Abstract
We present a new mathematical model that predicts the number of users informed and influenced by messages that are propagated in an online social network. Our model is based on a new way of quantifying the tie-strength, which in turn considers the affinity and relevance between nodes. We could verify that the messages to inform and influence, as well as their importance, produce different propagation behaviors in an online social network. We carried out laboratory tests with our model and with the baseline models Linear Threshold and Independent Cascade, which are currently used in many scientific works. The results were evaluated by comparing them with empirical data. The tests show conclusively that the predictions of our model are notably more accurate and precise than the predictions of the baseline models. Our model can contribute to the development of models that maximize the propagation of messages; to predict the spread of viruses in computer networks, mobile telephony and online social networks.
Similar content being viewed by others
References
Abbas SMA (2013) An agent-based model of the development of friendship links within Facebook. Comput Math Org Theory 19:232–252. https://doi.org/10.1007/s10588-013-9156-z
Afrasiabi Rad A, Benyoucef M (2012) Measuring propagation in online social networks: the case of youtube. J Inf Syst Appl Res 5:26
Ahmed S, Kabir A, Sharmin S, Jafrin S (2017) Cyber-crimes against womenfolk on social networks: Bangladesh context. IJCA 174:9–15. https://doi.org/10.5120/ijca2017915407
Alexander CK, Sadiku MNO (2017) Fundamentals of electric circuits, 6th edn. McGraw-hill Education, New York
Apte M, Palshikar GK, Baskaran S (2019) Frauds in online social networks: a review. In: Özyer T, Bakshi S, Alhajj R (eds) Social networks and surveillance for society. Springer, Cham, pp 1–18
Arendt DL, Blaha LM (2015) Opinions, influence, and zealotry: a computational study on stubbornness. Comput Math Organ Theory 21:184–209. https://doi.org/10.1007/s10588-015-9181-1
Babcock M, Cox RAV, Kumar S (2019) Diffusion of pro- and anti-false information tweets: the Black Panther movie case. Comput Math Organ Theory 25:72–84. https://doi.org/10.1007/s10588-018-09286-x
Bandeli KK, Agarwal N (2018a) Analyzing the role of media orchestration in conducting disinformation campaigns on blogs. Comput Math Org Theory. https://doi.org/10.1007/s10588-018-09288-9
Bandeli KK, Agarwal N (2018b) Analyzing the role of media orchestration in conducting disinformation campaigns on blogs. Comput Math Organ Theory. https://doi.org/10.1007/s10588-018-09288-9
Bekiari A, Hassanagas N (2015) Verbal aggressiveness exploration through complete social network analysis: using physical education students’ class as an illustration. Int J Soc Sci Stud 3:30
Benevenuto F, Rodrigues T, Almeida V, et al (2008) Identifying video spammers in online social networks. In: Proceedings of the 4th international workshop on Adversarial information retrieval on the web - AIRWeb’08. ACM Press, Beijing, p 45
Bolthausen E, Wüthrich MV (2013) Bernoulli’s law of large numbers. ASTIN Bull J IAA 43:73–79
Brandes U, Fleischer D (2005) Centrality measures based on current flow. In: Annual symposium on theoretical aspects of computer science. Springer, Berlin, pp 533–544
Broniatowski DA, Reyna VF (2019) To illuminate and motivate: a fuzzy-trace model of the spread of information online. Comput Math Organ Theory. https://doi.org/10.1007/s10588-019-09297-2
Bulumulla C, Chan J, Padgham L (2018) Enhancing diffusion models by embedding cognitive reasoning. In: 2018 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM), IEEE, pp 744–749
Carley KM, Cervone G, Agarwal N, Liu H (2018) Social cyber-security. In: Thomson R, Dancy C, Hyder A, Bisgin H (eds) Social, cultural, and behavioral modeling. Springer, Berlin, pp 389–394
