skip to main content
10.1145/2492517.2492552acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Finding influencers in networks using social capital

Published:25 August 2013Publication History

ABSTRACT

The existing methods for finding influencers use the process of information diffusion to discover the nodes with maximum information spread. These models capture only the process of information diffusion and not the actual social value of collaborations in the network. We have proposed a method for finding influencers using the idea that people generate more value for their work by collaborating with peers of high influence. The social value generated through such collaborations denotes the notion of individual social capital. We hypothesize and show that players with high social capital are often key influencers in the network. We propose a value-allocation model to compute the social capital and allocate the fair share of this capital to each individual involved in the collaboration. We show that our allocation satisfies several axioms of fairness and falls in the same class as the Myerson's allocation function. We implement our allocation rule using an efficient algorithm SoCap and show that our algorithm outperforms the baselines in several real-life data sets. Specifically, in DBLP network, our algorithm outperforms PageRank, PMIA and Weighted Degree baselines up to 8% in terms of precision, recall and F1-measure.

References

  1. K. Subbian and P. Melville, "Supervised rank aggregation for predicting influencers in twitter," in SocialCom, 2011, pp. 661--665.Google ScholarGoogle Scholar
  2. D. Kempe, J. M. Kleinberg, and va Tardos, "Maximizing the spread of influence through a social network," in KDD, 2003, pp. 137--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. W. Chen, C. Wang, and Y. Wang, "Scalable influence maximization for prevalent viral marketing in large-scale social networks," in KDD, 2010, pp. 1029--1038. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. S. Glance, "Cost-effective outbreak detection in networks," in KDD, 2007, pp. 420--429. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. W. Chen, Y. Wang, and S. Yang, "Efficient influence maximization in social networks," in KDD, 2009, pp. 199--208. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. S. Burt, Brokerage and Closure: An Introduction to Social Capital. Oxford University Press, 2005.Google ScholarGoogle Scholar
  7. P. Dekker and E. M. Uslaner, Social Capital and Participation in Everyday Life. Rouledge, 2001.Google ScholarGoogle Scholar
  8. D. Knoke, Organizational Networks and Corporate Social capital. Kluwer, 1999.Google ScholarGoogle Scholar
  9. M. O. Jackson and A. Wolinsky, "A strategic model of social and economic networks," in Jour. of Eco. Theo., vol. 71, no. 1, 1996, pp. 44--74.Google ScholarGoogle ScholarCross RefCross Ref
  10. R. B. Myerson, "Graphs and cooperation in games," in Mathematics of Operations Research, vol. 2, no. 3, 1977, pp. 225--229.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Kimura and K. Saito, "Tractable models for information diffusion in social networks," in KDD, 2006, pp. 259--271. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Goyal and F. Vega-Redondo, "Structural holes in social networks," in Journal of Economic Thoery, vol. 137, no. 1, 2007, pp. 460--492.Google ScholarGoogle ScholarCross RefCross Ref
  13. J. Kleinberg, S. Suri, E. Tardos, and T. Wexler, "Strategic network formation with structural holes," in Elec. Comm., 2008, pp. 132--141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Narayanam and Y. Narahari, "Topologies of strategically formed social networks based on a generic value function - allocation rule model," in Social Networks, vol. 33, 2011, pp. 56--69.Google ScholarGoogle ScholarCross RefCross Ref
  15. M. Smith, C. Giraud-Carrier, and B. Judkins, "Implicit affinity networks," in Annual Workshop on Information Technologies and Systems, 2007, pp. 8--13.Google ScholarGoogle Scholar
  16. M. Smith, "Social capital in online communities," in Workshop on PhD Students in Information and Knowledge Management, 2008, pp. 17--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Smith, C. Giraud-Carrier, and N. Purser, "Implicity affinity networks and social capital," in Information Technology and Management, 2009, pp. 123--134. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Johnson and R. P. Gilles, "Spatial social networks," in Rev. of Eco. Des., vol. 5, no. 3, 2000, pp. 273--299.Google ScholarGoogle Scholar
  19. B. Dutta, A. V. D. Nouweland, and S. Tijs, "Link formation in cooperative situtations," in Int. Jour. of Game Theo., vol. 27, no. 2, 1998, pp. 245--256. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to algorithms. MIT press, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Y. Li, B. Liu, and S. Sarawagi, Eds., Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, Nevada, USA, August 24--27, 2008. ACM, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. http://www.google.com/googlebooks/uspto.html.Google ScholarGoogle Scholar

Index Terms

  1. Finding influencers in networks using social capital

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ASONAM '13: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
          August 2013
          1558 pages
          ISBN:9781450322409
          DOI:10.1145/2492517

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 August 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate116of549submissions,21%

          Upcoming Conference

          KDD '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader