.
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 73 - 83
  • [5] Spread of Information With Confirmation Bias in Cyber-Social Networks
    Mao, Yanbing
    Bolouki, Sadegh
    Akyol, Emrah
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (02): : 688 - 700
  • [6] An improved localization method in cyber-social environments with obstacles
    Gao, Zhigang
    Guo, Hongyi
    Xie, Yunfeng
    Lu, Huijuan
    Zhang, Jianhui
    Diao, Wenjie
    Xu, Ruichao
    COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86
  • [7] On Inference of Network Topology and Confirmation Bias in Cyber-Social Networks
    Mao, Yanbing
    Akyol, Emrah
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2020, 6 (06): : 633 - 644
  • [8] The influence of the cyber-social environment on fear of victimization: Cyberbullying and school
    Ryan Randa
    Security Journal, 2013, 26 : 331 - 348
  • [9] The influence of the cyber-social environment on fear of victimization: Cyberbullying and school
    Randa, Ryan
    SECURITY JOURNAL, 2013, 26 (04) : 331 - 348
  • [10] Artificial intelligence in the long view: from mechanical intelligence to cyber-social systems
    Cope B.
    Kalantzis M.
    Discover Artificial Intelligence, 2022, 2 (01):