Chen W, Lakshmanan LVS, Castillo C (2013) Information and influence propagation in social networks. Synth Lect Data Manag 5:1–177. https://doi.org/10.2200/S00527ED1V01Y201308DTM037
Cui L, Hu H, Yu S et al (2018) DDSE: a novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks. J Netw Comput Appl 103:119–130
da Silva AR, Rodrigues RF, da Fonseca Vieira V, Xavier CR (2018) Influence maximization in network by genetic algorithm on linear threshold model. In: Gervasi O, Murgante B, Misra S, et al. (eds) Computational science and its applications: ICCSA 2018. Springer, Berlin, pp 96–109
De Meo P, Ferrara E, Fiumara G, Ricciardello A (2012) A novel measure of edge centrality in social networks. Knowl-Based Syst 30:136–150
Dietz K, Heesterbeek JAP (2002) Daniel Bernoulli’s epidemiological model revisited. Math Biosci 180:1–21
Duong-Ba TH (2014) Resource allocation optimization in large scale distributed systems. Dissertation, Oregon State University
Fan W, Yeung KH (2011) Online social networks: paradise of computer viruses. Phys A 390:189–197. https://doi.org/10.1016/j.physa.2010.09.034
Fischetti M, Kahr M, Leitner M et al (2018) Least cost influence propagation in (social) networks. Math Program 170:293–325
Fonseca A, Louçã J (2018) Explaining the emergence of online popularity through a model of information diffusion. Comput Math Organ Theory 24:169–187. https://doi.org/10.1007/s10588-017-9253-5
Frantz TL, Carley KM (2017) Reporting a network’s most-central actor with a confidence level. Comput Math Organ Theory 23:301–312. https://doi.org/10.1007/s10588-016-9229-x
Girvan M, Newman MEJ (2002) Community structure in social and biological networks. PNAS 99:7821–7826. https://doi.org/10.1073/pnas.122653799
Golbeck J (2013) Analyzing the Social Web. Newnes
González T, Santiago (2018) Running scrapper. In: Gist. https://gist.github.com/santteegt/2e70fe88b67ce52842ec451bd53ac4d2. Accessed 20 Mar 2019
Granovetter MS (1973) The strength of weak ties. Am J Sociol 78:1360–1380
Guille A, Hacid H, Favre C, Zighed DA (2013) Information diffusion in online social networks: a survey. ACM Sigmod Record 42:17–28
Hein O, Schwind M, König W (2006) Scale-free networks. Wirtschaftsinformatik 48:267–275
Ishengoma FR (2013) Online social networks and terrorism 2.0 in developing countries. 12
Ito S, Vymětal D, Šperka R, Halaška M (2018) Process mining of a multi-agent business simulator. Comput Math Organ Theory 24:500–531. https://doi.org/10.1007/s10588-018-9268-6
Jin L, Chen Y, Wang T et al (2013) Understanding user behavior in online social networks: a survey. IEEE Commun Mag 51:144–150
Kao H-T, Yan S, Huang D, et al (2019) Understanding cyberbullying on Instagram and Ask.Fm via social role detection. In: Companion proceedings of the 2019 World Wide Web Conference. ACM, New York, pp 183–188
Kayes I, Iamnitchi A (2017) Privacy and security in online social networks: a survey. Online Social Netw Media 3–4:1–21. https://doi.org/10.1016/j.osnem.2017.09.001
Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 137–146
Kosorukoff A, Passmore DL (2011) Social network analysis: theory and applications
Lee C, Sung C, Ma H, Huang J (2019) IDR: positive influence maximization and negative influence minimization under competitive linear threshold model. In: 2019 20th IEEE international conference on mobile data management (MDM), pp 501–506
Li L, Alderson D, Doyle JC, Willinger W (2005) Towards a theory of scale-free graphs: definition, properties, and implications. Int Math 2:431–523
Luceri L, Braun T, Giordano S (2019) Analyzing and inferring human real-life behavior through online social networks with social influence deep learning. Appl Netw Sci 4:34. https://doi.org/10.1007/s41109-019-0134-3
Luo W, Tay WP, Leng M (2016) Infection spreading and source identification: a hide and seek game. IEEE Trans Signal Process 64:4228–4243. https://doi.org/10.1109/TSP.2016.2558168
