首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
With the popular of online social network, the studies of information diffusion on social media also become very attractive direction. Knowing the influence of users and being able to predict it can be very helpful in enhancing or controlling the information diffusion process, where the identification of influential spreaders in online social network is very critical. In this paper, a novel method called SIRank is proposed to measure the spread influence of users in microblog, considering the user interaction features, retweet intervals, location of users in information cascades and other relevant features. By quantifying cascade structure influence and user interaction influence on information diffusion, the proposed methods uses random walk on microblog network, successfully ranked the users’ spread influence. Experiments were conducted on an anonymous real microblog dataset, the results shown that our method can efficiently measure the users’ spread influence, and perform better in both coverage and prediction comparison than other ranking methods.  相似文献   

2.
在线社交网络中的意见领袖通常是指在社交网络的信息传播中具有较大社会影响力的个体。针对当前意见领袖挖掘方法中只考虑社交网络的拓扑结构和节点的个体属性,缺乏信息传播中交互特征的问题,该文提出了基于扩展独立级联模型,并融入网络结构特征、个体属性和行为特征的意见领袖挖掘模型(extended independent cascade, EIC)。该模型以个体属性、个体在信息传播过程中的交互行为建立加权的传播网络,利用改进的CELF(cost effective lazy forward)算法,挖掘网络中影响力较大的个体。通过实验验证,在意见领袖的扩展核心率指标上,该算法优于拓扑结构类算法,且具有较好的稳定性,同时并未降低意见领袖的传播范围。  相似文献   

3.
Tag recommendation encourages users to add more tags in bridging the semantic gap between human concept and the features of media object,which provides a feasible solution for content-based multimedia information retrieval.In this paper,we study personalized tag recommendation in a popular online photo sharing site - Flickr.Social relationship information of users is collected to generate an online social network.From the perspective of network topology,we propose node topological potential to characterize user’s social influence.With this metric,we distinguish different social relations between users and find out those who really have influence on the target users.Tag recommendations are based on tagging history and the latent personalized preference learned from those who have most influence in user’s social network.We evaluate our method on large scale real-world data.The experimental results demonstrate that our method can outperform the non-personalized global co-occurrence method and other two state-of-the-art personalized approaches using social networks.We also analyze the further usage of our approach for the cold-start problem of tag recommendation.  相似文献   

4.
With the tremendous popularity of social networking sites in this era of Web 2.0, increasingly more users are contributing their comments and opinions about products, people, organizations, and many other entities. These online comments often have direct influence on consumers’ buying decisions and the public’s impressions of enterprises. As a result, enterprises have begun to explore the feasibility of using social networking sites as platforms to conduct targeted marking and enterprise reputation management for e-commerce and e-business. As indicated from recent marketing research, the joint influential power of a small group of active users could have considerable impact on a large number of consumers’ buying decisions and the public’s perception of the capabilities of enterprises. This paper illustrates a novel method that can effectively discover the most influential users from social networking sites (SNS). In particular, the general method of mining the influence network from SNS and the computational models of mathematical programming for discovering the user groups with max joint influential power are proposed. The empirical evaluation with real data extracted from social networking sites shows that the proposed method can effectively identify the most influential groups when compared to the benchmark methods. This study opens the door to effectively conducting targeted marketing and enterprise reputation management on social networking sites.  相似文献   

5.
With the fast evolution of e-commerce, it is getting harder for traditional credit management systems to service online businesses with diversified needs in dynamic scenarios. This paper studies the nature of cyber credit from the perspective of social capital. We propose the credit assessment model using social capital variables extracted from the reputation system of an e-commerce platform and the associated online social network. In addition, we consider the dynamic and diversified effects of online reputation on sellers’ cyber credit, and we verify the rationality of the credit assessment model through analyzing the relationship between cyber credit and social network variables. We take Alibaba C2C e-commerce market as our experimental study platform and use the social networking information from Sina’s microblogging services. We find that social capital variables can be used to effectively measure the cyber credit of online sellers in C2C businesses.  相似文献   

