Skip to main content
Log in

Extent prediction of the information and influence propagation in online social networks

  • S.I.: Social Cyber-Security
  • Published:
Computational and Mathematical Organization Theory Aims and scope Submit manuscript

Abstract

We present a new mathematical model that predicts the number of users informed and influenced by messages that are propagated in an online social network. Our model is based on a new way of quantifying the tie-strength, which in turn considers the affinity and relevance between nodes. We could verify that the messages to inform and influence, as well as their importance, produce different propagation behaviors in an online social network. We carried out laboratory tests with our model and with the baseline models Linear Threshold and Independent Cascade, which are currently used in many scientific works. The results were evaluated by comparing them with empirical data. The tests show conclusively that the predictions of our model are notably more accurate and precise than the predictions of the baseline models. Our model can contribute to the development of models that maximize the propagation of messages; to predict the spread of viruses in computer networks, mobile telephony and online social networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  • Abbas SMA (2013) An agent-based model of the development of friendship links within Facebook. Comput Math Org Theory 19:232–252. https://doi.org/10.1007/s10588-013-9156-z

    Article  Google Scholar 

  • Afrasiabi Rad A, Benyoucef M (2012) Measuring propagation in online social networks: the case of youtube. J Inf Syst Appl Res 5:26

    Google Scholar 

  • Ahmed S, Kabir A, Sharmin S, Jafrin S (2017) Cyber-crimes against womenfolk on social networks: Bangladesh context. IJCA 174:9–15. https://doi.org/10.5120/ijca2017915407

    Article  Google Scholar 

  • Alexander CK, Sadiku MNO (2017) Fundamentals of electric circuits, 6th edn. McGraw-hill Education, New York

    Google Scholar 

  • Apte M, Palshikar GK, Baskaran S (2019) Frauds in online social networks: a review. In: Özyer T, Bakshi S, Alhajj R (eds) Social networks and surveillance for society. Springer, Cham, pp 1–18

    Google Scholar 

  • Arendt DL, Blaha LM (2015) Opinions, influence, and zealotry: a computational study on stubbornness. Comput Math Organ Theory 21:184–209. https://doi.org/10.1007/s10588-015-9181-1

    Article  Google Scholar 

  • Babcock M, Cox RAV, Kumar S (2019) Diffusion of pro- and anti-false information tweets: the Black Panther movie case. Comput Math Organ Theory 25:72–84. https://doi.org/10.1007/s10588-018-09286-x

    Article  Google Scholar 

  • Bandeli KK, Agarwal N (2018a) Analyzing the role of media orchestration in conducting disinformation campaigns on blogs. Comput Math Org Theory. https://doi.org/10.1007/s10588-018-09288-9

    Article  Google Scholar 

  • Bandeli KK, Agarwal N (2018b) Analyzing the role of media orchestration in conducting disinformation campaigns on blogs. Comput Math Organ Theory. https://doi.org/10.1007/s10588-018-09288-9

    Article  Google Scholar 

  • Bekiari A, Hassanagas N (2015) Verbal aggressiveness exploration through complete social network analysis: using physical education students’ class as an illustration. Int J Soc Sci Stud 3:30

    Article  Google Scholar 

  • Benevenuto F, Rodrigues T, Almeida V, et al (2008) Identifying video spammers in online social networks. In: Proceedings of the 4th international workshop on Adversarial information retrieval on the web - AIRWeb’08. ACM Press, Beijing, p 45

  • Bolthausen E, Wüthrich MV (2013) Bernoulli’s law of large numbers. ASTIN Bull J IAA 43:73–79

    Article  Google Scholar 

  • Brandes U, Fleischer D (2005) Centrality measures based on current flow. In: Annual symposium on theoretical aspects of computer science. Springer, Berlin, pp 533–544

  • Broniatowski DA, Reyna VF (2019) To illuminate and motivate: a fuzzy-trace model of the spread of information online. Comput Math Organ Theory. https://doi.org/10.1007/s10588-019-09297-2

    Article  Google Scholar 

  • Bulumulla C, Chan J, Padgham L (2018) Enhancing diffusion models by embedding cognitive reasoning. In: 2018 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM), IEEE, pp 744–749

  • Carley KM, Cervone G, Agarwal N, Liu H (2018) Social cyber-security. In: Thomson R, Dancy C, Hyder A, Bisgin H (eds) Social, cultural, and behavioral modeling. Springer, Berlin, pp 389–394

    Chapter  Google Scholar 

  • Chen W, Lakshmanan LVS, Castillo C (2013) Information and influence propagation in social networks. Synth Lect Data Manag 5:1–177. https://doi.org/10.2200/S00527ED1V01Y201308DTM037

