Journal on Communications ›› 2014, Vol. 35 ›› Issue (11): 12-22.doi: 10.11959/j.issn.1000-436x.2014.11.002
• network security • Previous Articles Next Articles
Bo CHEN1,Xiang-yan TANG1,Ling YU2,Ya-shang LIU1
Online:
2014-11-25
Published:
2017-06-20
Supported by:
Bo CHEN,Xiang-yan TANG,Ling YU,Ya-shang LIU. Identifying method for opinion leaders in social network based on competency model[J]. Journal on Communications, 2014, 35(11): 12-22.
"
意见领袖 | 识别指标 | 识别方法 | 识别工具 | ||||
信息生产 | 信息传播过程 | 信息传播效果 | 定性 | 定量 | |||
传统意见领袖 | 地位;威望 | 社会交往行为 | 影响力 | 自我报告法;观察法 | 社会计量法;简单统计测量法 | 意见领袖量表、调查问卷 | |
网络意见领袖 | 威望度(注册时长) | 发帖、回帖数量;平均内容长度;在论坛中的活动时间 | 被回帖数量,回帖长度;帖子被浏览次数回复者的分散程度响应值、认同值(论坛中帖子获得支持和反对数) | 自我报告法;观察法 | 社会计量法;基于影响力扩散模型;基于聚类 | SPSS等 | |
社交网络意见领袖 | 威望度(注册时长) | 点入度;点出度;度数中心度、中间中心度;网络有效规模、网络约束系数 | 核心—边缘模型、影响力系数 | 自我报告法;观察法 | 基于聚类、基于PageRank、HITS算法、社会网络分析法等 | UCINET等 |
"
方法 | 前13名意见领袖 |
PageRank | 2543873754、1657809832、1952378163、3314238955、1117617663、1497587753、1774151167、1055769364、1965389715、1035850842、3256814345、1799576054、2802121021 |
HITS | 1670800485、3179781755、1745984651、1713926427、2001348433、2646013373、2083844833、1824294563、1580353657、1736329970、1657809832、1652526230、1799576054 |
影响力扩散概率模型 | 1903721143、2181434512、1836678361、2892905951、1541603965、3966555126、2629632621、2509471860、1789356785、1812882783、1999536911、2041028560、1963752797 |
本文 | 1909378971、2543873754、1799576054、2935818920、1847022404、2697613543、2521409667、1812882783、3697737621、1998679021、2534483191、1912607653、2179052747 |
[1] | ELLISON N B . Social network sites:definition,history,and scholarship[J]. Journal of Computer-Mediated Communication, 2007,13(1): 210-230. |
[2] | 王飞跃, 曾大军, 曹志冬 . 网络虚拟社会中非常规安全问题与社会计算方法[J]. 科技导报, 2011,29(12): 15-22. WANG F Y , ZENG D J , CAO Z D . Social computing methods for non-traditional security challenges enabled by the social media in cy-berspace[J]. Science & Technology Review, 2011,29(12): 15-22. |
[3] | 陈波, 于泠, 刘君亭 . 泛在媒体环境下的网络舆情传播控制模型[J]. 系统工程理论与实践, 2011,31(11): 2140-2150. CHEN B , YU L , LIU J T . Dissemination and control model of internet public opinion in the ubiquitous media environments[J]. Systems En-gineering-Theory & Practice, 2011,31(11): 2140-2150. |
[4] | 吕刚 . 区域信息资源共建共享中的结构洞现象研究[J]. 图书馆理论与实践, 2012,(2): 58-59. LV G . Study on phenomena of structural holes in the area of informa-tion resource sharing[J]. Library Theory and Practice, 2012,(2): 58-59. |
[5] | 刘广为, 杨雅芬, 张文德 . 科技资源共享中“桥”的作用——基于人际网络“结构洞”理论的研究[J]. 图书情报工作, 2009,53(20): 60-64. LIU G W , YANG Y F , ZHANG W D . The “bridge” application in sharing of scientific and technological resources—based on the“structural holes” theory of the social network[J]. Library and Information Service, 2009,53(20): 60-64. |
[6] | LAZARSFIELD P F , BERELSON B , GAUSET H . The People’s Choice:How the Votes Makes Up His Mind in a Presidential[M]. New York: Columbia University PressPress, 1948. |
[7] | LI Y , MA S , ZHANG Y ,et al. An improved mix framework for opinion leader identification in online learning communities[J]. Knowledge-Based Systems, 2013,(43): 43-51. |
[8] | CHO Y , HWANG J , LEE D . Identification of effective opinion leaders in the diffusion of technological innovation:a social network approach[J]. Technological Forecasting and Social Change, 2012,(79): 97-106. |
