On power-law relationships of the Internet topology
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Authoritative sources in a hyperlinked environment
Journal of the ACM (JACM)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Efficient identification of Web communities
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
Communications of the ACM
Mining the network value of customers
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Multilevel algorithms for multi-constraint graph partitioning
SC '98 Proceedings of the 1998 ACM/IEEE conference on Supercomputing
Proceedings of the 11th international conference on World Wide Web
Extracting reputation in multi agent systems by means of social network topology
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Data Mining and Knowledge Discovery
Competitive Facility Location along a Highway
COCOON '01 Proceedings of the 7th Annual International Conference on Computing and Combinatorics
IDA '01 Proceedings of the 4th International Conference on Advances in Intelligent Data Analysis
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Mining knowledge-sharing sites for viral marketing
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Challenges in web search engines
ACM SIGIR Forum
Stochastic models for the Web graph
FOCS '00 Proceedings of the 41st Annual Symposium on Foundations of Computer Science
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
Journal of Computer and System Sciences - Special issue on PODS 2000
Learning probabilistic models of link structure
The Journal of Machine Learning Research
Maximizing the spread of influence through a social network
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Expertise identification using email communications
CIKM '03 Proceedings of the twelfth international conference on Information and knowledge management
The link prediction problem for social networks
CIKM '03 Proceedings of the twelfth international conference on Information and knowledge management
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Information diffusion through blogspace
Proceedings of the 13th international conference on World Wide Web
Methods for evaluating and creating data quality
Information Systems - Special issue: Data quality in cooperative information systems
Structure and evolution of blogspace
Communications of the ACM - The Blogosphere
Practical privacy: the SuLQ framework
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Graphs over time: densification laws, shrinking diameters and possible explanations
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Using relational knowledge discovery to prevent securities fraud
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Tracking Information Epidemics in Blogspace
WI '05 Proceedings of the 2005 IEEE/WIC/ACM International Conference on Web Intelligence
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
Prediction and ranking algorithms for event-based network data
ACM SIGKDD Explorations Newsletter
Formal models for expert finding in enterprise corpora
SIGIR '06 Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
Personalized recommendation driven by information flow
SIGIR '06 Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
Group formation in large social networks: membership, growth, and evolution
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Beyond streams and graphs: dynamic tensor analysis
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Mining for proposal reviewers: lessons learned at the national science foundation
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Camouflaged fraud detection in domains with complex relationships
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Inferring binary trust relationships in Web-based social networks
ACM Transactions on Internet Technology (TOIT)
POLESTAR: collaborative knowledge management and sensemaking tools for intelligence analysts
CIKM '06 Proceedings of the 15th ACM international conference on Information and knowledge management
Pattern Mining in Frequent Dynamic Subgraphs
ICDM '06 Proceedings of the Sixth International Conference on Data Mining
Graph evolution: Densification and shrinking diameters
ACM Transactions on Knowledge Discovery from Data (TKDD)
The dynamics of viral marketing
ACM Transactions on the Web (TWEB)
Proceedings of the 16th international conference on World Wide Web
Information flow modeling based on diffusion rate for prediction and ranking
Proceedings of the 16th international conference on World Wide Web
Netprobe: a fast and scalable system for fraud detection in online auction networks
Proceedings of the 16th international conference on World Wide Web
Expertise networks in online communities: structure and algorithms
Proceedings of the 16th international conference on World Wide Web
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Hits on question answer portals: exploration of link analysis for author ranking
SIGIR '07 Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval
EXPOSE: searching the web for expertise
SIGIR '07 Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval
Cost-effective outbreak detection in networks
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
GraphScope: parameter-free mining of large time-evolving graphs
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
A framework for community identification in dynamic social networks
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
iLink: search and routing in social networks
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Impact of social influence in e-commerce decision making
Proceedings of the ninth international conference on Electronic commerce
Maximizing influence in a competitive social network: a follower's perspective
Proceedings of the ninth international conference on Electronic commerce
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Combating web spam with trustrank
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
IEEE Transactions on Knowledge and Data Engineering
Identifying the influential bloggers in a community
WSDM '08 Proceedings of the 2008 International Conference on Web Search and Data Mining
Looking for great ideas: analyzing the innovation jam
Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis
Social ties and their relevance to churn in mobile telecom networks
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Optimal marketing strategies over social networks
Proceedings of the 17th international conference on World Wide Web
Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Socialtrust: tamper-resilient trust establishment in online communities
Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries
Trust Inference in Web-Based Social Networks Using Resistive Networks
ICIW '08 Proceedings of the 2008 Third International Conference on Internet and Web Applications and Services
Influence and correlation in social networks
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Feedback effects between similarity and social influence in online communities
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Microscopic evolution of social networks
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
A software system for buzz-based recommendations
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Prediction of Information Diffusion Probabilities for Independent Cascade Model
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part III
Resisting structural re-identification in anonymized social networks
Proceedings of the VLDB Endowment
Discovering leaders from community actions
Proceedings of the 17th ACM conference on Information and knowledge management
The Impact of Structural Changes on Predictions of Diffusion in Networks
ICDMW '08 Proceedings of the 2008 IEEE International Conference on Data Mining Workshops
Formal Models for Expert Finding on DBLP Bibliography Data