6.
The Internet and social computing technology have revolutionized our ability to gather information as well as enabled new modes of communication and forms of self-expression. As the popularity of social computing technologies has increased, our society has begun to witness modifications in socialization behaviors. Social psychology theory suggests that technological changes can influence an individual’s expectation of privacy, through adaptive behaviors resulting from use (Laufer and Wolfe in J Soc Issues 33(3): 22–42 (1977)). We adapt traditional privacy theory to explore the influence of developmental and environmental factors on the individual’s inner privacy identity, which is comprised of the individual’s belief in his or her right to control (1) personal information and (2) interactions with others, and is continuously shaped by privacy experiences. We then use the inner privacy identity to examine interpersonal behaviors in the online context. We find that individuals’ belief in their right to control their information impacts their information disclosure practices when consequences are implied and that their belief in their right to control the interaction impacts their online information sharing practices. We do not find support for a relationship between the interaction management component of the IPI and online interaction behavior, which considered in the presence of the relationship between interaction management and online information sharing, suggests that interaction behavior is more complicated in the online context. Insights from the model developed in this study can inform future studies of situational privacy behaviors.  相似文献   

7.
针对传统的社交网络信息传播模型极少将用户属性和信息特征这两个因素纳入到信息传播模型研究中的不足,该文提出了一种基于用户自身属性的信息传播模型。首先该文抽取用户影响力、用户态度、用户年龄、信息能量、信息价值等特征并构建交互规则;其次,根据这些特征建立信息传播的数学模型,模拟社交网络舆情演化过程;最后,为验证模型的有效性,开展了与真实事件的实证分析对比实验。实验结果表明: 仿真结构与真实数据的相似度大于0.97,因而该模型符合社交网络舆情信息传播的特性,能够较为准确地描述社交网络中的舆情传播过程。  相似文献   

8.
计算机技术和网络的发展使得数据呈爆炸式的涌现,社交媒体不断融入到人们的生活中,社会网络分析已成为研究的热点。随着大数据时代的到来,对社交网络链接算法研究产生巨大影响,原有的基于网络结构的预测方法已经渐渐不适应现状。因此,提出了一种基于主题模型的社交网络链接预测方法。首先以微博社交网络为数据源,将实验网络分为测试集和训练集;其次利用主题模型得到用户的主题特征,结合命名实体集和用户联系特征集合得到用户的兴趣特征相似性度量,加上网络结构相似性从而得到用户节点相似度,进而对社交网络链接进行预测;最终使用链接预测最常用的评价体系AUC来评价链接预测方法的效果。通过实验验证,该方法的预测准确率更高。  相似文献   

9.
Internet has become an essential component of our everyday social and financial activities. Nevertheless, internet users may be vulnerable to different types of web threats, which may cause financial damages, identity theft, loss of private information, brand reputation damage and loss of customer’s confidence in e-commerce and online banking. Phishing is considered as a form of web threats that is defined as the art of impersonating a website of an honest enterprise aiming to obtain confidential information such as usernames, passwords and social security number. So far, there is no single solution that can capture every phishing attack. In this article, we proposed an intelligent model for predicting phishing attacks based on artificial neural network particularly self-structuring neural networks. Phishing is a continuous problem where features significant in determining the type of web pages are constantly changing. Thus, we need to constantly improve the network structure in order to cope with these changes. Our model solves this problem by automating the process of structuring the network and shows high acceptance for noisy data, fault tolerance and high prediction accuracy. Several experiments were conducted in our research, and the number of epochs differs in each experiment. From the results, we find that all produced structures have high generalization ability.  相似文献   

10.
优秀企业在发展过程中,将不可避免的发展壮大。发展到一定程度,集团管控也自然成为集团型企业管理的重要话题。集团管控信息先行,而信息在层级链上传递时往往失真。信息失真,小则引起企业耽误决策造成损失、严重则影响企业生存,这是大型多层级组织经常面对的问题。因此集团管控的信息化应用成为企业集团研究与探索的重要课题。  相似文献   

