You are on page 1of 6

A Systematic Review on Social Network Analysis –

Tools, Algorithms and Frameworks


Wajeeha Aslam Wasi Haider Butt Muhammad Waseem Anwar
Department of Computer & Software Department of Computer & Software Department of Computer & Software
Engineering, College of E&ME, Engineering, College of E&ME, Engineering, College of E&ME,
National University of Sciences and National University of Sciences and National University of Sciences and
Technology (NUST), H-12, Technology (NUST), H-12, Technology (NUST), H-12,
Islamabad, Pakistan Islamabad, Pakistan Islamabad, Pakistan
wajeeha.aslam14@ce.ceme.ed wasi@ceme.nust.edu.pk
u.pk

ABSTRACT Figure 1 depicts true picture of social network developed in


In the modern paradigm of IOT “Internet of Things” and big data, NodeXL tool. In Figure 1 actors are presented by black bolls and
we deal with augmented volume of information on regular basis. links/ relationships are presented by red lines. This figure depicts
Due to advancement in the data flow, there is a fair chance of data actor “xy” is more influencing actor in network. As this is time of
loss and its misuse. To manage this, it is usually required to draw IOT and big data, so there is need that we deal with augmented
whole information in form of graphs or presentable form which is volume of information on regular basis [3]. So in this modern era
termed as social network. In this context, to get some calculative social network analysis has its realistic and momentous importance
idea about social relations from that network is called a Social in multidimensional fields. Identification of key role node /
Network Analysis (SNA). The research on SNA has been individual in social network is most emerging problem now a day.
continuously performed from last decade or so. It is required to Determination of key node in organization gives clue about flow of
review and present major contributions in SNA to research relations in an organization. This can help in multidimensional
community. Therefore, this article conduct a Systematic Literature fields like medical science, education, business, defense purpose
Review (SLR) to select fifty two research studies. As a result, and so on. For that purpose different of tools are used in market [4].
twenty three algorithms, eleven tools and ten frameworks in the Bunch of frameworks and algorithms are proposed for different of
domain of SNA have been presented. This facilitates researchers to organizations with respect to demand.
discovery latest SNA developments within a single study.

CCS Concepts
• Information systems → Information retrieval → Retrieval
tasks and goals→Question answering
• Computing methodologies → Machine learning
approaches

Keywords
SNA; Organizational network analysis; Social Network Analysis

1. INTRODUCTION
Social network defines social association among individuals,
families, groups, villages, cities, organizations and where ever
social affairs exist. SNA is the evaluation of strength of relations
and its stream [1] [2]. Social network is consist of two major Figure 1. Simple social network example in NodeXL
modules first node and other one is link. The nodes in network Visual and mathematical analysis is obtained by social network
presents people, cities, messages and all entities which are linked analysis. In industry most of consultants call SNA (social network
socially. Link illustrates bond or flow among nodes. analysis) as ONA (organizational network analysis). It involves
determining vulnerable information in marketing, transparent node
Permission to make digital or hard copies of all or part of this work for in crime detection, node spreading illness in medical science,
personal or classroom use is granted without fee provided that copies are
trustworthy node in organization, and many more. For SNA
not made or distributed for profit or commercial advantage and that
copies bear this notice and the full citation on the first page. Copyrights different of software are introduced in market. Features of software
for components of this work owned by others than ACM must be are to present graphs and determine matrices after calculation of
honored. Abstracting with credit is permitted. To copy otherwise, or network standards and statistics like Betweeness Centrality,
republish, to post on servers or to redistribute to lists, requires prior closeness centrality, and eigenvector centrality so on. With this
specific permission and/or a fee. Request permissions respect there is need to identify emerging application and its need
from Permissions@acm.org. in this domain. Different emerging questions arise in mind while
ICCBD '18, September 8–10, 2018, Charleston, SC, USA fulfilling this requirement. Consequently in this paper systematic
© 2018 Association for Computing Machinery.
literature review (SLR) is executed to uncover answer of
ACM ISBN 978-1-4503-6540-6/18/09…$15.00
subsequent questions.
DOI: https://doi.org/10.1145/3277104.3277112

