Abstract
Mobile social networks are enabled by the emergence of mobile and ubiquitous applications, providing social networking and social media functionalities in diverse contexts. This chapter focuses on social behavior in mobile social networks: We first discuss different aspects of mobile social networks. After that, we briefly describe exemplary systems. Finally, we summarize recent real-world analysis results, especially focusing on links and contacts between individuals, characterization of their roles, and dynamics of communities in mobile social networks.
Access provided by Autonomous University of Puebla. Download chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
4.1 Introduction
Mobile social networks are usually created using pervasive and ubiquitous applications. In this way, mobile social systems help to bridge the gap between physical and online worlds, utilizing context awareness, pervasive computing, distributed computing, and sensor networks.
Mobile devices, such as smartphones or RFID tags coupled with appropriate ubiquitous and social applications, enable an integrated approach for both physical and digital social interactions. In that way, mobile social networking specifically includes networking options that are only possible on mobile and ubiquitous devices. It is important that mobile social networks are not restricted to networks provided by smartphone technology. For example, an RFID sensor network is one prominent kind of mobile social network that enables the capture, analysis, and processing of offline interactions in order to support social networking and provide sophisticated social services in ubiquitous environments.
This chapter describes social behavior in such mobile social networks. We focus on different aspects in mobile social networks, and discuss its implementation. With regard to this, we also briefly describe exemplary systems in real-world application contexts: We briefly discuss the Conferator (Atzmueller et al. 2011a) and MyGroup (Atzmueller et al. 2012a) systems for supporting social networking in conferencing and workgroup contexts. Both systems apply active RFID technology that allows us to detect real-world face-to-face contacts, i.e., offline contacts in addition to contacts in (online) social networks. In this context, we summarize a number of exemplary analysis results of social behavior in mobile social networks, focusing on the characterization of links, roles, and communities.
The rest of the chapter is structured as follows. The next section provides an overview on social behavior in mobile social networks, focusing both on the social and the behavioral aspect. After that, we briefly summarize exemplary systems enabling mobile social networks. The following section discusses analysis results in the application context of the Conferator and MyGroup systems. Finally, we conclude with a summary and outlook on future work.
4.2 Overview
In this section, we briefly provide an overview on mobile social networks (and corresponding) systems, and sketch analysis options for social behavior in such networks. A detailed discussion of these aspects is provided in the subsequent sections. First, we start with a brief introduction to social networks and social media.
4.2.1 Social Networks and Social Media
Social networks and social media are key concepts for the analysis of mobile social networks. From a technical perspective, social networks typically consist of a set of actors (nodes) connected by links (edges). Usually, these relations are modeled as a graph. For example, we could consider friendship relationships or the “Follower” relationship in Twitter. Extensions consider multiple types of connections (links or relations) modeling the network as an (extended) hypergraph. From an analytic point of view, we can then analyze the networks using a number of techniques from the area of social network analysis (SNA) (Wasserman 1994).
With regard to social media, Kaplan and Haenlein define social media as a set of internet-based applications that apply principles of the Web 2.0 (Kaplan and Haenlein 2010). In this context, user-generated content plays a prominent role, that is, content being produced and shared by users online. In this chapter, we adopt a similarly intuitive definition, and consider social media as Internet-based systems and services in the ubiquitous Web that use and provide all kinds of social data of human interaction and communication. Both social media and mobile devices play an important role for connecting people through the social media artifacts. Therefore, we especially focus on social media that are being enabled by social mobile devices. This also includes data from sensor networks, as long as the data is created by real users. Essentially, mobile social networks are enabled by mobile devices; however, we do not constrain these to just networks on mobile, but include special kinds of networks and applications that are specifically created by mobile devices.
4.2.2 Mobile Social Networks
In this chapter, we aim to sketch a more comprehensive view on mobile social networks, in contrast to earlier work (e.g., Humphreys 2008) that mainly considered the social network on the mobile, i.e., the mobile device as just another technical device for accessing the social network. We specifically include networking options that are only possible on mobile and ubiquitous devices. This includes, for example, sensor networks, and ubiquitous computational systems enabled by RFID sensor networks as one prominent kind of mobile social network.
