Centrality in heterogeneous social networks for lurkers detection: An approach based on hypergraphs
Flora Amato
DIETI, University of Naples Federico II, via Claudio 21, 80125, Naples, Italy
Search for more papers by this authorVincenzo Moscato
DIETI, University of Naples Federico II, via Claudio 21, 80125, Naples, Italy
Search for more papers by this authorAntonio Picariello
DIETI, University of Naples Federico II, via Claudio 21, 80125, Naples, Italy
Search for more papers by this authorCorresponding Author
Francesco Piccialli
DMA, University of Naples Federico II, via Cinthia 26, 80126, Naples, Italy
Correspondence
Francesco Piccialli, Department of Mathematics and Applications, University of Naples Federico II, Naples, Italy.
Email: [email protected]
Search for more papers by this authorGiancarlo Sperlí
CINI - ITEM National Lab, Complesso Universitario Monte Santangelo, Naples, 80125 Italy
Search for more papers by this authorFlora Amato
DIETI, University of Naples Federico II, via Claudio 21, 80125, Naples, Italy
Search for more papers by this authorVincenzo Moscato
DIETI, University of Naples Federico II, via Claudio 21, 80125, Naples, Italy
Search for more papers by this authorAntonio Picariello
DIETI, University of Naples Federico II, via Claudio 21, 80125, Naples, Italy
Search for more papers by this authorCorresponding Author
Francesco Piccialli
DMA, University of Naples Federico II, via Cinthia 26, 80126, Naples, Italy
Correspondence
Francesco Piccialli, Department of Mathematics and Applications, University of Naples Federico II, Naples, Italy.
Email: [email protected]
Search for more papers by this authorGiancarlo Sperlí
CINI - ITEM National Lab, Complesso Universitario Monte Santangelo, Naples, 80125 Italy
Search for more papers by this authorSummary
Nowadays, social networks provide users an interactive platform to create and share heterogeneous content for a lot of different purposes (eg, to comment events and facts, and express and share personal opinions on specific topics), allowing millions of individuals to create online profiles and share personal information with vast networks known and sometimes also unknown people. Knowledge about users, content, and relationships in a social network may be used for an adversary attack of some victims easily. Although a number of works have been done for data privacy preservation on relational data, they cannot be applied in social networks and in general for big data analytics. In this paper, we first propose a novel data model that integrates and combines information on users belonging to 1 or more heterogeneous online social networks, together with the content that is generated, shared, and used within the related environments, using an hypergraph data structure; then we implemented the most diffused centrality measures and also introduced a new centrality measure—based on the concept of “neighborhood” among users—that may be efficiently applied for a number of data privacy issues, such as lurkers and neighborhood attack prevention, especially in “interest-based” social networks. Some experiments using the Yelp dataset are discussed.
REFERENCES
- 1Hoang Long N, Jung JJ. Privacy-aware framework for matching online social identities in multiple social networking services. Cybern Syst. 2015; 46(1-2): 69-83.
- 2Scott J. Social Network Analysis. Thousand Oaks, California, USA: Sage; 2012.
- 3Wu Y, Cao N, Gotz D, Tan YP, Keim DA. A survey on visual analytics of social media data. IEEE Trans Multimedia. 2016; 18(11): 2135-2148.
- 4Jung JJ. Measuring trustworthiness of information diffusion by risk discovery process in social networking services. Qual Quantity. 2014; 48(3): 1325-1336.
- 5Hong M, Jung JJ, Piccialli F, Chianese A. Social recommendation service for cultural heritage. Pers Ubiquitous Comput. 2017; 21(2): 191-201.
- 6Cuomo S, Michele PD, Piccialli F, Galletti A, Jung JE. Iot-based collaborative reputation system for associating visitors and artworks in a cultural scenario. Expert Syst Appl. 2017; 79: 101-111.
- 7Chianese A, Piccialli F. A smart system to manage the context evolution in the cultural heritage domain. Comput Electr Eng. 2016; 55: 27-38.
- 8Aggarwal CC. An introduction to social network data analytics. Social Network Data Analytics. Berlin, Germany: Springer; 2011: 1-15.
10.1007/978-1-4419-8462-3_1 Google Scholar
- 9Edelmann N. Reviewing the definitions of lurkers and some implications for online research. Cyberpsychology Behav Social Networking. 2013; 16(9): 645-649.
- 10Nonnecke B, Preece J. Lurker demographics: Counting the silent. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems; 2000; The Hague, Netherlands: ACM. 73-80.
- 11Ridings C, Gefen D, Arinze B. Psychological barriers: Lurker and poster motivation and behavior in online communities. Commun Assoc Inf Syst. 2006; 18(1): 329-354.
- 12Muller M, Shami NS, Millen DR, Feinberg J. We are all lurkers: Consuming behaviors among authors and readers in an enterprise file-sharing service. In: Proceedings of the 16th ACM International Conference on Supporting Group Work; 2010; Sanibel, FL, USA: ACM. 201-210.
- 13 Yelp. Available from: https://www.yelp.com/about. Accessed on 2017-02-21.
- 14Amato F, Moscato V, Picariello A, Sperlì G. Multimedia social network modeling: A proposal. In: 2016 IEEE Tenth International Conference on Semantic Computing (ICSC); 2016; Laguna Hills, CA, USA.
- 15Amato F, Mazzeo A, Penta A, Picariello A. Using NLP and ontologies for notary document management systems; 2008: 67-71.
- 16Fang Q, Sang J, Xu C, Rui Y. Topic-sensitive influencer mining in interest-based social media networks via hypergraph learning. IEEE Trans Multimedia. 2014; 16(3): 796-812.
