An extended approach of weight collective influence graph for detection influence actor

(1) Galih Hendro Martono Mail (Department of Informatics, Universitas Bumigora, Indonesia)
(2) * Azhari Azhari Mail (Department of Computer Science and Electronics, Universitas Gadjah Mada, Indonesia)
(3) Khabib Mustofa Mail (Department of Computer Science and Electronics, Universitas Gadjah Mada, Indonesia)
*corresponding author

Abstract


Over the last decade, numerous methods have been developed to detect the influential actors of hate speech in social networks, one of which is the Collective Influence (CI) method. However, this method is associated with unweighted datasets, which makes it inappropriate for social media, significantly using weight datasets. This study proposes a new CI method called the Weighted Collective Influence Graph (WCIG), which uses the weights and neighbor values to detect the influence of hate speech. A total of 49, 992 Indonesian tweets were and extracted from Indonesian Twitter accounts, from January 01 to January 22, 2021. The data collected are also used to compare the results of the proposed WCIG method to determine the influential actors in the dissemination of information. The experiment was carried out two times using parameters ∂=2 and ∂=4. The results showed that the usernames bernacleboy and zack_rockstar are influential actors in the dataset. Furthermore, the time needed to process WCIG calculations on HPC is 34-75 hours because the larger the parameter used, the greater the processing time.

Keywords


Node central; Centrality measure; Collective influence; Key actor; Weight collective influence graph

   

DOI

https://doi.org/10.26555/ijain.v8i1.800
      

Article metrics

Abstract views : 907 | PDF views : 456

   

Cite

   

Full Text

Download

References


[1] K. Zhang, H. Li, L. Qin, and M. Wu, “Closeness centrality on BBS reply network,” in Proceedings - 2011 International Conference of Information Technology, Computer Engineering and Management Sciences, ICM 2011, 2011, vol. 2, pp. 80–82, doi: 10.1109/ICM.2011.88.

[2] B. C. B. De Figueiredo, F. G. Nakamura, and E. F. Nakamura, “A group-based centrality for undirected multiplex networks: a case study of the Brazilian Car Wash Operation,” IEEE Access, vol. 9, 2021, doi: 10.1109/ACCESS.2021.3086027.

[3] Y. Yang, X. Wang, Y. Chen, and M. Hu, “Identifying Key Nodes in Complex Networks Based on Global Structure,” IEEE Access, vol. 8, pp. 32904–32913, 2020, doi: 10.1109/ACCESS.2020.2973241.

[4] K. Das, S. Samanta, K. De, and M. Pal, “Complete neighbourhood centrality and its application,” in International Conference on Computational Intelligence and Networks, CINE 2020, 2020, pp. 0–5, doi: 10.1109/CINE48825.2020.234386.

[5] M. H. Ibrahim, R. Missaoui, and J. Vaillancourt, “Cross-Face Centrality: A New Measure for Identifying Key Nodes in Networks Based on Formal Concept Analysis,” IEEE Access, vol. 8, pp. 206901–206913, 2020, doi: 10.1109/ACCESS.2020.3038306.

[6] M. Rahim, A. Ejaz, Q. Rajput, and K. A, “A Comparative Study of Similarity and Centrality Measures for Friends Recommendation,” in nternational Conference on Information Science and Communication Technology (ICISCT), 2019, doi: 10.1109/CISCT.2019.8777419.

[7] A. J. Oroh, Y. Bandung, and L. M. Zagi, “Detection of the Key Actor of Issues Spreading Based on Social Network Analysis in Twitter Social Media,” in IEEE Asia Pasific Conference on Wireless and Mobile (APWiMob), 2021, pp. 206–212, doi: 10.1109/APWiMob51111.2021.9435268.

[8] K. Nakajima, K. Iwasaki, T. Matsumura, and K. Shudo, “Estimating Top-k betweenness centrality nodes in online social networks,” in Proceedings - 16th IEEE International Symposium on Parallel and Distributed Processing with Applications, 17th IEEE International Conference on Ubiquitous Computing and Communications, 8th IEEE International Conference on Big Data and Cloud Computing, 11t, 2019, pp. 1128–1135, doi: 10.1109/BDCloud.2018.00167.