For the characteristics of mobile social networks, we therefore consider different devices which enable systems utilizing such networks. Basically, these include all devices for connecting people, for example, mobile phones, and RFID or Bluetooth tags. Specific studies for these include those using cell phones (Miluzzo et al. 2008) and Bluetooth-enabled devices and sociometric badges (cf., Chin et al. 2012; Eagle and Pentland 2006; Zhuang et al. 2012), as well as passive and active RFID tags, e.g., the proximity tags developed by the SocioPatterns consortium (http://www.sociopatterns.org), (e.g., Alani et al. 2009; Barrat et al. 2010). We describe these in more detail below; we especially focus on these sensors because they are utilized in the exemplary Conferator and MyGroup systems also described below. These systems provide attractive technical options for analyzing social behavior in mobile social networks: compared to the other discussed technologies, the active proximity tags are able to detect “real” contacts, that is, real face-to-face contacts between individuals. If the tags are worn on the front of the body, proximity of two tags indicates a face-to-face contact of the actors. In the analysis section below, we will consider exemplary analysis results in the context of such networks. In contrast, many technologies implementing mobile social networks, e.g., based on Bluetooth, mainly consider the “co-location” of the contacts. In an offline scenario, a network can then be created, for example, using frequent encounters – however, only as a proxy for contacts.
4.2.3 Analysis of Social Behavior in Mobile Social Networks
Mobile social networks are often created during certain events, for example, during conferences, at work, or other group-based activities. During a conference, for example, social contacts form an essential part of the experience of the participants. In general, the term “networking” is used for describing the inherent processes in such interactions. Typically, there are different (implicit and explicit) communities present at such events, defined according to interests or membership to certain tracks or special interest groups. In order to enhance the participating experience, ubiquitous computing approaches, e.g., based on RFID-tokens, can provide dynamic adaptation options. Mobile social networks can then be utilized, for example, for recommendations, or explanations of the current user context.
In the following, we focus on the analysis of key actors, roles, and communities. For the analysis, we can consider the static and dynamic behavior in mobile social networks. For the static behavior, we can simply analyze the network structure and derive basic statistics and characteristics from these. As an overall summary, such an analysis usually provides first insights into the link structure and behavioral characteristics. Different network types, for example, can then be distinguished by the diameter, contact distribution, degree distribution, or mean connectivity of the contained nodes. Identifying different “roles” of nodes, and finding so called “key actors”, has attracted a lot of attention, ranging from different measures of centrality (cf., Brandes and Erlebach 2005) to the exploration of topological graph properties (Gaertler 2004; Wongchokprasitti et al. 2010) or structural neighborhood similarities (Lerner 2005). For an analysis of the dynamic behavior, we can consider how the behavior changes and evolves during the event, i.e., the life cycle of the mobile social network. We can analyze time-based slices of the networks, for example, that is, snapshots of the network constructed using different time-thresholds for constructing the edges.
The analysis of communities intuitively considers densely connected subgroups of actors, represented as nodes in the social network. While there exist different definitions of communities, the above definition includes the core of most – focusing on the density of the connections within the community (Atzmueller and Mitzlaff 2011; Fortunato and Castellano 2007; Girvan and Newman 2002; Lancichinetti and Fortunato 2009; Newman 2004). In general, usually not only the density within the community is assessed, but the connection density of the community is compared to the density of the rest of the network (Newman 2004). Then, cuts between communities are established in such a way as to maximize the community evaluation function. For community-based roles, a prominent metric measures how much a node connects different communities (cf., Scripps et al. 2007; Chou and Suzuki 2010). It can be based on initially given community structures or on a probabilistic model.
Furthermore, the analysis of links within contact networks can be analyzed on a static or dynamic level, for example, considering link prediction (Liben-Nowell and Kleinberg 2003; Murata and Moriyasu 2007) on new or recurring contacts, their duration, and points in time (Scholz et al. 2012). This includes both static and dynamic properties of the social (contact) network.
