Computational Models for Social Influence Analysis

被引:1
|
作者
Tang, Jie [1 ]
Sun, Jimeng [2 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
[2] Georgia Inst Technol, Sch Computat Sci & Engn, Atlanta, GA 30332 USA
关键词
Social influence; Social network; Information diffusion; Probabilistic models;
D O I
10.1145/2567948.2577273
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social influence occurs when one's opinions, emotions, or behaviors are affected by others, intentionally or unintentionally. In this article, we survey recent research progress on social influence analysis. In particular, we first give a brief overview of related background knowledge, and then discuss what is social influence. We try to answer this question in terms of homophily and the process of influence and selection. After that, we focus on describing computational models for social influence including models for influence probability learning and influence diffusion. Finally, we discuss potential applications of social influence. Preliminaries First we introduce some basic knowledge for social network analysis, including related theories in sociology, fundamental models underlying social networks, and algorithms or measures for quantifying social influence. For social theories, we introduce social balance theory [10], social status theory [21], structural hole theory [6, 22], and two-step information flow theory [19]. For social network models, we introduce the Erdos-Renyi (ER) model 1111, Small-World model [28], and the Barabasi-Albert (BA) model [4]. For algorithms, we review several fundamental problems in graph theory and the corresponding algorithms to solve them including the Ford-Fulkerson algorithm for maximum flow in a flow network [12], the push-relabel maximum flow algorithm for finding k-densest subgraph [13], and the greedy algorithm for the set covering problem [1]. We will also go through standard measures and concepts of social networks and their connection to social influence such as centrality, clustering coefficient, closeness and betweenness. These measures are fundamental concepts about social network analysis, and are also deeply related to the importance or influence of nodes or edges in the networks. Definition and Existential Test As there is no a formal definition for social influence, we discuss its definition in terms of several related concepts such as homophily [20], conformity [8, 27], and selection. We further describe methodologies for verifying the existence of influence in various social networks. The methods include shuffle test [2] and randomization test [24]. We will give real world examples to demonstrate how the social influence behaves in different social networks. For example, Bond et al. [5] conducted a randomized controlled trial by delivering political mobilization messages to 61 million Facebook users. Their results verified the existence of social influence on political voting behavior - when one is aware that their friends have made the political votes, their likelihood to vote will significantly increase. Bakshy et al. [3] also conducted randomized controlled trials to verify the existence of social influence on customer responses to advertising in Facebook. Computational Models We now focus on describing the computational models for social influence analysis, with an emphasis on influence quantification and influence diffusion. In particular, for influence quantification, we introduce several popular methods for learning the influence probability between users. For example, Tang et al. [26] presented a Topical Affinity Propagation (TAP) approach to quantify the topic-level social influence in large networks. Goyal et al. [14] presented a method to learn the influence probabilities by counting the number of correlated social actions. Tan et a. [25] proposed a model to learn and distinguish the effects of influence, correlation, and uses' action dependency. Kutzkov et al. [18] extended influence probability learning to the stream data. They showed that the influence probabilities could be learned with one pass over the streaming data using only O(n log n) space, where n is the number of nodes in a network. For influence diffusion, we start with several state-of-the-art epidemic models such as Susceptible Infectious-Recovered (SIR) [17], Susceptible-Infectious-Susceptible (SIS), and Susceptible-Infectious-Recovered-Susceptible (SIRS). Then, we focus on the two popular influence maximization model including independent cascaded model and linear threshold model. The problem of influence maximization has been formally defined as an algorithmic problem by Domingos and Richardson [9, 23]. Kempe et al. [16] further presented the independent cascaded model and the linear threshold model, and theoretically proved the NP-hardness of the two models. They defined the problem using submodular functions, with which a natural greedy strategy could obtain a solution that is provably within (1 -1/e) of optimal solution. Chen et al. [7] further developed efficient algorithms to approximately solve the influence maximization problem. Finally we will also discuss several extensions of the basic cascaded and linear threshold models, e.g., [15, 30, 29]. Applications Finally we use several real applications as examples to further demonstrate the usefulness of social influence analysis. We empirically study social influence in more than 10 datasets including Twitter, Weibo, Flickr, Gowalla, Coauthor, Mobile, Slash-dot, Enron, Epinions, etc. We will share our experience and interesting findings when studying social influence on these data.
引用
收藏
页码:205 / 206
页数:2
相关论文
共 50 条
  • [21] Classical social processes: Attractor and computational models
    Sallach, DL
    JOURNAL OF MATHEMATICAL SOCIOLOGY, 2000, 24 (04): : 245 - 272
  • [22] Computational models for commercial advertisements in social networks
    Atdag, Samet
    Bingol, Haluk O.
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2021, 572
  • [23] Incorporating social knowledge structures into computational models
    Frolichs, Koen M. M.
    Rosenblau, Gabriela
    Korn, Christoph W.
    NATURE COMMUNICATIONS, 2022, 13 (01)
  • [24] Computational Statistical Methods for Social Network Models
    Hunter, David R.
    Krivitsky, Pavel N.
    Schweinberger, Michael
    JOURNAL OF COMPUTATIONAL AND GRAPHICAL STATISTICS, 2012, 21 (04) : 856 - 882
  • [25] Towards Analysis of Expressive Gesture in Groups of Users: Computational Models of Expressive Social Interaction
    Camurri, Antonio
    Varni, Giovanna
    Volpe, Gualtiero
    GESTURE IN EMBODIED COMMUNICATION AND HUMAN-COMPUTER INTERACTION, 2010, 5934 : 122 - 133
  • [26] Computational Experiments for Complex Social System Part II: The Evaluation of Computational Models
    Lu, Min
    Chen, Shizhan
    Xue, Xiao
    Wang, Xiao
    Zhang, Yufang
    Zhang, Yifang
    Wang, Fei-Yue
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 9 (04) : 1224 - 1236
  • [27] The application of computational models to social neuroscience: promises and pitfalls
    Charpentier, Caroline J.
    O'Doherty, John P.
    SOCIAL NEUROSCIENCE, 2018, 13 (06) : 637 - 647
  • [28] Computational Network Science: from Data to Social Models
    Kazienko, Przemyslaw
    PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON BEHAVIORAL, ECONOMIC ADVANCE IN BEHAVIORAL, ECONOMIC, SOCIOCULTURAL COMPUTING (BESC), 2017,
  • [29] Topology, computational models, and social-cognitive complexity
    Klüver, A
    Stoica, C
    COMPLEXITY, 2006, 11 (04) : 43 - 55
  • [30] Computational Models for Social Good: Beyond Bias and Representation
    Dancy, Christopher L.
    Joseph, Kenneth
    SOCIAL, CULTURAL, AND BEHAVIORAL MODELING (SBP-BRIMS 2022), 2022, 13558 : 263 - 267