92
Research Q.1: Which important researches have been conducted in c) Our concern was to get most refined and particular work that’s
the field of Social Network Analysis (SNA) during last decade? why we selected particular databases. Research papers are
Research Q.2: In which domains research in SNA has played vital selected only from IEEE, Elsevier, Springer and ACM
role? databases. Research papers of other database were rejected.
Research Q.3: Which tools, frameworks and algorithms are used to d) As social network is too much advanced so it is difficult to
identify organizational structure in specific domains? cover all research domains/ categories. We picked some
Research Q.4: Which is most promising tool in the domain of social categories which are e-Business, network security, education
network analysis? and health.
Research methodology is presented in Section 2, Section 3 covers
Outcomes and Section 4 presents Conclusion.
2.2.2. Search Process
As per selection and rejection standards we have covered four
2. RESEARCH METHODOLOGY main databases which are IEEE, ACM, Elsevier and Springer.
Systematic literature has main idea to get glimpse of research Total number of research studies against social network analysis
piloted in particular domain. Sequence of methodology used in were 352 from IEEE, 273 from Springer, 450 from ACM and 117
paper is consist of 1) Research Categories and 2) Review Protocol from Elsevier that computed 1192 studies as sum. On basis of title
Expansion. 572 studies were rejected. By getting abstract diverted from our
main idea, 392 studies were rejected. By having general study of
2.1. Research Categories papers, 82 studies were rejected. On basis of primary overview, 56
We picked four categories which are 1) e-Business, 2) Network studies were rejected. 90 studies were considered for detailed study.
Security, 3) Education and 4) e-Health. Amongst 52 studies 33 40 studies were not considered on basis of detailed overview and
studies were for e-Business, 12 studies for Network Security, 5 only 52 studies were selected for SLR. Selection and rejection bird
studies for Education and 2 studies for e-Health as depicted in eye view is depicted in Figure 2 below. Few search key words
TABLE 1 below. were identified for getting research results which are described in
Table 1. Research categories TABLE 2.
Sr# Category References of Corresponding To
Studies tal
1 e- [5], [6], [7], [8], [9], [10], [11], [12], 33
Business [13], [14], [15], [16], [17], [18],
[19], [20], [21], [22], [23], [24],
[25], [26], [27], [28], [29], [30],
[31], [32], [33], [34], [35], [36],
[37]
2 Network [38], [39], [40], [41], [42], [43], 12
security [44], [45], [36], [37], [46], [47]
3 Education [48], [49], [50], [51], [52] 5
4 e- [53], [54] 2
healthcare

2.1.1. e-Business
Twitter, Facebook, yahoo, Dig, MySpace and Flicker etc are the
most emerging social websites. For customer satisfaction and to
have keep track of all users for betterment of e-Bussines is emerging Figure 2. Research process review
challenge. In this SLR 33 studies are covering this particular domain.
Table 2. Extract of Search terms
2.1.2. Network Security S Search Oper IEE Sprin AC Elsevie
By using social sites like facebook, yahoo, Myspace etc user might r Terms/ ator E ger M r
have some security risks like leakage of data, mistreat of user data #
and access limitation for user. To have proper track of suspected and 1 SNA N-A 2457 3982 4367 3123
genuine users social network analysis is in demand. 12 studies are 2 Social AND 586 349 418 521
selected to cover this domain. Networ OR 5321 6487 5965 6432
k
2.1.3. Education 3 Social AND 25 20 34 15
To keep track of social relations among students and teachers is Networ OR 9567 8345 10256 9456
demand of education. Five studies are selected for particular domain. k
2.1.4. e-Health Analysi
s
e-Health basically keeps track of relations between patient and
doctor. It also analyze the cause point of disease spread. Two
studies selected to cover this domain. 2.2.3. Quality Valuation
Main concern of SLR is to cover most recent and standard researches.
2.2. Review Protocol Expansion 1) Four main databases were selected for SLR. Division of papers
2.2.1. Inclusion / Exclusion Standards were in two types a) Journal and b) Conference paper. Figure 3 below
a) We only picked researchers that deals with SNA. shows research study databases. 2) We selected time duration from
b) We picked researches from 2009 to 2018. Researched before 2009 to 2018. Most of papers are between duration 2011 to 2018 as
2009 were rejected. depicted in Figure 3.

