Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2806416.2806468acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

Mining Brokers in Dynamic Social Networks

Published: 17 October 2015 Publication History

Abstract

The theory of brokerage in sociology suggests if contacts between two parties are enabled through a third party, the latter occupies a strategic position of controlling information flows. Such individuals are called brokers and they play a key role in disseminating information. However, there is no systematic approach to identify brokers in online social networks. In this paper, we formally define the problem of detecting top-$k$ brokers given a social network and show that it is NP-hard. We develop a heuristic algorithm to find these brokers based on the weak tie theory. In order to handle the dynamic nature of online social networks, we design incremental algorithms: WeakTie-Local for unidirectional networks and WeakTie-Bi for bidirectional networks. We use two real world datasets, DBLP and Twitter, to evaluate the proposed methods. We also demonstrate how the detected brokers are useful in diffusing information across communities and propagating tweets to reach more distinct users.

References

[1]
Y. Asahiro, R. Hassin, and K. Iwama. Complexity of finding dense subgraphs. Discrete Applied Mathematics, 121(1):15--26, 2002.
[2]
E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic. The role of social networks in information diffusion. In WWW, 2012.
[3]
R. S. Burt. Secondhand brokerage: Evidence on the importance of local structure for managers, bankers, and analysts. Academy of Management Journal, 50:119--148, 2007.
[4]
S. Cheng, H. Shen, J. Huang, W. Chen, and X. Cheng. Imrank: Influence maximization via finding self-consistent ranking. In SIGIR, 2014.
[5]
P. Cui, F. Wang, S. Liu, M. Ou, S. Yang, and L. Sun. Who should share what?: Item-level social influence prediction for users and posts ranking. In SIGIR, 2011.
[6]
M. Granovetter. The Strength of Weak Ties. The American Journal of Sociology, 78(6):1360--1380, 1973.
[7]
J. Guo, P. Zhang, C. Zhou, Y. Cao, and L. Guo. Personalized influence maximization on social networks. In CIKM, 2013.
[8]
M. Haghir Chehreghani. An efficient algorithm for approximate betweenness centrality computation. In CIKM, 2013.
[9]
E. Katz. The two-step flow of communication: An up-to-date report on an hypothesis. Enis and Cox(eds.), Marketing Classisc(1):175--193, 1973.
[10]
D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In KDD, 2003.
[11]
O. Kurland and L. Lee. Respect my authority!: Hits without hyperlinks, utilizing cluster-based language models. In SIGIR, 2006.
[12]
J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney. Statistical properties of community structure in large social and information networks. In WWW, 2008.
[13]
Q. Liu, B. Xiang, E. Chen, H. Xiong, F. Tang, and J. X. Yu. Influence maximization over large-scale social networks: A bounded linear approach. In CIKM, 2014.
[14]
T. Lou and J. Tang. Mining structural hole spanners through information diffusion in social networks. In WWW, 2013.
[15]
Z. Luo, M. Osborne, J. Tang, and T. Wang. Who will retweet me?: Finding retweeters in twitter. In SIGIR, 2013.
[16]
M. E. Newman. Fast algorithm for detecting community structure in networks. Physical review E, 2004.
[17]
L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. In WWW, 1998.
[18]
A. Silva, S. Guimarães, W. Meira, Jr., and M. Zaki. Profilerank: Finding relevant content and influential users based on information diffusion. In SNAKDD, 2013.
[19]
K. Stovel and L. Shaw. Brokerage. Annual Review of Sociology, 38(1):139--158, 2012.
[20]
R. Tarjan. Depth-First Search and Linear Graph Algorithms. SIAM Journal on Computing, 1(2):146--160, 1972.
[21]
H. Tong, B. A. Prakash, C. Tsourakakis, T. Eliassi-Rad, C. Faloutsos, and D. H. Chau. On the vulnerability of large graphs. In ICDM, 2010.
[22]
B. Wang, C. Wang, J. Bu, C. Chen, W. V. Zhang, D. Cai, and X. He. Whom to mention: Expand the diffusion of tweets by @ recommendation on micro-blogging systems. In WWW, 2013.

Cited By

View all
  • (2024)The Network Position of AI Venture Companies in Investment Network: Social Capital Matters2024 Portland International Conference on Management of Engineering and Technology (PICMET)10.23919/PICMET64035.2024.10653329(1-10)Online publication date: 4-Aug-2024
  • (2023)Joint Community and Structural Hole Spanner Detection via Graph Contrastive LearningKnowledge Science, Engineering and Management10.1007/978-3-031-40292-0_33(403-417)Online publication date: 9-Aug-2023
  • (2022)Moderating Effect of Structural Holes on Absorptive Capacity and Knowledge-Innovation Performance: Empirical Evidence from Chinese FirmsSustainability10.3390/su1410582114:10(5821)Online publication date: 11-May-2022
  • Show More Cited By

Index Terms

  1. Mining Brokers in Dynamic Social Networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CIKM '15: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management
    October 2015
    1998 pages
    ISBN:9781450337946
    DOI:10.1145/2806416
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 October 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. broker
    2. social network analysis
    3. weak tie

    Qualifiers

    • Research-article

    Conference

    CIKM'15
    Sponsor:

    Acceptance Rates

    CIKM '15 Paper Acceptance Rate 165 of 646 submissions, 26%;
    Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

    Upcoming Conference

    CIKM '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 14 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)The Network Position of AI Venture Companies in Investment Network: Social Capital Matters2024 Portland International Conference on Management of Engineering and Technology (PICMET)10.23919/PICMET64035.2024.10653329(1-10)Online publication date: 4-Aug-2024
    • (2023)Joint Community and Structural Hole Spanner Detection via Graph Contrastive LearningKnowledge Science, Engineering and Management10.1007/978-3-031-40292-0_33(403-417)Online publication date: 9-Aug-2023
    • (2022)Moderating Effect of Structural Holes on Absorptive Capacity and Knowledge-Innovation Performance: Empirical Evidence from Chinese FirmsSustainability10.3390/su1410582114:10(5821)Online publication date: 11-May-2022
    • (2022)Structural Hole Theory in Social Network Analysis: A ReviewIEEE Transactions on Computational Social Systems10.1109/TCSS.2021.30703219:3(724-739)Online publication date: Jun-2022
    • (2022)Hybrid Onion Layered System for the Analysis of Collective Subjectivity in Social NetworksIEEE Access10.1109/ACCESS.2022.321746710(115435-115468)Online publication date: 2022
    • (2021)Understanding the User Interactions on GitHub: A Social Network Perspective2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD49262.2021.9437744(1148-1153)Online publication date: 5-May-2021
    • (2019)Inferring Social Bridges that Diffuse Information Across CommunitiesAdvances in Knowledge Discovery and Data Mining10.1007/978-3-030-16145-3_37(475-487)Online publication date: 22-Mar-2019

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media