Predicting Influential Users in Online Social Network Groups

2021 ◽  
Vol 15 (3) ◽  
pp. 1-50
Author(s):  
Andrea De Salve ◽  
Paolo Mori ◽  
Barbara Guidi ◽  
Laura Ricci ◽  
Roberto Di Pietro

The widespread adoption of Online Social Networks (OSNs), the ever-increasing amount of information produced by their users, and the corresponding capacity to influence markets, politics, and society, have led both industrial and academic researchers to focus on how such systems could be influenced . While previous work has mainly focused on measuring current influential users, contents, or pages on the overall OSNs, the problem of predicting influencers in OSNs has remained relatively unexplored from a research perspective. Indeed, one of the main characteristics of OSNs is the ability of users to create different groups types, as well as to join groups defined by other users, in order to share information and opinions. In this article, we formulate the Influencers Prediction problem in the context of groups created in OSNs, and we define a general framework and an effective methodology to predict which users will be able to influence the behavior of the other ones in a future time period, based on historical interactions that occurred within the group. Our contribution, while rooted in solid rationale and established analytical tools, is also supported by an extensive experimental campaign. We investigate the accuracy of the predictions collecting data concerning the interactions among about 800,000 users from 18 Facebook groups belonging to different categories (i.e., News, Education, Sport, Entertainment, and Work). The achieved results show the quality and viability of our approach. For instance, we are able to predict, on average, for each group, around a third of what an ex-post analysis will show being the 10 most influential members of that group. While our contribution is interesting on its own and—to the best of our knowledge—unique, it is worth noticing that it also paves the way for further research in this field.

Author(s):  
Qindong Sun ◽  
Nan Wang ◽  
Yadong Zhou ◽  
Zuomin Luo

The problem of discovering influential users is important to understand and analyze online social networks. The user profiles and interactions between users are significant features to evaluate the user influence. As these features are heterogeneous, it is challengeable to take all of them into a proper model for influence evaluation. In this paper, we propose a model based on personal user features and the adjacent factor to discover influential users in online social networks. Through taking the advantages of Bayesian network and chain principle of PageRank algorithm, the features of the user profiles and interactions are integratedly considered in our model. Based on real data from Sina Weibo data and multiple evaluation metrics of retweet count, tweet count, follower count, etc., the experimental results show that influential users identified by our model are more powerful than the ones identified by single indicator methods and PageRank-based methods.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ana Suárez Vázquez ◽  
Manuel Chica Serrano

PurposeThis paper aims to fill a gap in the existing literature by answering the following question: is the effect of envy on people's intention to share information the same in offline settings and on online social networks?Design/methodology/approachTwo studies demonstrate (1) how envy that results from upward social comparisons affects people's intention to share information and (2) the difference between online and offline settings.FindingsThe likelihood of sharing information susceptible of triggering envy is lower in online social networks than in an offline scenario.Research limitations/implicationsIn digital environments, feelings of envy depend on the number of social comparisons that the individual is exposed to.Practical implicationsThis research recommends (1) incorporating tools that allow online social network users to feel part of their network's successes, (2) promoting offline diffusion of information and (3) encouraging people to play an active role when using online social networks.Social implicationsBenefits can be derived from offering tools that permit receivers to take advantage of the selective self-presentation of other users. Such tools could have positive consequences for the welfare of online social network users.Originality/valueTo date, the literature has paid no attention to envy as an engine of information sharing. This aspect is especially relevant when discussing platforms whose main goal is precisely information sharing and that offer fertile ground for upward social comparisons.


2018 ◽  
Vol 52 (2) ◽  
pp. 278-290 ◽  
Author(s):  
Amin Mahmoudi ◽  
Mohd Ridzwan Yaakub ◽  
Azuraliza Abu Bakar

Purpose Users are the key players in an online social network (OSN), so the behavior of the OSN is strongly related to their behavior. User weight refers to the influence of the users on the OSN. The purpose of this paper is to propose a method to identify the user weight based on a new metric for defining the time intervals. Design/methodology/approach The behavior of an OSN changes over time, thus the user weight in the OSN is different in each time frame. Therefore, a good metric for estimating the user weight in an OSN depends on the accuracy of the metric used to define the time interval. New metric for defining the time intervals is based on the standard deviation and identifies that the user weight is based on a simple exponential smoothing model. Findings The results show that the proposed method covers the maximum behavioral changes of the OSN and is able to identify the influential users in the OSN more accurately than existing methods. Research limitations/implications In event detection, when a terrorist attack occurs as an event, knowing the influential users help us to know the leader of the attack. Knowing the influential user in each time interval based on this study can help us to detect communities which formed around these people. Finally, in marketing, this issue helps us to have a targeted advertising. Practical implications User effect is a significant issue in many OSN domain problems, such as community detection, event detection and recommender systems. Originality/value Previous studies do not give priority to the recent time intervals in identifying the relative importance of users. Thus, defining a metric to compute a time interval that covers the maximum changes in the network is a major shortcoming of earlier studies. Some experiments were conducted on six different data sets to test the performance of the proposed model in terms of the computed time intervals and user weights.


2020 ◽  
Vol 35 (1) ◽  
Author(s):  
A. Can Kurtan ◽  
Pınar Yolum

AbstractImage sharing is a service offered by many online social networks. In order to preserve privacy of images, users need to think through and specify a privacy setting for each image that they upload. This is difficult for two main reasons: first, research shows that many times users do not know their own privacy preferences, but only become aware of them over time. Second, even when users know their privacy preferences, editing these privacy settings is cumbersome and requires too much effort, interfering with the quick sharing behavior expected on an online social network. Accordingly, this paper proposes a privacy recommendation model for images using tags and an agent that implements this, namely pelte. Each user agent makes use of the privacy settings that its user have set for previous images to predict automatically the privacy setting for an image that is uploaded to be shared. When in doubt, the agent analyzes the sharing behavior of other users in the user’s network to be able to recommend to its user about what should be considered as private. Contrary to existing approaches that assume all the images are available to a centralized model, pelte is compatible to distributed environments since each agent accesses only the privacy settings of the images that the agent owner has shared or those that have been shared with the user. Our simulations on a real-life dataset shows that pelte can accurately predict privacy settings even when a user has shared a few images with others, the images have only a few tags or the user’s friends have varying privacy preferences.