93
Table 3. Research databases and type of publications
Databas Type References Tot
e al
IEEE Journal [19] 14
Conferenc [38], [6], [7], [8], [9], [43],
e [17], [18], [20], [49], [22],
[45], [36]
Springer Journal [40], [46] 3
Conferenc [12]
e
ACM Journal [10], [11], [39], [53], [48], 22
[13], [41], [14], [42], [16], Figure 3. Research papers from 2009 to 2018
[46], [47]
Conferenc [5], [15], [21], [22], [23], Table 5. Identified algorithms for social network analysis
e [24], [25], [26], [28], [37] # Algorithm Reference
Elsevier Journal [54], [44], [27], [29], [30], 13 1 Naïve bayes classification [6]
[31], [32], [33], [34] , [35], algorithm in
[50], [51], [52] 2 lexicon based classifier [10]
Conferenc Nil algorithm
e 3 Aggregation based group [11]
profiling (AGP), Differentiation
2.2.4. Data Extraction & Synthesis based group profiling (DGP) and
Data abstraction and production involve understanding of Egocentric Differentiation based
concluding studies text and pool of material required to answer group profiling (EDGP)
particular enquiries. This segment denotes the assortment of 4 Gibbs sampling algorithm [39], [47]
evidence from selected 52 studies as depicted in TABLE 4 below.
5 Gold Standard and Weighted In- [53]
Table 4. Prototype of data extraction & synthesis Degree
Narrative Aspects 6 MMSC, MSMN Algorithm and [41]
Meta Data Author, Title, Research publication Type Monte Carlo Sampling based
Statistics (Conference, Journal), Publication year, Algorithm
Volume, Issue 7 Expectation–Maximization [15]
Algorithm
Data Extraction
8 Heuristic Algorithm [42]
Synopsis Elementary objective presented by 9 Power law Distribution [43], [26]
particular researches 10 Temporal network method, [19]
Case Studies Different Case Studies used in most of Reachability ratio and
selected papers Reachability time.
Outcomes Outcomes obtained by selected studies 11 Bayes theorem and Jaccard [20]
Coefficient
Valuation Of Different criteria are used for valuation of
12 Degree Distribution law [21]
Results results
13 Motif equation [22]
Data Synthesis 14 Un-supervised aggregation [24]
Categories Categories are defined in Table1 method
15 MapReduce algorithm [25]
Research Research Study Databases are defined in
16 Neo structural theory [54]
Study Table3
17 Graph sampling method [44]
Databases
18 Dijkstra algorithm [29]
Tools Tools used are defined in Table6 19 Generalized clustering [30]
Algorithms Algorithms uses or proposed are defined in coefficient
Table5 20 Regression algorithm [32]
21 Global clustering coefficient [33]
Frameworks Frameworks proposed or used are defined
22 Community detection algorithms [37]
in Table7
23 Louvain [46]