11.
The self-disclosure of personal information by users on social network sites (SNSs) play a vital role in the self-sustainability of online social networking service provider platforms. However, people’s levels of privacy concern increases as a direct result of unauthorized procurement and exploitation of personal information from the use of social networks which in turn discourages users from disclosing their information or encourages users to submit fake information online. After a review of the Theory of Planned Behavior (TPB) and the privacy calculus model, an integrated model is proposed to explain privacy disclosure behaviors on social network sites. Thus, the aim of this paper is to find the key factors affecting users’ self-disclosure of personal information. Using privacy calculus, the perceived benefit was combined into the Theory of Planned Behavior, and after some modifications, an integrated model was prescribed specifically for the context of social network sites. The constructs of information sensitivity and perceived benefit were redefined after reviewing the literature. Through a study on the constructs of privacy concern and self-disclosure, this article aims at reducing the levels of privacy concern, while sustaining online transactions and further stimulating the development of social network sites.  相似文献   

12.
Currently, most of the existing recommendation methods treat social network users equally, which assume that the effect of recommendation on a user is decided by the user’s own preferences and social influence. However, a user’s own knowledge in a field has not been considered. In other words, to what extent does a user accept recommendations in social networks need to consider the user’s own knowledge or expertise in the field. In this paper, we propose a novel matrix factorization recommendation algorithm based on integrating social network information such as trust relationships, rating information of users and users’ own knowledge. Specifically, since we cannot directly measure a user’s knowledge in the field, we first use a user’s status in a social network to indicate a user’s knowledge in a field, and users’ status is inferred from the distributions of users’ ratings and followers across fields or the structure of domain-specific social network. Then, we model the final rating of decision-making as a linear combination of the user’s own preferences, social influence and user’s own knowledge. Experimental results on real world data sets show that our proposed approach generally outperforms the state-of-the-art recommendation algorithms that do not consider the knowledge level difference between the users.  相似文献   

13.
电信业的客户投诉不断增多而又亟待高效处理。针对电信客户投诉数据的特点,提出了一种面向高维数据的改进的集成学习分类方法。该方法综合考虑客户投诉中的文本信息及客户通讯状态信息,基于Random Subspace方法,以支持向量机(Support Vector Machine,SVM)为基分类器,采用证据推理(Evidential Reasoning,ER)规则为一种新的集成策略,构造分类模型对电信客户投诉进行分类。所提模型和方法在某电信公司客户投诉数据上进行了验证,实验结果显示该方法能够显著提高客户投诉分类的准确率和投诉处理效率。  相似文献   

14.
With the rapid growth of social network applications, more and more people are participating in social networks. Privacy protection in online social networks becomes an important issue. The illegal disclosure or improper use of users’ private information will lead to unaccepted or unexpected consequences in people’s lives. In this paper, we concern on authentic popularity disclosure in online social networks. To protect users’ privacy, the social networks need to be anonymized. However, existing anonymization algorithms on social networks may lead to nontrivial utility loss. The reason is that the anonymization process has changed the social network’s structure. The social network’s utility, such as retrieving data files, reading data files, and sharing data files among different users, has decreased. Therefore, it is a challenge to develop an effective anonymization algorithm to protect the privacy of user’s authentic popularity in online social networks without decreasing their utility. In this paper, we first design a hierarchical authorization and capability delegation (HACD) model. Based on this model, we propose a novel utility-based popularity anonymization (UPA) scheme, which integrates proxy re-encryption with keyword search techniques, to tackle this issue. We demonstrate that the proposed scheme can not only protect the users’ authentic popularity privacy, but also keep the full utility of the social network. Extensive experiments on large real-world online social networks confirm the efficacy and efficiency of our scheme.  相似文献   

15.
在社交网络的信息传播机制中,不同用户之间信息扩散往往会受到用户之间影响力的影响,因此开展复杂网络分析研究显得格外必要.首先研究在代价约束下,社交网络的影响力传播模型,在未知网络传播原理的情况下,研究如何利用叠加的随机游走策略对网络的影响力传播进行度量,将影响力传播的范围控制在某一子图中,设计出抑制负影响力传播的有效方法...  相似文献   