4.3 Systems Enabling Mobile Social Networks
With regard to the analysis of mobile social networks, there have been several approaches. For example, Hui et al. (2005) describe an application using Bluetooth-based modules for collecting mobility patterns of conference participants. Furthermore, Eagle and Pentland (2006) present an approach for collecting proximity and location information using Bluetooth-enabled mobile phones. Cattuto et al. (2010) applied proximity sensing in the Sociopatterns project. Isella et al. (2011a) conducted further experiments on a variety of contact networks obtained via RFID technology. In addition, Alani and colleagues, e.g., (Alani et al. 2009), also added contact information from social online networks in the live social semantics experiments. In Barrat et al. (2010), the authors analyze social dynamics of conferences focusing on the social activity of conference participants in those experiments. They analyze, for example, their activity in social Web platforms such as Facebook, Twitter, and other social media, together with status and their research seniority. These experiments have also extended their focus from conferences to schools (Stehle et al. 2011) and hospitals (Isella et al. 2011b) using the SocioPatterns proximity tags. Chin et al. present mechanisms using WLAN and RFID positioning, e.g., (Chin et al. 2012; Zhuang et al. 2012) for their Find & Connect system. The system aims at connecting conference participants using location-based proximity as a proxy for face-to-face encounters and online social networks. Encounters based on the location can be estimated for constructing the mobile social networks, which enable flexible support of participants at conferences using localization and online network techniques.
The Conferator system (http://www.conferator.org), a social conference guidance system, uses the same technical basis (RFID tokens with proximity sensing) as the Sociopatterns project for connecting people. Essentially, Conferator and MyGroup – a similar system for working groups – are two applications (Atzmueller et al. 2012a; Atzmueller et al. 2011a) using social media for collective intelligence. Conferator offers conference participants the option to organize and manage their social contacts during conferences. For this purpose, active SocioPattern RFID tags are applied that allow to localize participants and to collect their face-to-face contacts. For these, the system allows the setup of a complete profile, the management of their own social contacts, social networking to other participants, and the management and personalization of the conference schedule. A similar application, MyGroup (Atzmueller et al. 2012), allows the support of social communication in the context of working groups using social-interaction-awareness by utilizing the same technology.
Conferator has been applied at a number of conferences, for example at the LWA 2010, LWA 2011, and LWA 2012 conferences of the German association of computer science, and at the ACM Hypertext 2011 conference. MyGroup is continuously running in the Knowledge and Data Engineering research group at the University of Kassel, and has also been applied at a number of different events, e.g., at a software development code camp to enhance social interactions and communication in developing software. The applied data mining methods are based on the community mining and key actor analysis techniques described above.
Using the SocioPatterns proximity tags, the system is able to detect proximity contacts. Due to the technical ability of the tags to detect contacts between each other, Conferator detects face-to-face contacts between actors, if the tags are worn on the front of the body. Therefore, in contrast to other approaches that apply passive RFID, Bluetooth, or WLAN, the active proximity tags allow a relatively accurate detection of the location of participants and of their face-to-face contacts for constructing mobile social networks.
4.4 Analysis of Mobile Social Behavior
This section focuses on social behavior in mobile social networks, and describes analysis options on different levels: It summarizes specific methods and techniques that can be used to characterize user and social behavior, for role mining and characterization, as well as dynamic community identification.
In the following, we primarily focus on the analysis of social behavior in mobile social networks, and include exemplary results obtained by the analysis of networks of the Conferator and MyGroup systems at different events.
For the static analysis, we mainly include common methods of social network analysis, providing overview statistics and centrality measures in the contact graph of the respective mobile networks. Furthermore, these can also be extended to a time-based analysis, considering different contact lengths of these networks. This bridges the path to more dynamic analysis, concerning the evolution of the networks. We consider individual behavior with regard to role characterization and provide examples of role patterns, before we describe an analysis of social behavior using link prediction methods. Furthermore, we discuss community mining, and provide examples of different community characterizations.