ICDM '08 Proceedings of the 2008 Eighth IEEE International Conference on Data Mining
Spotting Significant Changing Subgraphs in Evolving Graphs
ICDM '08 Proceedings of the 2008 Eighth IEEE International Conference on Data Mining
A Fast Method to Mine Frequent Subsequences from Graph Sequence Data
ICDM '08 Proceedings of the 2008 Eighth IEEE International Conference on Data Mining
The Challenges of Effectively Anonymizing Network Data
CATCH '09 Proceedings of the 2009 Cybersecurity Applications & Technology Conference for Homeland Security
A measurement-driven analysis of information propagation in the flickr social network
Proceedings of the 18th international conference on World wide web
On Link Privacy in Randomizing Social Networks
PAKDD '09 Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
Monitoring Network Evolution using MDL
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Preserving Privacy in Social Networks Against Neighborhood Attacks
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
GuruMine: A Pattern Mining System for Discovering Leaders and Tribes
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
Efficient influence maximization in social networks
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Finding a team of experts in social networks
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Audience selection for on-line brand advertising: privacy-friendly social network targeting
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Social influence analysis in large-scale networks
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Social influence and the diffusion of user-created content
Proceedings of the 10th ACM conference on Electronic commerce
Social networks and discovery in the enterprise (SaND)
Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval
De-anonymizing Social Networks
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part I
Determining expert profiles (with an application to expert finding)
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Taxonomy of trust: Categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Community mining on dynamic weighted directed graphs
Proceedings of the 1st ACM international workshop on Complex networks meet information & knowledge management
Pricing Strategies for Viral Marketing on Social Networks
WINE '09 Proceedings of the 5th International Workshop on Internet and Network Economics
Learning influence probabilities in social networks
Proceedings of the third ACM international conference on Web search and data mining
Folks in Folksonomies: social link prediction from shared metadata
Proceedings of the third ACM international conference on Web search and data mining
Proceedings of the 3rd Workshop on Social Network Mining and Analysis
k-symmetry model for identity anonymization in social networks
Proceedings of the 13th International Conference on Extending Database Technology
COCOON'03 Proceedings of the 9th annual international conference on Computing and combinatorics
The anatomy of a large-scale social search engine
Proceedings of the 19th international conference on World wide web
A note on maximizing the spread of influence in social networks
WINE'07 Proceedings of the 3rd international conference on Internet and network economics
Competitive influence maximization in social networks
WINE'07 Proceedings of the 3rd international conference on Internet and network economics
Preserving the privacy of sensitive relationships in graph data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Networks, Crowds, and Markets: Reasoning About a Highly Connected World
Networks, Crowds, and Markets: Reasoning About a Highly Connected World
Privacy Preserving Data Mining
Privacy Preserving Data Mining
The Meme Ranking Problem: Maximizing Microblogging Virality
ICDMW '10 Proceedings of the 2010 IEEE International Conference on Data Mining Workshops
Identity obfuscation in graphs through the information theoretic lens
ICDE '11 Proceedings of the 2011 IEEE 27th International Conference on Data Engineering
A decision theoretic approach to targeted advertising
UAI'00 Proceedings of the Sixteenth conference on Uncertainty in artificial intelligence
Patterns of influence in a recommendation network
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
Mining temporally changing web usage graphs
WebKDD'04 Proceedings of the 6th international conference on Knowledge Discovery on the Web: advances in Web Mining and Web Usage Analysis
Expertise ranking using activity and contextual link measures
Data & Knowledge Engineering
Framework for building intelligent mobile social applications
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Identifying implicit relationships between social media users to support social commerce
Proceedings of the 14th Annual International Conference on Electronic Commerce
Online social networks: A survey of a global phenomenon
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the quest of discovering cultural trails in social media
Proceedings of the sixth ACM international conference on Web search and data mining
Dynamic targeting in an online social medium
SocInfo'12 Proceedings of the 4th international conference on Social Informatics
International Journal of E-Business Research
How Well-Connected Individuals Help Spread Influences -- Analyses Based on Preferential Voter Model
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Structural and Message Based Private Friend Recommendation
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
An SNA-based Evaluation Framework for Virtual Teams
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Discovering influential nodes from trust network
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Pervasive social context: Taxonomy and survey
ACM Transactions on Intelligent Systems and Technology (TIST) - Special Sections on Paraphrasing; Intelligent Systems for Socially Aware Computing; Social Computing, Behavioral-Cultural Modeling, and Prediction
Recommending intra-institutional scientific collaboration through coauthorship network visualization
Proceedings of the 2013 workshop on Computational scientometrics: theory & applications
Social network analysis for customer churn prediction
Applied Soft Computing
Hi-index | 0.00 |
Social network analysis has gained significant attention in recent years, largely due to the success of online social networking and media-sharing sites, and the consequent availability of a wealth of social network data. In spite of the growing interest, however, there is little understanding of the potential business applications of mining social networks. While there is a large body of research on different problems and methods for social network mining, there is a gap between the techniques developed by the research community and their deployment in real-world applications. Therefore the potential business impact of these techniques is still largely unexplored. In this article we use a business process classification framework to put the research topics in a business context and provide an overview of what we consider key problems and techniques in social network analysis and mining from the perspective of business applications. In particular, we discuss data acquisition and preparation, trust, expertise, community structure, network dynamics, and information propagation. In each case we present a brief overview of the problem, describe state-of-the art approaches, discuss business application examples, and map each of the topics to a business process classification framework. In addition, we provide insights on prospective business applications, challenges, and future research directions. The main contribution of this article is to provide a state-of-the-art overview of current techniques while providing a critical perspective on business applications of social network analysis and mining.