94
3. OUTCOMES Answer: We found 52 research studies, in the field of SNA, as
Main aim of this SLR is to get idea of new tools, algorithms and given in in TABLE 3.
frameworks which are broadly used in different domains for social Research Q.2: In which domains research in SNA has played
network analysis. Sequence of outcomes is 1) Tools/ Algorithms/ vital role?
Framework and 2) Answer of Research Questions. Answer: We select four categories (i.e. e-Business, Network
Security, Education and e-Health) as depicted in TABLE 1
Table 6. Identified tools in the domain of SNA Research Q.3: Which tools, frameworks and algorithms are used
to identify organizational structure in specific domains?
Sr# tool References Answer: We identify twenty three algorithms, eleven tools and
1 Nodexl [5], [6], [7], [9], [12], ten frameworks as given in TABLE 5, TABLE 6 & TABLE 7
[40], [43], [25], [45] respectively.
Research Q.4: Which is most promising tool in the domain of
2 LingPipe library [6] social network analysis?
3 Kendall’s tau [53] Answer: From the 52 selected research studies, it has been
measurement concluded that NodeXL is widely used tool for SNA as depicted in
4 MongoDB, [12] TABLE 6. NodeXl is adds-in of Microsoft 2007, 2010 and 2013
CouchDB, [55].It amalgamates mature and innovative characterization of social
Zoomdata tool, network analysis [56]. It implements sorting, filtering and clustering
5 Mopix application [48] utility that disclose sociology pertinent variance in configuration of
intersected actors in social media space [5].
6 General [18], [19], [20], [49], [21],
[22], [23], [26], [27], [29],
[31], [32], [34], [35], [50], 4. CONCLUSION
[52], [37] In this article, systematic literature review is conducted for social
7 Gephi software [24], [36] network analysis based on few research questions. In getting answer,
52 important research studies were selected for SLR from 2009 to
8 Relational coding in [44]
2018. Four dominating databases IEEE, ACM, Springer and
GSM Elsevier were used. To rationalize our review, we constrained our
9 Web server and [28] research up to four categories which are e-Business, Education, e-
client application Health and Network Security. As a result, 23 algorithms, 11 tools
10 Matlab, [46] and 10 frameworks are identified.
11 Metrics calculation [47] It is concluded that NodeXL is widely used tool for social network
by using Java analysis. Particularly, NodeXL is better for detection of vital actor
language in an organization. It supports many features like betweeness
centrality, eigenvector centrality, closeness centrality and display of
Table 7. Identified frameworks for SNA graphs and matrices from data. In future, we anticipate to perform
Sr# Framework References comprehensive analysis of identified tools, algorithms and
frameworks to provide more in-depth details.
1 SPADE framework [38]
2 (DMC) D-Minor cloud [8] 5. REFERENCES
framework
[1] M. Fris and M. N. a. V. Sollerhed, " Exploring the Design
3 SCENT Framework [13] Space for a Multi-User Real-Time Visualisation Tool for
4 ComSoc Framework [14] Social Network Analysis," in Real-Time Social Network
5 Markov model [16] Visualisation, Sweden, May 2011, p. 38.
6 Semantic analysis [17]
[2] "http://www.orgnet.com/sna.html," Orgnet. [Online].
Framework
7 Multiplex stochastic block [54] [3] "https://www.techopedia.com/definition/3205/social-network-
modeling analysis-sna," 2018. [Online].
8 clique relaxation models [33] [4] N. Akhtar, "Social Network Analysis Tools," in Fourth
9 Innovation performance [51] International Conference on Communication Systems and
model Network Technologies, 2014.
10 Change aware model [46]
[5] B. S. N. M.-F. E. M. R. V. B. C. D. T. C. A. p. E. G. Marc A.
Smith, "Analyzing (Social Media) Networks with NodeXL," in
3.1. Tools/ Algorithms/ Framework C&T '09 Preceedings of the fourth international conference on
As main concern of SLR is to get idea of tools/ algorithms/ Communities and technologies', New York, NY, USA, 2009.
frameworks used for social network analysis. From 2009 to 2018
[6] Y. B. a. K.-A. S. Alemu Molla, "Network-Based Visualization
research studies selected in SLR shielded with tools/ Algorithms/
of Opinion Mining and Sentiment Analysis on Twitter," in IT
Framework. TABLE 5 shows reviewed Algorithms in 52 studies.
Convergence and Security (ICITCS), 2014 International
TABLE 6 presents reviewed Tools in selected studies. TABLE 7
Conference , Beijing, 28-30 Oct. 2014.
display reviewed Framework in selected studies.
3.2.Answer Of Research Questions [7] M. A. S. B. S. Derek Hansen, "EventGraphs: Charting
Research Q.1: Which important researches have been conducted Collections of Conference Connections," in System Sciences
in the field of Social Network Analysis (SNA) during last decade? (HICSS), 2011 44th Hawaii International Conference , Kauai,