4.4.1 Characterization of Key Players
In social networks, key players are actors that are important for the network in terms of connectivity, number of contacts, and the paths that are passing through the corresponding node. There is a broad range of applications concerning the identification and characterization of key players. It can be applied for prestige and reputation mining, for identifying hubs in the network and for social monitoring. The assessment can happen on different layers. We can consider the network as a whole for discovering individual roles (Wasserman 1994). Additionally, we can consider roles in specific communities (Gaertler 2004). Finally, descriptive pattern mining and characterization can be applied for both layers, (e.g., Atzmueller et al. 2011b; Atzmueller and Mitzlaff 2011; Atzmueller and Puppe 2008; Macek et al. 2012).
For the first case, standard social network analysis (SNA) methods can be applied for analyzing the complete network structure (Wasserman 1994), for example for determining the mean path length between nodes, or for discovering the diameter of the network. Additionally, on the level of the whole network we can determine different centrality measures, in order to identify important nodes or hubs (Atzmueller et al. 2012b; Wasserman 1994). Examples are given by the degree centrality as the number of connections to the neighbors of the node, the betweenness centrality as the number of shortest paths of all node pairs that go through a specific node, or the closeness centrality that considers the length of these shortest paths. For the degree and betweenness centralities, high values indicate a higher importance, while the reverse is true for the closeness centrality (Wasserman 1994).
As an example, we can consider the contact network of the LWA 2010 conference that was obtained using the Conferator system (Atzmueller et al. 2012a, 2011a). In the network, we can observe higher centrality values for professors compared to other groups, for example, post-docs and students. An exception is given by the betweenness centrality, for which the post-docs showed the highest scores (cf. Atzmueller et al. 2012b). In these results, these findings indicate the potential influence in hierarchical relationships, for which the post-docs are contained in many shortest paths between the participants, and thus seem to have a very important function as bridges.
For a more detailed analysis, Table 4.1 summarizes exemplary analysis results focusing on the characterization of different status roles given a set of network properties (cf. Atzmueller et al. 2012b). Here, we focus on the application of descriptive pattern mining (Atzmueller et al. 2011b, 2012), that is, in identifying certain subgroups that are exceptional with respect to a certain property of interest. In our case, this property is given by a high share of a certain role, for example, “non-organizer” and “PhD student”. We observe, for example, that extreme values, i.e., sets of high and low centrality values, are also very significant for distinguishing PhD students. As expected, the combination with other strong influence factors increases the precision of the patterns (indicated by the lift parameter). The most descriptive factors for the non-organizer role are given by the closeness, eigenvalue centrality, and the degree, for which lower values than those of the organizers are measured. However, if we consider combinations of factors, we observe, that there are subgroups with regard to the non-organizer role, for which extreme values, e.g., the closeness together with the eigenvalue centrality, yield a significant increase in characterization power.
4.4.2 Characterizing Roles and Links
A related analysis to the identification of key players and according “status” roles is the characteristic behavior when establishing links. This is an analysis relating to link prediction, i.e., the prediction of new links between nodes in a network. Fundamental work in this area has been done by Liben-Nowell and Kleinberg (2003), considering standard network proximity measures, which has also been extended to weighted variants (Murata and Moriyasu 2007).
For analyzing influence factors for link prediction in mobile social networks, we consider the prediction of new and recurring links. In the following, we specifically consider human contact networks obtained using the Conferator system, and summarize results concerning the analysis of contacts patterns in those social networks, and their underlying mechanisms (cf. Scholz et al. 2012). Homophily (Rosvall and Bergstrom 2007), for example, is a classic topic of social network analysis. Similar to the RFID-based setting, Eagle and Pentland (2006) and Zhou et al. (2009) presented an analysis of proximity information collected by Bluetooth-based devices, similar to Xu et al. (2011), relating this to online social networks.