    Article  Google Scholar 

  • Cui L, Hu H, Yu S et al (2018) DDSE: a novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks. J Netw Comput Appl 103:119–130

    Article  Google Scholar 

  • da Silva AR, Rodrigues RF, da Fonseca Vieira V, Xavier CR (2018) Influence maximization in network by genetic algorithm on linear threshold model. In: Gervasi O, Murgante B, Misra S, et al. (eds) Computational science and its applications: ICCSA 2018. Springer, Berlin, pp 96–109

    Chapter  Google Scholar 

  • De Meo P, Ferrara E, Fiumara G, Ricciardello A (2012) A novel measure of edge centrality in social networks. Knowl-Based Syst 30:136–150

    Article  Google Scholar 

  • Dietz K, Heesterbeek JAP (2002) Daniel Bernoulli’s epidemiological model revisited. Math Biosci 180:1–21

    Article  Google Scholar 

  • Duong-Ba TH (2014) Resource allocation optimization in large scale distributed systems. Dissertation, Oregon State University

  • Fan W, Yeung KH (2011) Online social networks: paradise of computer viruses. Phys A 390:189–197. https://doi.org/10.1016/j.physa.2010.09.034

    Article  Google Scholar 

  • Fischetti M, Kahr M, Leitner M et al (2018) Least cost influence propagation in (social) networks. Math Program 170:293–325

    Article  Google Scholar 

  • Fonseca A, Louçã J (2018) Explaining the emergence of online popularity through a model of information diffusion. Comput Math Organ Theory 24:169–187. https://doi.org/10.1007/s10588-017-9253-5

    Article  Google Scholar 

  • Frantz TL, Carley KM (2017) Reporting a network’s most-central actor with a confidence level. Comput Math Organ Theory 23:301–312. https://doi.org/10.1007/s10588-016-9229-x

    Article  Google Scholar 

  • Girvan M, Newman MEJ (2002) Community structure in social and biological networks. PNAS 99:7821–7826. https://doi.org/10.1073/pnas.122653799

    Article  Google Scholar 

  • Golbeck J (2013) Analyzing the Social Web. Newnes

  • González T, Santiago (2018) Running scrapper. In: Gist. https://gist.github.com/santteegt/2e70fe88b67ce52842ec451bd53ac4d2. Accessed 20 Mar 2019

  • Granovetter MS (1973) The strength of weak ties. Am J Sociol 78:1360–1380

    Article  Google Scholar 

  • Guille A, Hacid H, Favre C, Zighed DA (2013) Information diffusion in online social networks: a survey. ACM Sigmod Record 42:17–28

    Article  Google Scholar 

  • Hein O, Schwind M, König W (2006) Scale-free networks. Wirtschaftsinformatik 48:267–275

    Article  Google Scholar 

  • Ishengoma FR (2013) Online social networks and terrorism 2.0 in developing countries. 12

  • Ito S, Vymětal D, Šperka R, Halaška M (2018) Process mining of a multi-agent business simulator. Comput Math Organ Theory 24:500–531. https://doi.org/10.1007/s10588-018-9268-6

    Article  Google Scholar 

  • Jin L, Chen Y, Wang T et al (2013) Understanding user behavior in online social networks: a survey. IEEE Commun Mag 51:144–150

    Google Scholar 

  • Kao H-T, Yan S, Huang D, et al (2019) Understanding cyberbullying on Instagram and Ask.Fm via social role detection. In: Companion proceedings of the 2019 World Wide Web Conference. ACM, New York, pp 183–188

  • Kayes I, Iamnitchi A (2017) Privacy and security in online social networks: a survey. Online Social Netw Media 3–4:1–21. https://doi.org/10.1016/j.osnem.2017.09.001

    Article  Google Scholar 

  • Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 137–146

  • Kosorukoff A, Passmore DL (2011) Social network analysis: theory and applications

  • Lee C, Sung C, Ma H, Huang J (2019) IDR: positive influence maximization and negative influence minimization under competitive linear threshold model. In: 2019 20th IEEE international conference on mobile data management (MDM), pp 501–506

  • Li L, Alderson D, Doyle JC, Willinger W (2005) Towards a theory of scale-free graphs: definition, properties, and implications. Int Math 2:431–523

    Google Scholar 

  • Luceri L, Braun T, Giordano S (2019) Analyzing and inferring human real-life behavior through online social networks with social influence deep learning. Appl Netw Sci 4:34. https://doi.org/10.1007/s41109-019-0134-3

    Article  Google Scholar 

  • Luo W, Tay WP, Leng M (2016) Infection spreading and source identification: a hide and seek game. IEEE Trans Signal Process 64:4228–4243. https://doi.org/10.1109/TSP.2016.2558168