Mareswara Rao P, Rajashekara Rao K (2019) Extended security model over data communication in online social networks. In: Satapathy SC, Joshi A (eds) Information and communication technology for intelligent systems. Springer, Singapore, pp 239–249
Masayuki Y, Penn JD, Konidaris G, Patera AT (2013) Math, numerics, & programming (for mechanical engineers)—Buscar con Google. https://ocw.mit.edu/ans7870/2/2.086/S13/MIT2_086S13_Textbook.pdf. Accessed 20 Mar 2019
Mathew B, Dutt R, Goyal P, Mukherjee A (2019) Spread of hate speech in online social media. In: Proceedings of the 10th ACM conference on web science—WebSci ’19. ACM Press, Boston, pp 173–182
Maturo F, Migliori S, Paolone F (2018) Measuring and monitoring diversity in organizations through functional instruments with an application to ethnic workforce diversity of the U.S. Federal Agencies. Comput Math Organ Theory. https://doi.org/10.1007/s10588-018-9267-7
McPherson M, Smith-Lovin L, Cook JM (2001) Birds of a feather: homophily in social networks. Annu Rev Sociol 27:415–444. https://doi.org/10.1146/annurev.soc.27.1.415
Michalski R (2015) Linear threshold model in temporal networks: seed selection for social influence. In: 2015 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 922–923
Mondani H (2018) The underlying geometry of organizational dynamics: similarity-based social space and labor flow network communities. Comput Math Organ Theory 24:378–400. https://doi.org/10.1007/s10588-017-9260-6
Mungovan D, Howley E, Duggan J (2011) The influence of random interactions and decision heuristics on norm evolution in social networks. Comput Math Organ Theory 17:152–178. https://doi.org/10.1007/s10588-011-9085-7
Nan N, Zmud R, Yetgin E (2014) A complex adaptive systems perspective of innovation diffusion: an integrated theory and validated virtual laboratory. Comput Math Organ Theory 20:52–88. https://doi.org/10.1007/s10588-013-9159-9
Newman M (2010) Networks: an introduction. Oxford University Press, Oxford
Nova FF, Rifat MDR, Saha P, et al (2019) Online sexual harassment over anonymous social media in Bangladesh. In: Proceedings of the tenth international conference on information and communication technologies and development—ICTDX ’19. ACM Press, Ahmedabad, pp 1–12
Paniagua J, Rivelles R, Sapena J (2019) Social determinants of success: social media. Corp Gover Revenue Sustain 11:5164. https://doi.org/10.3390/su11195164
Petróczi A, Bazsó F, Nepusz T (2006) Measuring tie-strength in virtual social networks
Phadke C, Uzunalioglu H, Mendiratta VB et al (2013) Prediction of subscriber churn using social network analysis. Bell Labs Tech J 17:63–76
Piqueira JRC, Araujo VO (2009) A modified epidemiological model for computer viruses. Appl Math Comput 213:355–360. https://doi.org/10.1016/j.amc.2009.03.023
Postigo-Boix M, Melús-Moreno JL (2018) A social model based on customers’ profiles for analyzing the churning process in the mobile market of data plans. Phys A 496:571–592
Roberts SG, Dunbar RI (2011) Communication in social networks: effects of kinship, network size, and emotional closeness. Pers Relat 18:439–452
Robertson C, Fernandez L, Shillair R (2019) The political outcomes of unfriending: social network curation, network agreeability, and political participation. Social Science Research Network, Rochester
Rong K, Hu G, Lin Y et al (2015) Understanding business ecosystem using a 6C framework in internet-of-things-based sectors. Int J Prod Econ 159:41–55
Samadi M, Nikolaev A, Nagi R (2016) A subjective evidence model for influence maximization in social networks. Omega 59:263–278. https://doi.org/10.1016/j.omega.2015.06.014
Samadi M, Nagi R, Semenov A, Nikolaev A (2018) Seed activation scheduling for influence maximization in social networks. Omega 77:96–114. https://doi.org/10.1016/j.omega.2017.06.002
Scott J (2017) Social network analysis, 4th edn. SAGE Publications Ltd, Thousand Oaks