Table 4.2 shows exemplary results (cf. Scholz et al. 2012) of a descriptive link prediction analysis at the Hypertext 2011 conference in the form of characteristic patterns (Atzmueller et al. 2009; Atzmueller and Puppe 2008) that describe certain subgroups of the conference participants. The table shows combinations of influence/role factors that are significantly correlated with the duration of recurring contacts at the conference. In the table, we observe, for example, that people with a low affiliation, i.e., participants that are new to the conference, are still very active after the first day, i.e., on day 2 or 3 of the conference. Furthermore, being a session chair and being a professor increases the mean duration of contacts by 10 %, while considering the single factors separately decreases the duration (by 13 % and by 18 % respectively).
4.4.3 Characterization of Communities and Roles
Community mining (Lancichinetti and Fortunato 2009; Leskovec et al. 2010; Newman 2004; Newman and Girvan 2004) in social networks aims at discovering and analyzing (cohesive) subgroups, clusters, or communities that are “densely” connected with each other in a network. Standard techniques for the mining of communities include graph-based approaches (Girvan and Newman 2002), clustering according to features of the nodes, or pattern-mining techniques for optimizing a community evaluation function (Atzmueller and Mitzlaff 2011). The core idea of the evaluation function is to apply an objective evaluation criterion; for example, the number of connections within the community compared to the statistically “expected” number based on all available connections in the network, and to prefer those communities that optimize the evaluation function locally (Atzmueller and Mitzlaff 2011), or globally (e.g., Girvan and Newman 2002; Lancichinetti and Fortunato 2009).
In the context of mobile social networks, the discovered communities can then be applied, for example, for recommendations (Boratto et al. 2009; Gargi et al. 2011; Farzan and Brusilovsky 2007) or for personalization of intelligent systems (Boratto et al. 2009; Farzan and Brusilovsky 2007; Wongchokprasitti et al. 2010). In such cases, the community assignment can be made explicit, or the information about other members of the community can be used implicitly for the adaptation of the application. We focus on patterns characterizing specific community-oriented roles (Scripps et al. 2007), that is, how well certain participants are able to bridge communities, for example. Before that, we first focus on a time-based analysis considering how the social behavior measured by the length of contacts evolves during the LWA 2010 conference, using data obtained by the Conferator system. Both techniques can be applied in a recommendation setting, for example, for recommending people in interest-based communities, or for identifying influential bridges between different communities – based on the mined patterns.
For the time-based analysis, we utilized the MOSES algorithm (McDaid and Hurley 2010), and considered different time slices corresponding to different minimal contact lengths. Summarizing the setting in Atzmueller et al. (2012), we were able to use four different communities corresponding to special interest groups present at the conference, as a ground truth of interest-based communities. For the analysis, we considered their interactions with regard to different minimal conversation lengths (i.e., contact length between participants for their face-to-face conversations). In the following, we discuss exemplary results in this setting. Concerning our mobile social network of conference participants, the community results in Fig. 4.1 suggest that the communities tend to focus more on the special interest groups with an increasing minimum conversation length threshold. The communities start with a mixture of different interest groups, but concentrate more and more on special sub-communities. These findings suggest the trend that more specialized sub-communities of the special interest groups are mined. This is especially significant for higher minimal conversation length thresholds, see Fig. 4.1. In summary, this community-oriented analysis suggests, that participants actually tend to interact more frequently with members of their own special interest group for longer conversations.
Role mining with regard to communities mainly considers the relations between the communities for a specific actor. Scripps et al. (2007) present a method for assessing roles considering the membership in the communities and the potential to bridge or to connect different communities. In this way, different actor profiles concerning their centrality prestige and their community importance can be derived. Chou and Suzuki (2010) present a similar method considering a set of given communities for such a community-oriented analysis.
While the above methods mainly focus on the network and community structure, a simple characterization or description is usually not provided by standard methods for role and community mining. To this end, the characterization of actors and their roles is provided by descriptive pattern mining techniques (e.g., Atzmueller et al. 2011a, b; Atzmueller and Lemmerich 2012) that utilize different centrality measures and allow the characterization of role-specific nodes given different centrality measures. In this way, roles can get an intuitive interpretation given the network characteristics as depicted in Table 4.3, where we see exemplary results from the Hypertext 2011 conference (Macek et al. 2012). The table describes the community-oriented roles by different conference-oriented properties. In both cases, the VIKAMINE tool (Atzmueller and Lemmerich 2012) for pattern mining and subgroup analytics was applied for obtaining these characteristic patterns. They can then be inspected in a detailed context, for example, or they can be described by representative instance prototypes (cf., Atzmueller and Puppe 2008).
