Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2487575.2487683acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Information cascade at group scale

Published: 11 August 2013 Publication History

Abstract

Identifying the k most influential individuals in a social network is a well-studied problem. The objective is to detect k individuals in a (social) network who will influence the maximum number of people, if they are independently convinced of adopting a new strategy (product, idea, etc). There are cases in real life, however, where we aim to instigate groups instead of individuals to trigger network diffusion. Such cases abound, e.g., billboards, TV commercials and newspaper ads are utilized extensively to boost the popularity and raise awareness.
In this paper, we generalize the "influential nodes" problem. Namely we are interested to locate the most "influential groups" in a network. As the first paper to address this problem: we (1) propose a fine-grained model of information diffusion for the group-based problem, (2) show that the process is submodular and present an algorithm to determine the influential groups under this model (with a precise approximation bound), (3) propose a coarse-grained model that inspects the network at group level (not individuals) significantly speeding up calculations for large networks, (4) show that the diffusion function we design here is submodular in general case, and propose an approximation algorithm for this coarse-grained model, and finally by conducting experiments on real datasets, (5) demonstrate that seeding members of selected groups to be the first adopters can broaden diffusion (when compared to the influential individuals case). Moreover, we can identify these influential groups much faster (up to 12 million times speedup), delivering a practical solution to this problem.

References

[1]
http://www.facebook.com/help/199554316755501/.
[2]
Average email click-through rate. http://bluesite.lyris.com/blog/85-Average-Email-Click-Through-Rate.
[3]
O. Ben-Zwi, D. Hermelin, D. Lokshtanov, and I. Newman. An exact almost optimal algorithm for target set selection in social networks. In ACM Conf. on Electronic Commerce, pages 355--362, 2009.
[4]
L. Blume, D. Easley, J. Kleinberg, R. Kleinberg, and E. Tardos. Which networks are least susceptible to cascading failures. In IEEE symposium on Foundations of Computer Science, 2011.
[5]
L. E. Blume. The statistical mechanics of strategic interaction. Games and Economic Behavior, 5:387--424, 1993.
[6]
W. Chen, C. Wang, and Y. Wang. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In Proc. Intl. Conf. on Knowledge Discovery and Data Mining, pages 1029--1038, 2010.
[7]
W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In Proc. Intl. Conf. on Knowledge Discovery and Data Mining, pages 199--208, 2009.
[8]
N. A. Christakis and J. H. Fowler. Connected: The Surprising Power of Our Social Networks and How They Shape Our Lives. Back Bay Books, USA, 2009.
[9]
P. Dodds and D. Watts. Universal behavior in a generalized model of contagion. Physical Review Letters, 92(21):218701, 2004.
[10]
P. Domingos and M. Richardson. Mining the network value of customers. In Proc. Intl. Conf. on Knowledge Discovery and Data Mining, pages 57--66, 2001.
[11]
D. Easley and J. Kleinberg. Networks, Crowds, and Markets: Reasoning About a Highly Connected World, chapter 19. Cambridge University Press, USA, 2010.
[12]
M. Eftekhar, Y. Ganjali, and N. Koudas. Information cascade at group scale. Technical Report http://www.cs.toronto.edu/~milad/paper/GDA.pdf.
[13]
G. Ellison. Learning, local interaction, and coordination. Econometrica, 61(5):1047--1071, 1993.
[14]
Gaebler Ventures. Business Advertising. http://www.gaebler.com/Business-Advertising.htm.
[15]
M. Gomez Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence. In Proc. Intl. Conf. on Knowledge Discovery and Data Mining, pages 1019--1028, 2010.
[16]
M. Granovetter. Threshold models of collective behavior. American Journal of Sociology, 83(6):1420--1443, 1978.
[17]
D. Gruhl, R. Guha, D. Liben-Nowell, and A. Tomkins. Information diffusion through blogspace. In Proc. Intl. World Wide Web Conf., 2004.
[18]
S. Guha, R. Rastogi, and K. Shim. Rock: A robust clustering algorithm for categorical attributes. In Proc. Intl. Conf. on Data Engineering, pages 512--521, 1999.
[19]
J. Hartline, V. S. Mirrokni, and M. Sundararajan. Optimal marketing strategies over social networks. In Proc. Intl. World Wide Web Conf., pages 189--198, 2008.
[20]
D. Iacobucci. Networks in marketing. pages 50--59. Sage, USA, 1996.
[21]
N. Immorlica, J. Kleinberg, M. Mahdian, and T. Wexler. The role of compatibility in the difiusion of technologies through social networks. In Proc. ACM Conf. on Electronic Commerce, pages 75--83, 2007.
[22]
A. Johnson. What's the average cpm for an online publisher? Kikabink News, Internet Marketing News and Comment, November 2010.
[23]
D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence in a social network. In Proc. Intl. Conf. on Knowledge Discovery and Data Mining, pages 137--146, 2003.
[24]
R. Kumar, J. Novak, P. Raghavan, and A. Tomkins. Structure and evolution of blogspace. Communications of the ACM- The Blogosphere, 47(12), December 2004.
[25]
J. Leskovec, D. Huttenlocher, and J. Kleinberg. Predicting positive and negative links in online social networks. In Proc. Intl. World Wide Web Conf., pages 641--650, 2010.
[26]
J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. In Proc. Intl. Conf. on Knowledge Discovery and Data Mining, pages 420--429, 2007.
[27]
L. Liu, J. Tang, J. Han, M. Jiang, and S. Yang. Mining topic-level influence in heterogeneous networks. In Proc. Intl. Conf. on Information and Knowledge Management, 2010.
[28]
G. Nemhauser, L. Wolsey, and M. Fisher. An analysis of the approximations for maximizing submodular set functions. Mathematical Programming, Springer Berlin, 14:265--294, 1978.
[29]
M. Newman. The structure of scientific collaboration networks. National Academy of Sciences of the United States of America, 98(2):404, 2001.
[30]
N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani. Algorithmic Game Theory, chapter 24. Cambridge University Press, USA, 2007.
[31]
M. Richardson and P. Domingos. Mining knowledge-sharing sites for viral marketing. In Proc. Intl. Conf. on Knowledge Discovery and Data Mining, pages 61--70, 2002.
[32]
E. M. Rogers. Diffusion of Innovations. New York: Free Press, USA, 1983.
[33]
A. Stern. 8 ways to improve your click-through rate. iMedia Connection, February 2010.
[34]
G. Ver Steeg and A. Galstyan. Information transfer in social media. In Proc. Intl. Conf. on World Wide Web, pages 509--518, 2012.
[35]
S. Wasserman and K. Gaust. Social Network Analysis. Cambridge University Press, 1994.

