Abstract
The rapid development of World Wide Web accelerates information spreading in various ways. Thanks to the emergence of multiple social platforms, some events which are not much attractive in the past can become social hot spots nowadays. In this paper, we study the information diffusion process of “IP MAN3 box office fraud”, which is widely diffused in the largest Chinese microblogging system, namely Sina Weibo, in March 2016. Based on the temporal metric we have proposed, we succeed in finding out the sources of the information, and constructing the panorama of the diffusion process. In addition, a portion of nodes that promote the diffusion are identified by using the node importance algorithms. Finally, the users with abnormal behaviors in the process of event development are identified.
Original language | English |
---|---|
Title of host publication | Complex Networks and Their Applications VI |
Subtitle of host publication | Proceedings of Complex Networks 2017 (The 6th International Conference on Complex Networks and Their Applications) |
Editors | C. Cherifi, H. Cherifi, M. Karsai, M. Musolesi |
Place of Publication | Cham |
Publisher | Springer |
Pages | 946-954 |
Number of pages | 9 |
ISBN (Electronic) | 978-3-319-72150-7 |
ISBN (Print) | 978-3-319-72149-1 |
DOIs | |
Publication status | Published - 2018 |
Event | COMPLEX NETWORKS 2017: 6th International Conference on Complex Networks and their Applications - Lyon, France Duration: 29 Nov 2017 → 1 Dec 2017 |
Publication series
Name | Studies in Computational Intelligence |
---|---|
Publisher | Springer |
Volume | 689 |
ISSN (Print) | 1860-949X |
Conference
Conference | COMPLEX NETWORKS 2017 |
---|---|
Country/Territory | France |
City | Lyon |
Period | 29/11/17 → 1/12/17 |
Bibliographical note
Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-careOtherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.
Keywords
- Critical nodes identification
- Information diffusion
- Source tracing