4.5 Conclusions
Pervasive and ubiquitous applications, in addition to the advances in technology, have created a number of options for mobile social networking. This chapter has presented different aspects of mobile social networks, and the emerging social behavior in those, especially focusing on roles, the creation of links, and social behavior in communities. We have summarized different exemplary systems, and discussed related analysis results. Then, ultimately, the analysis and understanding of such phenomena bridges the gap to collective intelligence (Malone et al. 2009; Mitchell 2009), and provides different options for making use of the collected information (and derived knowledge) for integrating it into smart ubiquitous and social systems.
References
Alani, H., Szomszor, M., Cattuto, C., den Broeck, W. V., Correndo, G., & Barrat, A. (2009). Live social semantics. In Proceedings of international semantic Web conference (pp. 698–714). LNCS 6497, Springer Verlag, Heidelberg, Germany.
Atzmueller, M., & Lemmerich, F. (2012). VIKAMINE – Open-source subgroup discovery, pattern mining, and analytics. In Proceedings ECML/PKDD 2012: European conference on machine learning and principles and practice of knowledge discovery in databases. Lecture notes in computer science, Vol. 7524, pp. 842–845. Heidelberg: Springer
Atzmueller, M., & Mitzlaff, F. (2011). Efficient descriptive community mining. In Proceedings of the 24th international FLAIRS conference (pp. 459–464). Palo Alto, CA, USA: AAAI Press.
Atzmueller, M., & Puppe, F. (2008). A case-based approach for characterization and analysis of subgroup patterns. Journal of Applied Intelligence, 28(3), 210–221.
Atzmueller, M., Lemmerich, F., Krause, B., & Hotho, A. (2009). Who are the spammers? Understandable local patterns for concept description. In Proceedings of the 7th conference on computer methods and systems (pp. 151–156). University of Krakow, Krakow, Poland.
Atzmueller, M., Benz, D., Doerfel, S., Hotho, A., Jäschke, R., Macek, B. E., et al. (2011a). Enhancing social interactions at conferences. it – Information Technology, 53(3), 101–107.
Atzmueller, M., Benz, D., Hotho, A., & Stumme, G. (2011b). Towards mining semantic maturity in social bookmarking systems. In Proceedings of the 4th international workshop on social data on the Web.
Atzmueller, M., Becker, M., Doerfel, S., Kibanov, M., Hotho, A., Macek, BE., Mitzlaff, F., Mueller, J., Scholz, C., & Stumme, G. (2012a). Ubicon: Observing social and physical activities. In Proceedings of the 4th IEEE international conference on cyber, physical and social computing (CPSCom) (pp. 317–324). Washington, DC, USA: IEEE Press.
Atzmueller, M., Doerfel, S., Mitzlaff, F., Hotho, A., & Stumme, G. (2012b). Face-to-face contacts at a conference: Dynamics of communities and roles. In Modeling and mining ubiquitous social media. Lecture notes in computer science, Vol. 7472, pp. 21–39. Heidelberg: Springer.
Barrat, A., Cattuto, C., Szomszor, M., den Broeck, W. V., & Alani, H. (2010). Social dynamics in conferences: Analyses of data from the live social semantics application. In Proceedings of international semantic Web conference. Lecture notes in computer science, Vol. 6497, pp. 17–33. Heidelberg, Germany: Springer
Boratto, L., Chessa, A., Agelli, M., & Clemente, M. L. (2009). Group recommendation with automatic identification of user communities. In Proceedings IEEE/WIC/ACM international joint conferences on Web intelligence and intelligent agent technologies, Vol. 3, pp. 547–550. Milan, Italy.