[9] | Political engagement and government informing seeking:increasing role of social media and mobile devices[EB/OL]. , 2014. |
[10] | CHOI J H , SCOTT J E . Electronic word of mouth and knowledge sharing on social network sites:a social capital perspective[J]. Journal of theoretical and applied electronic commerce research, 2013,8(1): 69-92. |
[11] | 虞鑫, 戴必兵 . 醒客工场[EB/OL] . 2014. YU X , DAI B B . Thinkerworks[EB/OL]. , 2014. |
[12] | 唐相艳, 于泠, 陈波 . 意见领袖筛选方法研究[J]. 情报探索, 2013,7: 6-10. TANG X Y , YU L , CHEN B . Study on methods of identifying opinion leader[J]. Information Research, 2013,7: 6-10. |
[13] | 祝帅, 郑小林, 陈德人 . 论坛中的意见领袖自动发现算法研究[J]. 系统工程理论与实践, 2011,31(2): 7-12. ZHU S , ZHENG X L , CHEN D R . Research of algorithm for automatic opinion leader detection in BBS[J]. Systems Engineering-Theory, 2011,31(2): 7-12. |
[14] | 王珏, 曾剑平, 周葆华 等.基于聚类分析的网络论坛意见领袖发现方法[J]. 计算机工程, 2011,37(5): 44-49. WANG J , ZENG J P , ZHOU B H ,et al. Online forum opinion leaders discovering method based on clustering analysis[J]. Computer Engineering, 2011,37(5): 44-49. |
[15] | 薛可, 陈晞 . BBS中的“舆论领袖”影响力传播模型研究——以上海交通大学“饮水思源“BBS为例[J]. 新闻大学, 2010,4: 87-93. XUE K , CHEN X . Study on the influence propagation model of opinion leader in BBS—the GRATEFUL BBS of SJTU taken for example[J]. Journalism Quarterly, 2010,4: 87-93. |
[16] | 丁汉青, 王亚萍 . SNS网络空间中“意见领袖”特征之分析——以豆瓣网为例[J]. 新闻传播研究, 2010,3: 82-91. DING H Q , WANG Y P . Analyzing opinion leader attributes in SNS cyberspace:an investigation of douban.com[J]. Journalism & Communication, 2010,3: 82-91. |
[17] | NING M , YIJUN L , RUYA T ,et al. Recognition of Online Opinion Leaders Based on Social Network Analysis[M]. Berlin: Springer Berlin HeidelbergPress, 2012. |
[18] | WENG J , LIM E P , JIANG J ,et al. Twitterrank:finding topic-sensitive influential twitterers[A]. Proceedings of the third ACM International Conference on Web Search and Data Mining[C]. 2010. 261-270. |
[19] | TANG X , YANG C C . Identifying influential users in an online healthcare social network[A]. Proceedings of IEEE International Conference on Intelligence and Security Informatics[C]. 2010. 43-48. |
[20] | 樊兴华, 赵静, 方滨兴 等. 影响力扩散概率模型及其用于意见领袖发现研究[J]. 计算机学报, 2013,36(2): 360-367. FAN X H , ZHAO J FANG B X et al. Influence diffusion probability model and utilizing it to identify network opinion leader[J]. Chinese Journal of Computers, 2013,36(2): 360-367. |
[21] | MCCLELLAND C D . Testing for competence rather than for intelligence[J]. American Psychologist, 1973,28(1): 1-24. |
[22] | SPENCER L M , MCCLELLAND D C , SPENCER S . Competency Assessment Methods:History and State of the Art[M]. Boston: Hay-McBer Research PressPress, 1994. |
[23] | 张梅英 . 胜任力研究综述[J]. 生产力研究, 2012,12: 250-252. ZHANG M Y . Review of competency[J]. Productivity Research, 2012,12: 250-252. |
[24] | 徐峰 . 人力资源绩效管理体系构建:胜任力模型视角[J]. 企业经济, 2012,1: 68-71. XU F . Human resource performance management system building:competency model perspective[J]. Enterprise Economy, 2012,1: 68-71. |
[25] | BLEI D M , NG A Y , JORDAN M I . Latent dirichlet allocation[J]. the Journal of Machine Learning Research, 2003,3: 993-1022. |
[26] | TZENG G H , HUANG J J . Multiple Attribute Decision Making:Methods and Applications[M]. Florida: CRC PressPress, 2011. |