Snap.py - SNAP for Python. https://snap.stanford.edu/snappy/. Accessed 20 Mar 2019
SNAP: network datasets: Youtube social network. https://snap.stanford.edu/data/com-Youtube.html. Accessed 20 Mar 2019
Steinert-Threlkeld ZC, Mocanu D, Vespignani A, Fowler J (2015) Online social networks and offline protest. EPJ Data Sci 4:1–9. https://doi.org/10.1140/epjds/s13688-015-0056-y
Sumith N, Annappa B, Bhattacharya S (2018) Influence maximization in large social networks: heuristics, models and parameters. Fut Gener Comput Syst 89:777–790. https://doi.org/10.1016/j.future.2018.07.015
Swaminathan A (2014) An algorithm for influence maximization and target set selection for the deterministic linear threshold model. Virginia Polytechnic Institute and State University
Talukder A, Alam MGR, Tran NH, Hong CS (2018) A cost optimized reverse influence maximization in social networks. In: NOMS 2018: 2018 IEEE/IFIP network operations and management symposium, pp 1–9
Teixeira AS, Monteiro PT, Carriço JA, et al (2013) Spanning edge betweenness. In: Workshop on mining and learning with graphs, pp 27–31
Uddin S, Khan A, Hossain L et al (2015) A topological framework to explore longitudinal social networks. Comput Math Organ Theory 21:48–68. https://doi.org/10.1007/s10588-014-9176-3
Ugander J, Backstrom L, Marlow C, Kleinberg J (2012) Structural diversity in social contagion. Proc Natl Acad Sci 109:5962–5966. https://doi.org/10.1073/pnas.1116502109
Vishwakarma DK, Varshney D, Yadav A (2019) Detection and veracity analysis of fake news via scrapping and authenticating the web search. Cogn Syst Res 58:217–229. https://doi.org/10.1016/j.cogsys.2019.07.004
Wang F, Jiang W, Li X, Wang G (2018) Maximizing positive influence spread in online social networks via fluid dynamics. Future Generation Computer Systems 86:1491–1502. https://doi.org/10.1016/j.future.2017.05.050
Weng X, Liu Z, Li Z (2016) An efficient influence maximization algorithm considering both positive and negative relationships. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp 1931–1936
Worrell JC, Rumschlag J, Betzel RF et al (2017) Optimized connectome architecture for sensory-motor integration. Netw Neurosci 1:415–430
Yang S, Keller FB, Zheng L (2016) Social network analysis: methods and examples. SAGE Publications, Los Angeles
Yun Q, Gloor PA (2015) The web mirrors value in the real world: comparing a firm’s valuation with its web network position. Comput Math Org Theory 21:356–379. https://doi.org/10.1007/s10588-015-9189-6
Zainudin NM, Merabti M, Llewellyn-Jones D (2011) Online social networks as supporting evidence: a digital forensic investigation model and its application design. In: 2011 international conference on research and innovation in information systems, pp 1–6
Zuo X, Blackburn J, Kourtellis N et al (2016) The power of indirect ties. Comput Commun 73:188–199
Acknowledgements
This work was carried out by the financing of the Ecuadorian government of President Rafael Correa D. and by FLAMINGO, a Network of Excellence project (318488) supported by the European Commission under the Seventh Framework Program and the project TEC2015-71329-C2-2-R (MINECO/FEDER) from Ministerio de Economía y Competitividad. R.M.O-G. thanks Dr. Joan Serrat Fernández, Dr. Xavier Muñoz and Dr. Josep Fàbrega, professors at the University Polytechnic of Catalonia. Similarly, Dr. Esteban Samaniego Alvarado and PhD student Vladimiro Tobar Solano, professors at Universidad de Cuenca, and the PhD student Lucía Mendez Tapia for the accomplishment of this work.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ortiz-Gaona, R.M., Postigo-Boix, M. & Melús-Moreno, J.L. Extent prediction of the information and influence propagation in online social networks. Comput Math Organ Theory 27, 195–230 (2021). https://doi.org/10.1007/s10588-020-09309-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10588-020-09309-6