Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3319921.3319957acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciaiConference Proceedingsconference-collections
research-article

Establishing Ties with Bounded Capacity and Limited Network Access

Published: 15 March 2019 Publication History

Abstract

This paper explores how individuals build relationships in a social network from the perspective of computer science, mathematics and sociology. Interpersonal relationships in social networks can boost up information dissemination and enhance individuals' dominant position in the network. The following question is put forward in this paper: how do individuals build relationships with members of social networks in order to improve their self-importance? Therefore, three effective algorithms are raised to solve this problem from the perspective of network operators. Network operators can selectively provide users with different rights, which enables users to see the local information, global information and partial community information in the network, and develops corresponding social strategies from the perspective of the users' The paper also proposes a connection-based and time-based restriction model and compares the performance of the three strategies based on it. It then examines the different performance of these three strategies on network structure attributes, such as embeddedness and clustering coefficient. What is more, for the community strategy, the impact of different scales of community on the community strategy to improve users' centrality and embeddedness is also discussed. Experiments were conducted on simulated random networks and real dynamic network datasets. Finally, this paper compares the three strategies and makes detailed analysis.

References

[1]
C. G. Akcora, B. Carminati, and E. Ferrari. 2013. Risks of Friendships on Social Networks. In IEEE International Conference on Data Mining. 810--815.
[2]
P. Mac Carron, K. Kaski, and R. Dunbar. 2016. Calling Dunbar's numbers. Social Networks 47 (2016), 151--155.
[3]
Pasquale De Meo, Emilio Ferrara, Giacomo Fiumara, and Alessandro Provetti. 2011. Generalized Louvain Method for Community Detection in Large Networks. 79, 6 (2011), 88--93.
[4]
Imen Ben Dhia, Talel Abdessalem, and Mauro Sozio. 2012. Primates: a privacy management system for social networks. In ACM International Conference on Information and Knowledge Management. 2746--2748.
[5]
Hakan Kardes, Abdullah Sevincer, Mehmet Hadi Gunes, and Murat Yuksel. 2013. Six Degrees of Separation among US
[6]
Researchers. In Ieee/acm International Conference on Advances in Social Networks Analysis and Mining. 654--659.
[7]
Baozhen Lee, Weiguo Fan, Anna C. Squicciarini, Shilun Ge, and Yun Huang. 2014. The relativity of privacy preservation based on social tagging. Information Sciences An International Journal 288, C (2014), 87--107.
[8]
Loet Leydesdorff, Thomas Schank, Andrea Scharnhorst, and Wouter De Nooy. 2008. Animating the development of Social Networks over time using a dynamic extension of multidimensional scaling. Physics 17, 6 (2008), 611--626.
[9]
B Uzzi and S Dunlap. 2005. How to build your network. Harvard Business Review 83, 12 (2005), 53--60.
[10]
Bingying Xu, Lei Deng, Yan Jia, Bin Zhou, and Yi Han. 2013. Overlapping Community Detectionon Dynamic Social Network.In Sixth International Symposium on Computational Intelligence and Design.321--326
[11]
Jianhua Ruan and Weixiong Zhang. 2006.Identification and evaluation of weak community structures in networks. (2006), 470--475.
[12]
Song, Y., Xu, R.: Affective ties that bind: Investigating the affordances of social networking sites for commemoration of traumatic events. Social Science Computer Review p. 0894439318770960 (2018)
[13]
Burt, R.S.:Structural holes versus network closure as social capital. In: Social capital, pp. 31--56. Routledge (2017)

Index Terms

  1. Establishing Ties with Bounded Capacity and Limited Network Access

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICIAI '19: Proceedings of the 2019 3rd International Conference on Innovation in Artificial Intelligence
    March 2019
    279 pages
    ISBN:9781450361286
    DOI:10.1145/3319921
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Xi'an Jiaotong-Liverpool University: Xi'an Jiaotong-Liverpool University
    • University of Texas-Dallas: University of Texas-Dallas

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 March 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. authority
    2. community
    3. network operators
    4. social network

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICIAI 2019

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 30
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media