95
HI, 4-7 Jan. 2011. analysis," in Fuzzy Systems (FUZZ-IEEE), 2012 IEEE
International Conference on, Brisbane, QLD, 10-15 June 2012.
[8] V. T. N. C. C. Li Ho Leung, "Analyzing social networks with
D-miner Cloud," in Computer Supported Cooperative Work in [21] A. S. P. G. a. J. L. Seth A. Myers, "Information Network or
Design (CSCWD), 2012 IEEE 16th International Conference , Social Network? The Structure of the Twitter Follow Graph,"
Wuhan, 23-25 May 2012. in 23rd International Conference on World Wide Web, New
York, NY, USA, 2014.
[9] M. A. Smith, "NodeXL: Simple network analysis for social
media," in Collaboration Technologies and Systems (CTS), [22] K. A. Z. G. T. a. N. A. Wolfgang E. Schlauch, "Influence of
2013 International Conference , San Diego, CA, 20-24 May the Null-Model on Motif Detection," in 2015 IEEE/ACM
2013. International Conference on Advances in Social Networks
Analysis and Mining 2015, New York, NY, USA, 2015.
[10] M. T. GEORGIOS PALTOGLOU, "Twitter, MySpace, Digg:
Unsupervised Sentiment Analysis in Social Media," ACM [23] C. K. Isabel Anger, "Measuring Influence on Twitter," in i-
Transactions on Intelligent Systems and Technology (TIST), KNOW '11 Proceedings of the 11th International Conference
vol. 3, no. 4, p. 19, September 2012. on Knowledge Management and Knowledge Technologies,
New York, NY, USA, 2011.
[11] X. W. H. L. LEI TANG, "Group Profiling for Understanding
Social Structures," ACM Transactions on Intelligent Systems [24] D. Greene and P. Cunningham, "Producing a Unified Graph
and Technology (TIST), vol. 3, no. 1, p. 25, October 2011. Representation from Multiple Social Network Views," in the
5th Annual ACM Web Science Conference, New York, NY,
[12] N. J. M. A.-J. R. A. Dua’a Al-Hajjar, "Framework for Social USA, 2013.
Media Big Data Quality Analysis," in New Trends in Database
and Information Systems II, vol. 312 , M. I. M. K. Y. M. T. P. [25] J. Kim, E. Lee, J. Choi, Y. Bae, M. Ko and P. Kim,
G. T. A. V. Nick Bassiliades, Ed., Switzerland, Springer "Monitoring social relationship among Twitter users by using
International Publishing, 2015, pp. pp 301-314. NodeXL," in the 2013 Research in Adaptive and Convergent
Systems, New York, NY, USA, 2013.
[13] K. S. C. H. S. a. L. X. YU-RU LIN, "SCENT: Scalable
compressed monitoring of evolving multirelational social [26] S. Akioka, N. Kato and Y. M. a. H. Yamana, "Cross-media
networks," ACM Transactions on Multimedia Computing, impact on twitter in japan," in the 2nd international workshop
Communications, and Applications (TOMM) - Special section on Search and mining user-generated contents, New York,
on ACM multimedia 2010 best paper candidates, and issue on NY, USA, 2010.
social media, vol. 75, no. 1, p. 22, October 2011.
[27] A. Žnidaršič, A. Ferligoj and P. Doreian, "Actor non-response
[14] W. F. a. Q. Y. ERHENG ZHONG, "User behavior learning and in valued social networks: The impact of different non-