    Article  Google Scholar 

  • Mareswara Rao P, Rajashekara Rao K (2019) Extended security model over data communication in online social networks. In: Satapathy SC, Joshi A (eds) Information and communication technology for intelligent systems. Springer, Singapore, pp 239–249

    Chapter  Google Scholar 

  • Masayuki Y, Penn JD, Konidaris G, Patera AT (2013) Math, numerics, & programming (for mechanical engineers)—Buscar con Google. https://ocw.mit.edu/ans7870/2/2.086/S13/MIT2_086S13_Textbook.pdf. Accessed 20 Mar 2019

  • Mathew B, Dutt R, Goyal P, Mukherjee A (2019) Spread of hate speech in online social media. In: Proceedings of the 10th ACM conference on web science—WebSci ’19. ACM Press, Boston, pp 173–182

  • Maturo F, Migliori S, Paolone F (2018) Measuring and monitoring diversity in organizations through functional instruments with an application to ethnic workforce diversity of the U.S. Federal Agencies. Comput Math Organ Theory. https://doi.org/10.1007/s10588-018-9267-7

    Article  Google Scholar 

  • McPherson M, Smith-Lovin L, Cook JM (2001) Birds of a feather: homophily in social networks. Annu Rev Sociol 27:415–444. https://doi.org/10.1146/annurev.soc.27.1.415

    Article  Google Scholar 

  • Michalski R (2015) Linear threshold model in temporal networks: seed selection for social influence. In: 2015 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM), pp 922–923

  • Mondani H (2018) The underlying geometry of organizational dynamics: similarity-based social space and labor flow network communities. Comput Math Organ Theory 24:378–400. https://doi.org/10.1007/s10588-017-9260-6

    Article  Google Scholar 

  • Mungovan D, Howley E, Duggan J (2011) The influence of random interactions and decision heuristics on norm evolution in social networks. Comput Math Organ Theory 17:152–178. https://doi.org/10.1007/s10588-011-9085-7

    Article  Google Scholar 

  • Nan N, Zmud R, Yetgin E (2014) A complex adaptive systems perspective of innovation diffusion: an integrated theory and validated virtual laboratory. Comput Math Organ Theory 20:52–88. https://doi.org/10.1007/s10588-013-9159-9

    Article  Google Scholar 

  • Newman M (2010) Networks: an introduction. Oxford University Press, Oxford

    Book  Google Scholar 

  • Nova FF, Rifat MDR, Saha P, et al (2019) Online sexual harassment over anonymous social media in Bangladesh. In: Proceedings of the tenth international conference on information and communication technologies and development—ICTDX ’19. ACM Press, Ahmedabad, pp 1–12

  • Paniagua J, Rivelles R, Sapena J (2019) Social determinants of success: social media. Corp Gover Revenue Sustain 11:5164. https://doi.org/10.3390/su11195164

    Article  Google Scholar 

  • Petróczi A, Bazsó F, Nepusz T (2006) Measuring tie-strength in virtual social networks

  • Phadke C, Uzunalioglu H, Mendiratta VB et al (2013) Prediction of subscriber churn using social network analysis. Bell Labs Tech J 17:63–76

    Article  Google Scholar 

  • Piqueira JRC, Araujo VO (2009) A modified epidemiological model for computer viruses. Appl Math Comput 213:355–360. https://doi.org/10.1016/j.amc.2009.03.023

    Article  Google Scholar 

  • Postigo-Boix M, Melús-Moreno JL (2018) A social model based on customers’ profiles for analyzing the churning process in the mobile market of data plans. Phys A 496:571–592

    Article  Google Scholar 

  • Roberts SG, Dunbar RI (2011) Communication in social networks: effects of kinship, network size, and emotional closeness. Pers Relat 18:439–452

    Article  Google Scholar 

  • Robertson C, Fernandez L, Shillair R (2019) The political outcomes of unfriending: social network curation, network agreeability, and political participation. Social Science Research Network, Rochester

    Google Scholar 

  • Rong K, Hu G, Lin Y et al (2015) Understanding business ecosystem using a 6C framework in internet-of-things-based sectors. Int J Prod Econ 159:41–55

    Article  Google Scholar 

  • Samadi M, Nikolaev A, Nagi R (2016) A subjective evidence model for influence maximization in social networks. Omega 59:263–278. https://doi.org/10.1016/j.omega.2015.06.014

    Article  Google Scholar 

  • Samadi M, Nagi R, Semenov A, Nikolaev A (2018) Seed activation scheduling for influence maximization in social networks. Omega 77:96–114. https://doi.org/10.1016/j.omega.2017.06.002

