Social Network Discovery by Mining Spatio-Temporal Events

  • Authors:
  • Hady W. Lauw;Ee-Peng Lim;Hweehwa Pang;Teck-Tim Tan

  • Affiliations:
  • School of Computer Engineering, Nanyang Technological University, Singapore 639798;School of Computer Engineering, Nanyang Technological University, Singapore 639798;School of Information Systems, Singapore Management University, Singapore 178902;Centre for IT Services, Nanyang Technological University, Singapore 639798

  • Venue:
  • Computational & Mathematical Organization Theory
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Knowing patterns of relationship in a social network is very useful for law enforcement agencies to investigate collaborations among criminals, for businesses to exploit relationships to sell products, or for individuals who wish to network with others. After all, it is not just what you know, but also whom you know, that matters. However, finding out who is related to whom on a large scale is a complex problem. Asking every single individual would be impractical, given the huge number of individuals and the changing dynamics of relationships. Recent advancement in technology has allowed more data about activities of individuals to be collected. Such data may be mined to reveal associations between these individuals. Specifically, we focus on data having space and time elements, such as logs of people's movement over various locations or of their Internet activities at various cyber locations. Reasoning that individuals who are frequently found together are likely to be associated with each other, we mine from the data instances where several actors co-occur in space and time, presumably due to an underlying interaction. We call these spatio-temporal co-occurrences events, which we use to establish relationships between pairs of individuals. In this paper, we propose a model for constructing a social network from events, and provide an algorithm that mines these events from the data. Experiments on a real-life data tracking people's accesses to cyber locations have also yielded encouraging results.