transfer in composite social networks," ACM Transactions on response treatments on the stability of blockmodels," An
Knowledge Discovery from Data (TKDD) - Casin special International Journal of Structural Analysis, vol. 48, p. 46–56,
issue, vol. 8, no. 1, p. 32, February 2014. January 2017.
[15] P. S. a. S. B. MOHAMAD RABBATH, "Automatic Creation [28] S. D. K. a. J. Harris, "We feel fine and searching the emotional
of Photo Books from Stories," ACM Transactions on web," in WSDM '11 Proceedings of the fourth ACM
Multimedia Computing, Communications, and Applications international conference on Web search and data mining, New
(TOMM) - Special section on ACM multimedia 2010 best York, NY, USA, 2011.
paper candidates, and issue on social media, vol. 7S, no. 1, p.
18, October 2011. [29] F. A. a. J. S. Tore Opsahl, "Node centrality in weighted
networks: Generalizing degree and shortest paths," Social
[16] J.-I. B. a. D. GATICA-PEREZ, "VlogSense: Conversational Networks, vol. 32, no. 3, p. 245–251, July 2010.
behavior and social attention in YouTube," ACM Transactions
on Multimedia Computing, Communications, and Applications [30] P. P. Tore Opsahl, "Clustering in weighted networks," Social
(TOMM) - Special section on ACM multimedia 2010 best Networks, vol. 31, no. 2, p. 155–163, May 2009.
paper candidates, and issue on social media, vol. 7S, no. 1, p. [31] E. D. W. K. I. Marlène Sapina, "From support to overload:
21, October 2011. Patterns of positive and negative family relationships of adults
[17] N. Pankong, S. Prakancharoen and M. Buranarach, "A with mental illness over time," Social Networks, vol. 47, p. 59–
combined semantic social network analysis framework to 72, October 2016.
integrate social media data," in Knowledge and Smart [32] S. Mukherjee, "Leadership network and team performance in
Technology (KST), 2012 4th International Conference on, interactive contests," Social Networks, vol. 47, p. 85–92,
Chonburi, 7-8 July 2012. October 2016.
[18] M. Smith, D. L. Hansen and E. Gleave, "Analyzing Enterprise [33] A. V. ,. S. B. Zeynep Ertem, "Detecting large cohesive
Social Media Networks," in Computational Science and subgroups with high clustering coefficients in social networks,"
Engineering, 2009. CSE '09. International Conference on, Social Networks, vol. 46, p. 1–10, July 2016.
Vancouver, BC, 29-31 Aug. 2009.
[34] S. P. B. ,. L. C. F. Ulrik Brandes, "Maintaining the duality of
[19] P. Holme, "Analyzing Temporal Networks in Social Media," closeness and betweenness centrality," Social Networks, vol.
Proceedings of the IEEE , vol. 102, no. 12, pp. 1922 - 1933, 04 44, p. 153–159, January 2016.
November 2014.
[35] T. W. V. Martin G. Everett, "Bridging, brokerage and
[20] H. Yanagimoto and M. Yoshioka, "Relationship strength betweenness," Social Networks, vol. 44, p. 202–208, January
estimation for social media using Folksonomy and network