2021 ◽  
Vol 9 (1) ◽  
Author(s):  
Sunyoung Park ◽  
Lasse Gerrits

AbstractAlthough migration has long been an imperative topic in social sciences, there are still needs of study on migrants’ unique and dynamic transnational identity, which heavily influences the social integration in the host society. In Online Social Network (OSN), where the contemporary migrants actively communicate and share their stories the most, different challenges against migrants’ belonging and identity and how they cope or reconcile may evidently exist. This paper aims to scrutinise how migrants are manifesting their belonging and identity via different technological types of online social networks, to understand the relations between online social networks and migrants’ multi-faceted transnational identity. The research introduces a comparative case study on an online social movement led by Koreans in Germany via their online communities, triggered by a German TV advertisement considered as stereotyping East Asians given by white supremacy’s point of view. Starting with virtual ethnography on three OSNs representing each of internet generations (Web 1.0 ~ Web 3.0), two-step Qualitative Data Analysis is carried out to examine how Korean migrants manifest their belonging and identity via their views on “who we are” and “who are others”. The analysis reveals how Korean migrants’ transnational identities differ by their expectation on the audience and the members in each online social network, which indicates that the distinctive features of the online platform may encourage or discourage them in shaping transnational identity as a group identity. The paper concludes with the two main emphases: first, current OSNs comprising different generational technologies play a significant role in understanding the migrants’ dynamic social values, and particularly, transnational identities. Second, the dynamics of migrants’ transnational identity engages diverse social and situational contexts. (keywords: transnational identity, migrants’ online social networks, stereotyping migrants, technological evolution of online social network).


2021 ◽  
Vol 15 (3) ◽  
pp. 1-33
Author(s):  
Jingjing Wang ◽  
Wenjun Jiang ◽  
Kenli Li ◽  
Keqin Li

CANDECOMP/PARAFAC (CP) decomposition is widely used in various online social network (OSN) applications. However, it is inefficient when dealing with massive and incremental data. Some incremental CP decomposition (ICP) methods have been proposed to improve the efficiency and process evolving data, by updating decomposition results according to the newly added data. The ICP methods are efficient, but inaccurate because of serious error accumulation caused by approximation in the incremental updating. To promote the wide use of ICP, we strive to reduce its cumulative errors while keeping high efficiency. We first differentiate all possible errors in ICP into two types: the cumulative reconstruction error and the prediction error. Next, we formulate two optimization problems for reducing the two errors. Then, we propose several restarting strategies to address the two problems. Finally, we test the effectiveness in three typical dynamic OSN applications. To the best of our knowledge, this is the first work on reducing the cumulative errors of the ICP methods in dynamic OSNs.


Author(s):  
Abhishek Vaish ◽  
Rajiv Krishna G. ◽  
Akshay Saxena ◽  
Dharmaprakash M. ◽  
Utkarsh Goel

The aim of this research is to propose a model through which the viral nature of an information item in an online social network can be quantified. Further, the authors propose an alternate technique for information asset valuation by accommodating virality in it which not only complements the existing valuation system, but also improves the accuracy of the results. They use a popularly available YouTube dataset to collect attributes and measure critical factors such as share-count, appreciation, user rating, controversiality, and comment rate. These variables are used with a proposed formula to obtain viral index of each video on a given date. The authors then identify a conventional and a hybrid asset valuation technique to demonstrate how virality can fit in to provide accurate results.The research demonstrates the dependency of virality on critical social network factors. With the help of a second dataset acquired, the authors determine the pattern virality of an information item takes over time.


2019 ◽  
Vol 10 ◽  
pp. 35
Author(s):  
Andrey  Rodrigues ◽  
Natasha  M. C. Valentim ◽  
Eduardo  Feitosa

In the last few years, Online Social Networks (OSN) have experienced growth in the number of users, becoming an increasingly embedded part of people’s daily lives. Privacy expectations of OSNs are higher as more members start realizing potential privacy problems they face by interacting with these systems. Inspection methods can be an effective alternative for addressing privacy problems because they detect possible defects that could be causing the system to behave in an undesirable way. Therefore, we proposed a set of privacy inspection techniques called PIT-OSN (Privacy Inspection Techniques for Online Social Network). This paper presents the description and evolution of PIT-OSN through the results of a preliminary empirical study. We discuss the quantitative and qualitative results and their impact on improving the techniques. Results indicate that our techniques assist non-expert inspectors uncover privacy problems effectively, and are considered easy to use and useful by the study participants. Finally, the qualitative analysis helped us improve some technique steps that might be unclear.


Author(s):  
Putra Wanda ◽  
Marselina Endah Hiswati ◽  
Huang J. Jie

Manual analysis for malicious prediction in Online Social Networks (OSN) is time-consuming and costly. With growing users within the environment, it becomes one of the main obstacles. Deep learning is growing algorithm that gains a big success in computer vision problem. Currently, many research communities have proposed deep learning techniques to automate security tasks, including anomalous detection, malicious link prediction, and intrusion detection in OSN. Notably, this article describes how deep learning makes the OSN security technique more intelligent for detecting malicious activity by establishing a classifier model.


Sign in / Sign up

Export Citation Format

Share Document