[9] Q. Liao and S. Sinthupinyo, “Exclusiveness Centrality: A Novel Centrality Measure to Find Behavioral Influencers on Twitter,” in Proceedings of the 10th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2018, 2019, doi: 10.1109/ECAI.2018.8679095.

[10] A. K. Yadav, R. Johari, and R. Dahiya, “Identification of Centrality Measures in Social Network using Network Science,” in International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2019, 2019, pp. 229–234, doi: 10.1109/ICCCIS48478.2019.8974553.

[11] M. Jaouadi and L. Ben Romdhane, “Influence maximization problem in social networks: An overview,” in Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, 2019, doi: 10.1109/AICCSA47632.2019.9035366.

[12] K. Takagi and K. Tago, “Comparison of measurements by the betweenness centrality and subjective experiment on the word priority of Tweets,” in 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), 2018, pp. 1936–1941, doi: 10.1109/SmartWorld.2018.00324.

[13] M. C. K. Michel and M. C. King, “Cyber Influence of Human Behavior : Personal and National Security, Privacy, and Fraud Awareness to Prevent Harm,” in IEEE International Symposium on Technology and Society (ISTAS), 2019, pp. 1–7, doi: 10.1109/ISTAS48451.2019.8938009.

[14] S. Zhang, W. Si, T. Qiu, and Q. Cao, “Toward More Effective Centrality-Based Attacks on Network Topologies,” in IEEE International Conference on Communications, 2020, vol. 2020-June, pp. 0–5, doi: 10.1109/ICC40277.2020.9148785.

[15] C. Mitchell, R. Agrawal, and J. Parker, “The Effectiveness of Edge Centrality Measures for Anomaly Detection,” in IEEE International Conference on Big Data, Big Data 2019, 2019, pp. 5022–5027, doi: 10.1109/BigData47090.2019.9006468.

[16] H. M. Kavitha, S. Duncan, P. Ravikumar, and E. Varun, “Online Shopping Customer Behaviour Analysis using centrality measures,” in 1st IEEE International Conference on Advances in Information Technology, ICAIT 2019 - Proceedings, 2019, pp. 223–227, doi: 10.1109/ICAIT47043.2019.8987252.

[17] R. Mittal and M. P. S. Bhatia, “Cross-Layer Closeness Centrality in Multiplex Social Networks,” in 2018 9th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2018, 2018, doi: 10.1109/ICCCNT.2018.8494042.

[18] L. Lv, K. Zhang, T. Zhang, X. Li, J. Zhang, and W. Xue, “Eigenvector centrality measure based on node similarity for multilayer and temporal networks,” IEEE Access, vol. 7, pp. 115725–115733, 2019, doi: 10.1109/ACCESS.2019.2936217.

[19] S. Roy, P. Dey, and D. Kundu, “Social Network Analysis of Cricket Community Using a Composite Distributed Framework : From Implementation Viewpoint,” IEEE Trans. Comput. Soc. Syst., vol. 5, no. 1, pp. 64–81, 2018, doi: 10.1109/TCSS.2017.2762430.

[20] G. Li, M. Li, J. Wang, Y. Li, and Y. Pan, “United Neighborhood Closeness Centrality and Orthology for Predicting Essential Proteins,” IEEE/ACM Trans. Comput. Biol. Bioinforma., vol. 17, no. 4, pp. 1451–1458, 2020, doi: 10.1109/TCBB.2018.2889978.

[21] X. Zhao, S. Guo, and Y. Wang, “The Node Influence Analysis in Social Networks Based on Structural Holes and Degree Centrality,” in 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 2017, no. 1, pp. 708–711, doi: 10.1109/CSE-EUC.2017.137.

[22] S. Segarra and A. Ribeiro, “A STABLE BETWEENNESS CENTRALITY MEASURE IN NETWORKS,” in 2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP), 2014, no. 3, pp. 3859–3863, doi: 10.1109/ICASSP.2014.6854324.