96
2016. Detection Using Diffusion Information," ACM Transactions on
Knowledge Discovery from Data (TKDD) , vol. 12, no. 2,
[36] C. Ou, W. Yang and Z. W. a. Y. Li, "Disintegration Analysis March 2018.
of Terrorist Organizations Based on Social Networks," in
Software Engineering and Service Science (ICSESS), 2017 8th [48] J. C. G. R. H. a. P. D. SILVIA LINDTNER, "Towards a
IEEE International Conference on, Beijing, China, Nov. 2017. framework of publics: Re-encountering media sharing and its
user," ACM Transactions on Computer-Human Interaction
[37] R. S. a. D. Montesi, "Investigating Similarity of Nodes' (TOCHI), vol. 18, no. 2, p. 23, June 2011.
Attributes in Topological Based Communities.," in WWW '18
Companion Proceedings of the The Web Conference , Lyon, [49] P. S. Yadav and P. Srivastava, "A statistical analysis of impact
France, 2018. of social networking media on higher education," in
Information Management in the Knowledge Economy (IMKE),
[38] D. Wang, "Analysis and detection of low quality information in 2013 2nd International Conference on, Chandigarh, 19-20 Dec.
social networks," in Data Engineering Workshops (ICDEW), 2013.
2014 IEEE 30th International Conference, Chicago, IL, March
31 2014-April 4 2014. [50] W.-S. J. Hyeonchae Yang, "Structural efficiency to manipulate
public research institution networks," Technological
[39] J. S. a. C. XU, "Social Influence Analysis and Application on Forecasting and Social Change, vol. 110, p. 21–32, September
Multimedia Sharing Websites," ACM Transactions on 2016.
Multimedia Computing, Communications, and Applications
(TOMM) - Special Sections on the 20th Anniversary of ACM [51] M. S. v. G. Pieter E. Stek, "The influence of international
International Conference on Multimedia, vol. 9, no. 1s, p. 24, research interaction on national innovation performance: A
October 2013. bibliometric approach," Technological Forecasting and Social
Change, vol. 110, p. 61–70, September 2016.
[40] M. B. D. &. S. S. S. N. A. Singh, "Behavioral analysis and
classification of spammers distributing pornographic content in [52] M. V. S. György Kocziszky, "Generating Social Innovation
social media," Springer, p. 18, 2016. with Knowledge Engineering," Procedia - Social and
Behavioral Sciences, 2nd International Symposium "NEW
[41] M. A. A. X. L. M. T. T. a. H. T. N. HUILING ZHANG, METROPOLITAN PERSPECTIVES" - Strategic planning,
"Misinformation in Online Social Networks: Detect Them All spatial planning, economic programs and decision support
with a Limited Budget," ACM Transactions on Information tools, through the implementation of Horizon/Europe2020.,
Systems (TOIS) - Special Issue on Trust and Veracity of vol. 223, p. 167–174, 10 June 2016.
Information in Social Media, vol. 34, no. 3, p. 24, May 2016.
[53] X. T. a. C. C. YANG, "Ranking User Influence in Healthcare
[42] J. M. S. a. M. ROVATSOS, "Privacy Policy Negotiation in Social Media," ACM Transactions on Intelligent Systems and
Social Media," ACM Transactions on Autonomous and Technology (TIST), vol. 3, no. 4, p. 21, September 2012.
Adaptive Systems (TAAS), vol. 11, no. 1, p. 29, April 2016.
[54] E. Lazega, A. Bar-Hen and P. B. a. S. Donnet, "Effects of
[43] T. Ernste, "The networked gatekeeping process for news in the competition on collective learning in advice networks,"
21st century," in Collaboration Technologies and Systems www.elsevier.com/locate/socnet, vol. 47, pp. 1-14, October
(CTS), 2014 International Conference on, Minneapolis, MN, 2016.
19-23 May 2014.
[55] "https://www.smrfoundation.org/nodexl/," SocialMedia
[44] G. Wood, "The structure and vulnerability of a drug trafficking Research Foundation. [Online].
collaboration network," An International Journal of Structural
Analysis, vol. 48, p. 1–9, January 2017. [56] S. Machlis, "22 free tools for data visualization and analysis,"
[Online]. Available:
[45] A. Farooq, M. Uzair and G. J. J. a. U. Akram, "Detection of https://www.computerworld.com/article/2507728/enterprise-
Influential Nodes Using Social Networks Analysis Based On applications/enterprise-applicationsx-22-free-tools-for-data-
Network Metrics," in International Conference on Computing, visualization-and-analysis.html?page=10.
Mathematics and Engineering Technologies – iCoMET ,
Sukkur, Pakistan, Pakistan, 26 April 2018.
[46] M. E. S. a. A. Hamzeh, "Change-aware community detection
approach for dynamic social networks," Applied Intelligence
Kluwer Academic Publishers Norwell, MA, USA , vol. 48, no.
1, pp. 78-96, January 2018.
[47] M. Ramezani and A. K. a. H. R. Rabiee, "Community

97

You might also like