16.
随着社会化媒体的快速发展,社会化因素已经成为影响群体决策过程及其结果的重要因素.针对群体决策者的判断信息以残缺判断矩阵形式给出,且考虑群体决策者社会网络邻接关系的群体决策问题,提出可行的解决方法.首先,提出一种基于决策者相似性程度和社会网络距离的残缺判断矩阵补全方法;然后,提出考虑决策者社会网络影响力的群体共识交互决策模型,该交互模型不仅考虑群体决策者之间的社会邻接关系,而且可以在较大程度上保存决策者给定的原始判断信息;最后,通过一个物流企业选择存储仓库的算例验证所提出算法的可行性和优势.  相似文献   

17.
苏乐明 《软件》2012,(5):105-106
随着科学技术的不断发展,二十一世纪人类已经进入了信息化时代,将计算机、网络、通信以及数据库系统于一身的信息技术成为了社会发展强劲的主要动力。目前,中国化工企业是我国国民经济的主要经济支柱性产业,具有涉及面广、产量规模巨大、管理层面复杂等特点,一直以来都是我国建设的重点行业。由于随着世界能源的日趋紧缺,现阶段,我国的石油化工领域竞争变得越来越激烈,石油化工企业要想在竞争中占有强势地位,加强信息化管理的水平,提升企业管理素质和管理理念,最大程度的取得较好的经济效益是势在必行的发展方向。本文根据Oracle数据仓库开发工具,对石油化工企业管理信息化进行数据仓库的含义、设计原理、建模以及结构优化等技术的研究与探讨,供各位朋友鉴赏。  相似文献   

18.
Social network sites (SNS), as web-based services, allow users to make open or semi-open profiles within the systems they are part of, to see lists of other people in the group and to see the relations of people within different groups. Facebook is essentially an online social network site in which individuals can share photographs, personal information, and join groups of friends. This study investigates the experiences on Facebook of various users in Taiwan. Their degrees of confidence were often demonstrated by word-of-mouth disseminations about the social network site. Further, this research looks at how the reputations of Facebook proprietors and their affiliates were disseminated through relationship marketing for formulated social network marketing in its business model concerns. Therefore, this study uses the a priori algorithm as an association rules approach, and cluster analysis for data mining. We divide Facebook users into two groups of contributors and lurkers by their profiles and then find each group’s social network community information utilization and online purchase behaviors for investigating the Facebook business models.  相似文献   

19.
This study explores users’ continuance intention in online social networks by synthesizing Bhattacherjee’s IS continuance theory with flow theory, social capital theory, and the unified theory of acceptance and use of technology (UTAUT) to consider the special hedonic, social and utilitarian factors in the online social network environment. The integrated model was empirically tested with 320 online social network users in China. The results indicated that continuance intention was explained substantially by all hypothesized antecedents including perceived enjoyment, perceived usefulness, usage satisfaction, effort expectancy, social influence, tie strength, shared norms and trust. Based on the research findings, we offer discussions of both theoretical and practical implications.  相似文献   

20.
Recommender systems are designed to solve the information overload problem and have been widely studied for many years. Conventional recommender systems tend to take ratings of users on products into account. With the development of Web 2.0, Rating Networks in many online communities (e.g. Netflix and Douban) allow users not only to co-comment or co-rate their interests (e.g. movies and books), but also to build explicit social networks. Recent recommendation models use various social data, such as observable links, but these explicit pieces of social information incorporating recommendations normally adopt similarity measures (e.g. cosine similarity) to evaluate the explicit relationships in the network - they do not consider the latent and implicit relationships in the network, such as social influence. A target user’s purchase behavior or interest, for instance, is not always determined by their directly connected relationships and may be significantly influenced by the high reputation of people they do not know in the network, or others who have expertise in specific domains (e.g. famous social communities). In this paper, based on the above observations, we first simulate the social influence diffusion in the network to find the global and local influence nodes and then embed this dual influence data into a traditional recommendation model to improve accuracy. Mathematically, we formulate the global and local influence data as new dual social influence regularization terms and embed them into a matrix factorization-based recommendation model. Experiments on real-world datasets demonstrate the effective performance of the proposed method.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号