Brandes, U., & Erlebach, T. (Eds.) (2005) Network analysis: Methodological foundations. In U. Brandes, T. Erlebach (Eds.) Network analysis. Lecture notes in computer science, Vol. 3418. Heidelberg: Springer.
Cattuto, C., den Broeck, W. V., Barrat, A., Colizza, V., Pinton, J. F., & Vespignani, A. (2010). Dynamics of person-to-person interactions from distributed RFID sensor networks. PLoS One, 5(7), 1–9.
Chin, A., Xu, B., Wang, H., Chang, L., Zhu, L., & Wang, H. (2012). Connecting people through physical proximity and physical resources at a conference. To be published in ACM Transactions on Intelligent Systems and Technology.
Chou, B. H., & Suzuki, E. (2010). Discovering community-oriented roles of nodes in a social network. In Data warehousing and knowledge discovery. Lecture notes in computer science, Vol. 6263, pp. 52–64. Heidelberg: Springer.
Eagle, N., & Pentland, A. S. (2006). Reality mining: Sensing complex social systems. Personal Ubiquitous Computing, 10(4), 255–268.
Farzan, R., & Brusilovsky, P. (2007). Community-based conference navigator. Socium: Adaptation and Personalisation in Social Systems: Groups, Teams, Communities. Workshop/UM 2007.
Fortunato, S., & Castellano, C. (2007). Community structure in graphs. Encyclopedia of complexity and system science. Springer. arXiv:0712.2716, 42 pages.
Gaertler, M. (2004). Clustering. In Network analysis: Methodological foundations (pp. 178–215). Berlin: Springer.
Gargi, U., Lu, W., Mirrokni, V., & Yoon, S. (2011). Large-scale community detection on YouTube for topic discovery and exploration. In Proceedings of the 5th international AAAI conference on weblogs and social media (pp. 486–489). Palo Alto, CA, USA: AAAI Press.
Girvan, M., & Newman, M. E. J. (2002). Community structure in social and biological networks. Proceedings of the National Academy of Sciences, 99, 7821–7826.
Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., & Diot, C. (2005). Pocket switched networks and human mobility in conference environments. In Proceedings 2005 ACM SIGCOMM workshop on delay-tolerant networking (pp. 244–251). WDTN’05, New York: ACM.
Humphreys, L. (2008). Mobile social networks and social practice: A case study of Dodgeball. Journal of Computer-Mediated Communication, 13(1), 341–360.
Isella, L., Stehle, J., Barrat, A., Cattuto, C., Pinton, J. F., & den Broeck, W. V. (2011a). What’s in a crowd? Analysis of face-to-face behavioral networks. Journal of Theoretical Biology, 271(1), 166–180.
Isella, L., Romano, M., Barrat, A., Cattuto, C., Colizza, V., den Broeck, W. V., Gesualdo, F., Pandolfi, E., Rava, L., Rizzo, C., & Tozzi, A. E. (2011b). Close encounters in a pediatric ward: Measuring face-to-face proximity and mixing patterns with wearable sensors. CoRR abs/1104.2515.
Kaplan, A., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of social media. Business Horizons, 53(1), 59–68.
Lancichinetti, A., & Fortunato, S. (2009). Community detection algorithms: A comparative analysis arxiv:0908.1062. Physical Review, E80.
Lerner, J. (2005). Role assignments. In U. Brandes & T. Erlebach (Eds.), Network analysis (Lecture notes in computer science, Vol. 3418, pp. 216–252). Berlin/Heidelberg: Springer.
Leskovec, J., Lang, K. J., & Mahoney, M. (2010). Empirical comparison of algorithms for network community detection. In Proceedings of the 19th international conference on world wide web (WWW ’10) (pp. 631–640). New York: ACM.
Liben-Nowell, D., & Kleinberg, J. M. (2003). The link prediction problem for social networks. In Proceedings of CIKM (pp. 556–559).