    Article  Google Scholar 

  • Scott J (2017) Social network analysis, 4th edn. SAGE Publications Ltd, Thousand Oaks

    Book  Google Scholar 

  • Snap.py - SNAP for Python. https://snap.stanford.edu/snappy/. Accessed 20 Mar 2019

  • SNAP: network datasets: Youtube social network. https://snap.stanford.edu/data/com-Youtube.html. Accessed 20 Mar 2019

  • Steinert-Threlkeld ZC, Mocanu D, Vespignani A, Fowler J (2015) Online social networks and offline protest. EPJ Data Sci 4:1–9. https://doi.org/10.1140/epjds/s13688-015-0056-y

    Article  Google Scholar 

  • Sumith N, Annappa B, Bhattacharya S (2018) Influence maximization in large social networks: heuristics, models and parameters. Fut Gener Comput Syst 89:777–790. https://doi.org/10.1016/j.future.2018.07.015

    Article  Google Scholar 

  • Swaminathan A (2014) An algorithm for influence maximization and target set selection for the deterministic linear threshold model. Virginia Polytechnic Institute and State University

  • Talukder A, Alam MGR, Tran NH, Hong CS (2018) A cost optimized reverse influence maximization in social networks. In: NOMS 2018: 2018 IEEE/IFIP network operations and management symposium, pp 1–9

  • Teixeira AS, Monteiro PT, Carriço JA, et al (2013) Spanning edge betweenness. In: Workshop on mining and learning with graphs, pp 27–31

  • Uddin S, Khan A, Hossain L et al (2015) A topological framework to explore longitudinal social networks. Comput Math Organ Theory 21:48–68. https://doi.org/10.1007/s10588-014-9176-3

    Article  Google Scholar 

  • Ugander J, Backstrom L, Marlow C, Kleinberg J (2012) Structural diversity in social contagion. Proc Natl Acad Sci 109:5962–5966. https://doi.org/10.1073/pnas.1116502109

    Article  Google Scholar 

  • Vishwakarma DK, Varshney D, Yadav A (2019) Detection and veracity analysis of fake news via scrapping and authenticating the web search. Cogn Syst Res 58:217–229. https://doi.org/10.1016/j.cogsys.2019.07.004

    Article  Google Scholar 

  • Wang F, Jiang W, Li X, Wang G (2018) Maximizing positive influence spread in online social networks via fluid dynamics. Future Generation Computer Systems 86:1491–1502. https://doi.org/10.1016/j.future.2017.05.050

    Article  Google Scholar 

  • Weng X, Liu Z, Li Z (2016) An efficient influence maximization algorithm considering both positive and negative relationships. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp 1931–1936

  • Worrell JC, Rumschlag J, Betzel RF et al (2017) Optimized connectome architecture for sensory-motor integration. Netw Neurosci 1:415–430

    Article  Google Scholar 

  • Yang S, Keller FB, Zheng L (2016) Social network analysis: methods and examples. SAGE Publications, Los Angeles

    Google Scholar 

  • Yun Q, Gloor PA (2015) The web mirrors value in the real world: comparing a firm’s valuation with its web network position. Comput Math Org Theory 21:356–379. https://doi.org/10.1007/s10588-015-9189-6

    Article  Google Scholar 

  • Zainudin NM, Merabti M, Llewellyn-Jones D (2011) Online social networks as supporting evidence: a digital forensic investigation model and its application design. In: 2011 international conference on research and innovation in information systems, pp 1–6

  • Zuo X, Blackburn J, Kourtellis N et al (2016) The power of indirect ties. Comput Commun 73:188–199

    Article  Google Scholar 

Download references

Acknowledgements

This work was carried out by the financing of the Ecuadorian government of President Rafael Correa D. and by FLAMINGO, a Network of Excellence project (318488) supported by the European Commission under the Seventh Framework Program and the project TEC2015-71329-C2-2-R (MINECO/FEDER) from Ministerio de Economía y Competitividad. R.M.O-G. thanks Dr. Joan Serrat Fernández, Dr. Xavier Muñoz and Dr. Josep Fàbrega, professors at the University Polytechnic of Catalonia. Similarly, Dr. Esteban Samaniego Alvarado and PhD student Vladimiro Tobar Solano, professors at Universidad de Cuenca, and the PhD student Lucía Mendez Tapia for the accomplishment of this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raúl M. Ortiz-Gaona.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ortiz-Gaona, R.M., Postigo-Boix, M. & Melús-Moreno, J.L. Extent prediction of the information and influence propagation in online social networks. Comput Math Organ Theory 27, 195–230 (2021). https://doi.org/10.1007/s10588-020-09309-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10588-020-09309-6

Keywords

Navigation