Cited By

View all
  • (2024)Audience selection for maximizing social influenceNetwork Science10.1017/nws.2023.23(1-23)Online publication date: 12-Jan-2024
  • (2023)Community-Based Influence Maximization Using Network Embedding in Dynamic Heterogeneous Social NetworksACM Transactions on Knowledge Discovery from Data10.1145/359454417:8(1-21)Online publication date: 28-Jun-2023
  • (2023)Multi-view Graph Representation Learning Beyond HomophilyACM Transactions on Knowledge Discovery from Data10.1145/359285817:8(1-21)Online publication date: 28-Jun-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
KDD '13: Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
August 2013
1534 pages
ISBN:9781450321747
DOI:10.1145/2487575
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 August 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. group diffusion
  2. influential groups
  3. information cascade
  4. social networks

Qualifiers

  • Research-article

Conference

KDD' 13
Sponsor:

Acceptance Rates

KDD '13 Paper Acceptance Rate 125 of 726 submissions, 17%;
Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)7
Reflects downloads up to 23 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Audience selection for maximizing social influenceNetwork Science10.1017/nws.2023.23(1-23)Online publication date: 12-Jan-2024
  • (2023)Community-Based Influence Maximization Using Network Embedding in Dynamic Heterogeneous Social NetworksACM Transactions on Knowledge Discovery from Data10.1145/359454417:8(1-21)Online publication date: 28-Jun-2023
  • (2023)Multi-view Graph Representation Learning Beyond HomophilyACM Transactions on Knowledge Discovery from Data10.1145/359285817:8(1-21)Online publication date: 28-Jun-2023
  • (2023)Modeling Regime Shifts in Multiple Time SeriesACM Transactions on Knowledge Discovery from Data10.1145/359285717:8(1-31)Online publication date: 28-Jun-2023
  • (2023)A Novel Classification Technique based on Formal MethodsACM Transactions on Knowledge Discovery from Data10.1145/359279617:8(1-30)Online publication date: 28-Jun-2023
  • (2023)Fighting False Information from Propagation Process: A SurveyACM Computing Surveys10.1145/356338855:10(1-38)Online publication date: 2-Feb-2023
  • (2022)An Influence Maximization Algorithm Based on Community-Topic Features for Dynamic Social NetworksIEEE Transactions on Network Science and Engineering10.1109/TNSE.2021.31279219:2(608-621)Online publication date: 1-Mar-2022
  • (2021)A Survey of Information Cascade AnalysisACM Computing Surveys10.1145/343300054:2(1-36)Online publication date: 5-Mar-2021
  • (2021)Attractive community detection in academic social networkJournal of Computational Science10.1016/j.jocs.2021.10133151(101331)Online publication date: Apr-2021
  • (2020)Continuous Influence MaximizationACM Transactions on Knowledge Discovery from Data10.1145/338092814:3(1-38)Online publication date: 13-Mar-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media