- 17Colace F, De Santo M, Greco L, Amato F, Moscato V, Picariello A. Terminological ontology learning and population using latent Dirichlet allocation. J Visual Languages Comput. 2014; 25(6): 818-826.
- 18Kang C, Molinaro C, Kraus S, Shavitt Y, Subrahmanian VS. Diffusion centrality in social networks. In: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012). IEEE Computer Society; 2012; Istanbul, Turkey. 558-564.
- 19Adalı S, Lu X, Magdon-Ismail M. Local, community and global centrality methods for analyzing networks. Social Network Anal Min. 2014; 4(1): 1-18.
- 20Costenbader E, Valente TW. The stability of centrality measures when networks are sampled. Social Networks. 2003; 25(4): 283-307.
- 21Heintz B, Chandra A. Beyond graphs: Toward scalable hypergraph analysis systems. ACM SIGMETRICS Perform Eval Rev. 2014; 41(4): 94-97.
- 22Zhou D, Huang J, Schölkopf B. Learning with hypergraphs: Clustering, classification, and embedding. NIPS. 2006; 19: 1633-1640.
- 23de Rooij S, van Erven T, Grunwald PD, Koolen WM. Follow the leader if you can, hedge if you must. J Mach Learn Res. 2014; 15: 1281-1316.
- 24Bartolini I, Patella M. Multimedia queries in digital libraries. Data management in pervasive systems. Berlin, Germany: Springer; 2015: 311-325.
- 25Miller GA. Wordnet: A lexical database for english. Commun ACM. 1995; 38(11): 39-41.
- 26Amato F, Mazzeo A, Moscato V, Picariello A. A framework for semantic interoperability over the cloud; 2013: 1259-1264.
- 27Tagarelli A, Interdonato R. Lurking in social networks: Topology-based analysis and ranking methods. Social Network Anal Min. 2014; 4(1): 1-27.
- 28Qi GJ, Aggarwal C, Tian Q, Ji H, Huang TS. Exploring context and content links in social media: A latent space method. IEEE Trans Pattern Anal Mach Intell. 2012; 34(5): 850-862.
- 29Jin X, Luo J, Yu J, Wang G, Joshi D, Han J. Reinforced similarity integration in image-rich information networks. IEEE Trans Knowledge Data Eng. 2013; 25(2): 448-460.
- 30Zhu Z, Su J, Kong L. Measuring influence in online social network based on the user-content bipartite graph. Comput Human Behav. 2015; 52: 184-189.
- 31Gao J, Liang F, Fan W, Sun Y, Han J. A graph-based consensus maximization approach for combining multiple supervised and unsupervised models. IEEE Trans Knowledge Data Eng. 2013; 25(1): 15-28.
- 32Lu C, Hu X, Park Jr. Exploiting the social tagging network for web clustering. IEEE Trans Syst Man Cybern Part A: Syst Humans. 2011; 41(5): 840-852.
- 33Qi GJ, Aggarwal CC, Huang TS. On clustering heterogeneous social media objects with outlier links. In: Proceedings of the Fifth ACM International Conference on Web Search and Data Mining; 2012; Seattle, WA, USA: ACM. 553-562.
- 34Chen B, Wang J, Huang Q, Mei T. Personalized video recommendation through tripartite graph propagation. In: Proceedings of the 20th ACM International Conference on Multimedia; 2012; Nara, Japan: ACM. 1133-1136.
- 35Bu J, Tan S, Chen C, et al. Music recommendation by unified hypergraph: Combining social media information and music content. In: Proceedings of the International Conference on Multimedia; 2010; Firenze, Italy: ACM. 391-400.
- 36Anandkumar A, Sedghi H. Learning mixed membership community models in social tagging networks through tensor methods. arXiv preprint arXiv:1503.04567. 2015.
- 37Li L, Li T. News recommendation via hypergraph learning: encapsulation of user behavior and news content. In: Proceedings of the Sixth ACM International Conference on Web Search and Data Mining; 2013; Rome, Italy: ACM. 305-314.
- 38Preece J, Nonnecke B, Andrews D. The top five reasons for lurking: Improving community experiences for everyone. Comput Human Behav. 2004; 20(2): 201-223.
- 39Kollock P, Smith M. Managing the virtual commons. Comput-Mediated Commun: Ling Social Cross-Cultural Perspect. 1996: 109-128.
- 40Bloch M. Situated learning: Legitimate peripheral participation. Man. 1994; 29(2): 487-489.
- 41Tagarelli A, Interdonato R. Time-aware analysis and ranking of lurkers in social networks. Social Network Anal Min. 2015; 5(1): 1-23.
- 42Edelmann N. Reviewing the definitions of “lurkers” and some implications for online research. Cyberpsychology Behav Social Networking. 2013; 16(9): 645-649.
- 43Javarone MA, Interdonato R, Tagarelli A. Modeling evolutionary dynamics of lurking in social networks. Complex Networks VII. Berlin, Germany: Springer; 2016: 227-239.
- 44Cuomo S, Posteraro MR, De Michele P. A biologically inspired model for describing the user behaviors in a cultural heritage environment. In: SEBD, Sorrento, Italy; 2014: 292-302.
- 45Cuomo S, De Michele P, Galletti A, Pane F, Ponti G. Visitors dynamics in a cultural heritage scenario. In: DATA 2015 - 4th International Conference on Data Management Technologies and Applications, Proceedings, Colmar, Alsace, France; 2015: 337-343.
- 46Hassanzadeh R, Nayak R. A rule-based hybrid method for anomaly detection in online-social-network graphs. In: 2013 IEEE 25th International Conference on Tools with Artificial Intelligence (ICTAI); November 2013; Washington DC, USA. 351-357.