[23] S. Segarra and A. Ribeiro, “Stability and continuity of centrality measures in weighted graphs,” in IEEE Transactions on Signal Processing, 2016, vol. 64, no. 3, pp. 543–555, doi: 10.1109/TSP.2015.2486740.

[24] F. Morone, B. Min, L. Bo, R. Mari, and H. A. Makse, “Collective Influence Algorithm to find influencers via optimal percolation in massively large social media,” Nature, vol. 94, no. 1, pp. 1–22, 2016, doi: 10.1103/PhysRevE.94.012305.

[25] F. Morone, K. Roth, B. Min, H. E. Stanley, and H. A. Makse, “Model of brain activation predicts the neural collective influence map of the brain,” in Proceedings of the National Academy of Sciences, 2016, vol. 114, no. 15, pp. 3849–3854, doi: 10.1073/pnas.1620808114.

[26] T. Kobayashi and N. Masuda, “Fragmenting networks by targeting collective influencers at a mesoscopic level,” Nature Publishing Group, 2016. doi: 10.1038/srep37778

[27] X. Teng, S. Pei, F. Morone, and H. A. Makse, “Collective Influence of Multiple Spreaders Evaluated by Tracing Real Information Flow in Large-Scale Social Networks,” in Nature, 2016, vol. 6, no. October, doi: 10.1038/srep36043.

[28] D. Kong, C. Fu, J. Yang, D. Xu, and L. Han, “The Impact of the Collective Influence of Search Engines on Social Networks,” in IEEE Access, 2017, vol. 5, pp. 24920–24930, doi: 10.1109/ACCESS.2017.2767075.

[29] T. Wu, L. Chen, L. Zhong, and X. Xian, “Enhanced collective influence: A paradigm to optimize network disruption,” in Physica A: Statistical Mechanics and its Applications, 2017, vol. 472, no. 2006, pp. 43–52, doi: 10.1016/j.physa.2016.12.036.

[30] H. Li, “Centrality Analysis of Online Social Network Big Data,” in 2018 IEEE 3rd International Conference on Big Data Analysis (ICBDA), 2018, pp. 38–42, doi: 10.1109/ICBDA.2018.8367648.

[31] T. Opsahl, F. Agneessens, and J. Skvoretz, “Node centrality in weighted networks: Generalizing degree and shortest paths,” in Social Networks, 2010, vol. 32, no. 3, pp. 245–251, doi: 10.1016/j.socnet.2010.03.006.

[32] F. Morone, B. Min, R. Mari, and H. A. Makse, “Influence maximization in complex networks through optimal percolation,” in Nature, 2016, doi: 10.1038/nature14604.

[33] Z. A. Rachman, W. Maharani, and Adiwijaya, “The analysis and implementation of degree centrality in weighted graph in Social Network Analysis,” in 2013 International Conference of Information and Communication Technology, ICoICT 2013, 2013, pp. 72–76, doi: 10.1109/ICoICT.2013.6574552.

[34] H. Kretschmer and T. Kretschmer, “A New Centrality Measure for Social Network Analysis Applicable to Bibliometric and Webometric Data,” in COLLNET Journal of Scientometrics and Information Management, 2013, vol. 1, no. 1, pp. 1–7, doi: 10.1080/09720502.2007.10700947.

[35] H. Rastogi and M. Jain, “A correlative study of centrality measures across real-world networks,” in Proceedings of the 4th International Conference on IoT in Social, Mobile, Analytics and Cloud, ISMAC 2020, 2020, pp. 987–994, doi: 10.1109/I-SMAC49090.2020.9243484.




Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

___________________________________________________________
International Journal of Advances in Intelligent Informatics
ISSN 2442-6571  (print) | 2548-3161 (online)
Organized by UAD and ASCEE Computer Society
Published by Universitas Ahmad Dahlan
W: http://ijain.org
E: info@ijain.org (paper handling issues)
   andri.pranolo.id@ieee.org (publication issues)

View IJAIN Stats

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0