[27] | 汪丹 . 结构洞算法的比较与测评[J]. 现代情报, 2008,9: 153-156. WANG D . A comparative study on algorithm of structural holes[J]. Modern Information, 2008,9: 153-156. |
[28] | 刘军 . 整体网分析讲义[M]. 上海: 格致出版社, 2009. LIU J . Lectures on Whole Network Approach[M]. Shanghai: Truth &Wisdom PressPress, 2009. |
[29] | 开源中国.Python中文分词组件jieba[EB/OL]. . 2014.Python Chinese word components jieba[EB/OL]. . 2014. |
[30] | MALLET.Machine learning for languagE toolkit[EB/OL]. , 2014. |
[1] | Xuan WANG, Yu ZHANG, Junfeng ZHOU, Ziyang CHEN. Influence maximization algorithm based on social network [J]. Journal on Communications, 2022, 43(8): 151-163. |
[2] | Tao PENG, Wentao ZHONG, Guojun WANG, Entao LUO, Jinbo XIONG, Yining LIU, Wang Hao. Privacy-preserving precise profile matching in mobile social network [J]. Journal on Communications, 2022, 43(11): 90-103. |
[3] | Zhen LIU,Na’na WANG,Xiaodong WANG,Yongqi SUN. Spectral clustering and embedding-enhanced POI recommendation in location-based social network [J]. Journal on Communications, 2020, 41(3): 197-206. |
[4] | Qiuyang GU, Chunhua JU, Gongxing WU. Social network link prediction method based on subgraph evolution and improved ant colony optimization algorithm [J]. Journal on Communications, 2020, 41(12): 21-35. |
[5] | Jing CHEN,Ziyi QI. Research on social network influence maximization algorithm based on time sequential relationship [J]. Journal on Communications, 2020, 41(10): 211-221. |
[6] | Junlei BI,Zhiyuan LI. Time-variant interest community based query message routing algorithm in opportunity social network [J]. Journal on Communications, 2019, 40(9): 86-94. |
[7] | Fenghua LI,Zhe SUN,Ben NIU,Jin CAO,Hui LI. Privacy-preserving photo sharing framework cross different social network [J]. Journal on Communications, 2019, 40(7): 1-13. |
[8] | Haiping HUANG,Kai WANG,Xiong TANG,Dongjun ZHANG. Differential privacy protection scheme based on edge betweenness model [J]. Journal on Communications, 2019, 40(5): 88-97. |
[9] | Xiaomeng WANG, Binxing FANG, Hongli ZHANG, Xing WANG. TSL:predicting popularity of Facebook content based on tie strength [J]. Journal on Communications, 2019, 40(10): 1-9. |
[10] | Guanghui YAN, Meng ZHANG, Hao LUO, Shikui LI, Ting LIU. Identifying vital nodes algorithm in social networks fusing higher-order information [J]. Journal on Communications, 2019, 40(10): 109-118. |
[11] | Yu FU, Yihan YU, Xiaoping WU. Differential privacy protection technology and its application in big data environment [J]. Journal on Communications, 2019, 40(10): 157-168. |
[12] | Yancui SHI,Yuan WANG,Qing ZHAO,Xiankun ZHANG. Research status of community detection based on local expansion [J]. Journal on Communications, 2019, 40(1): 149-162. |
[13] | Lu DENG,Yan JIA,Binxing FANG,Bin ZHOU,Tao ZHANG,Xin LIU. Performance analysis of topic detection algorithms in distributed environment [J]. Journal on Communications, 2018, 39(8): 176-184. |
[14] | Yong ZENG,Lingjie ZHOU,Zhongyuan JIANG,Zhihong LIU,Jianfeng MA. Security analysis of weighted network anonymity based on singular value decomposition [J]. Journal on Communications, 2018, 39(5): 23-33. |
[15] | Weihao LI,Sheng DING,Jiajie MENG,Hui LI. Spatio-temporal aware privacy-preserving scheme in LBS [J]. Journal on Communications, 2018, 39(5): 134-142. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|