Macek, B. E., Scholz, C., Atzmueller, M., & Stumme, G. (2012). Anatomy of a conference. In Proceedings of Hypertext 2012 (pp. 245–254). New York, NY, USA: ACM Press.
Malone, T. W., Laubacher, R., & Dellarocas, C. (2009). Harnessing crowds: Mapping the genome of collective intelligence. In MIT Center for Collective Intelligence. MIT, Boston, USA.
McDaid, A., & Hurley, N. (2010). Detecting highly overlapping communities with model-based overlapping seed expansion. In Proceedings of the 2010 international conference on advances in social networks analysis and mining. ASONAM’10, (pp. 112–119). Washington, DC: IEEE Computer Society.
Miluzzo, E., Lane, N. D., Fodor, K., Peterson, R., Lu, H., Musolesi, M., Eisenman, S. B., Zheng, X., & Campbell, A. T. (2008). Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application. In Proceedings SenSys’08 (pp. 337–350). New York: ACM Press.
Mitchell, T. M. (2009). Mining our reality. Science, 326, 1644–1645.
Murata, T., & Moriyasu, S. (2007). Link prediction of social networks based on weighted proximity measures. In Proceedings of IEEE/WIC/ACM international conference on Web intelligence (pp. 85–88).
Newman, M. E. J. (2004). Analysis of weighted networks. http://arxiv.org/abs/condmat/ 0407503.
Newman, M. E., & Girvan, M. (2004). Finding and evaluating community structure in networks. Physical Review. E, Statistical, Nonlinear, and Soft Matter Physics, 69(2), 026113.1–15.
Rosvall, M., & Bergstrom, C. (2007). An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences, 104(18), 7327.
Scholz, C., Atzmueller, M., & Stumme, G. (2012). On the predictability of human contacts: Influence factors and the strength of stronger ties. In Proceedings of fourth ASE/IEEE international conference on social computing (SocialCom) (pp. 312–321). Boston: IEEE Computer Society.
Scripps, J., Tan, P. N., & Esfahanian, A. H. (2007). Exploration of link structure and community-based node roles in network analysis. In Proceedings of the 7th international conference on Data Mining (pp. 649–654). Washington, DC, USA: IEEE Press.
Stehle, J., Voirin, N., Barrat, A., Cattuto, C., Isella, L., Pinton, J. F., Quaggiotto, M., den Broeck, W. V., Regis, C., Lina, B., & Vanhems, P. (2011). High-resolution measurements of face-to-face contact patterns in a primary school. CoRR abs/1109.1015.
Wassermann, S., & Faust, K. (1994). Social network analysis. Cambridge: Cambridge University Press.
Wongchokprasitti, C., Brusilovsky, P., & Para, D. (2010). Conference navigator 2.0: community-based recommendation for academic conferences. In Proceedings of workshop social recommender systems. IUI’10, Hong Kong.
Xu, B., Chin, A., Wang, H., Chang, L., Zhang, K., Yin, F., Wang, H., & Zhang, L. (2011). Physical proximity and online user behavior in an indoor mobile social networking application. In Proceedings of the 4th IEEE international conference on cyber, physical and social computing (CPSCom 2011) (pp. 273–282). Washington, DC, USA: IEEE Press.
Zhou, T., Lu, L., & Zhang, Y. (2009). Predicting missing links via local information. The European Physical Journal B, 71(4), 623–630.
Zhuang, H., Chin, A., Wu, S., Wang, W., Wang, X., & Tang, J. (2012). Inferring geographic coincidence in ephemeral social networks. In Proceedings of European conference on machine learning and principles and practice of knowledge discovery in databases (ECML PKDD). Lecture notes in computer science, Vol. 7524, pp. 613–628. Heidelberg, Germany: Springer.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this chapter
Cite this chapter
Atzmueller, M. (2014). Social Behavior in Mobile Social Networks: Characterizing Links, Roles, and Communities. In: Chin, A., Zhang, D. (eds) Mobile Social Networking. Computational Social Sciences. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8579-7_4
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8579-7_4
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8578-0
Online ISBN: 978-1-4614-8579-7
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)