Preserving Privacy Enables "Coexistence Equilibrium" of Competitive Diffusion in Social Networks

被引:2
|
作者
Zhao, Jun [1 ]
Zhang, Junshan [1 ]
机构
[1] Arizona State Univ, Tempe, AZ 85281 USA
来源
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS | 2017年 / 3卷 / 02期
基金
美国国家科学基金会;
关键词
Competitive diffusion; equilibrium; privacy; social networks; INFORMATION DIFFUSION;
D O I
10.1109/TSIPN.2017.2697819
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the advent of social media, different companies often promote competing products simultaneously for word of-mouth diffusion and adoption by users in social networks. For such scenarios of competitive diffusion, prior studies show that the weaker product will soon become extinct (i.e., "winner takes all"). It is intriguing to observe that in practice, however, competing products, such as iPhone and Android phone, often coexist in the market. This discrepancy may result from many factors such as the phenomenon that a user in the real world may not spread its use of a product due to dissatisfaction of the product or privacy protection. In this paper, we incorporate users' privacy for spreading behavior into competitive diffusion of two products and develop a problem formulation for privacy-aware competitive diffusion. Then, we prove that privacy-preserving mechanisms can enable a "coexistence equilibrium" (i.e., two competing products coexist in the equilibrium) in competitive diffusion over social networks. In addition to the rigorous analysis, we also demonstrate our results with experiments over real network topologies.
引用
收藏
页码:282 / 297
页数:16
相关论文
共 50 条
  • [41] The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks
    Zhu, Tianqing
    Li, Jin
    Hu, Xiangyu
    Xiong, Ping
    Zhou, Wanlei
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (06) : 2962 - 2974
  • [42] Privacy preserving social networking
    Babu, Korra Sathya
    Hota, Jhalak
    Jena, Sanjay Kumar
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2014, 9 (03) : 165 - 176
  • [43] Privacy in Pervasive Social Networks
    Mabrouki, Olfa
    Chibani, Abdelghani
    Amirat, Yacine
    CONSTRUCTURING AMBIENT INTELLIGENCE, 2012, 277 : 296 - +
  • [44] Security and Privacy in Social Networks
    Ahn, Gail-Joon
    Shehab, Mohamed
    Squicciarini, Anna
    IEEE INTERNET COMPUTING, 2011, 15 (03) : 10 - 12
  • [45] A Novel Greedy FluidSpread Algorithm With Equilibrium Temperature for Influence Diffusion in Social Networks
    Toalombo, Marcelo
    Wang, Bang
    Xu, Han
    Xu, Minghua
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 3057 - 3068
  • [46] An Analysis of Query Forwarding Strategies for Secure and Privacy-Preserving Social Networks
    Duerr, Michael
    Maier, Marco
    Wiesner, Kevin
    2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 535 - 542
  • [47] A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks
    Majeed, Abdul
    Khan, Safiullah
    Hwang, Seong Oun
    ELECTRONICS, 2022, 11 (13)
  • [48] A Privacy-Preserving Scheme for Interactive Messaging Over Online Social Networks
    Cai, Ying
    Zhang, Shunan
    Xia, Hongke
    Fan, Yanfang
    Zhang, Haochen
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 6817 - 6827
  • [49] Preserving weighted social networks privacy using random vectors perturbation technique
    Lan, Lihui
    Sui, Muheng
    Huang, Cheng
    Journal of Computational Information Systems, 2015, 11 (16): : 5791 - 5798
  • [50] POSTER: Privacy-Preserving Profile Similarity Computation in Online Social Networks
    Jeckmans, Arjan
    Tang, Qiang
    Hartel, Pieter
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 793 - 795