=Paper=
{{Paper
|id=Vol-1830/Paper53
|storemode=property
|title=A Survey of Influential Nodes Detection Methods in Mobile Phone Network
|pdfUrl=https://ceur-ws.org/Vol-1830/Paper53.pdf
|volume=Vol-1830
|authors=Elizabeth N. Onwuka,Bala A. Salihu,Sheriff Murtala
}}
==A Survey of Influential Nodes Detection Methods in Mobile Phone Network==
International Conference on Information and Communication Technology and Its Applications (ICTA 2016) Federal University of Technology, Minna, Nigeria November 28 – 30, 2016 A Survey of Influential Nodes Detection Methods in Mobile Phone Network Elizabeth N. Onwuka, Bala A. Salihu, and Sheriff Murtala Department of Telecommunications Engineering, Federal University of Technology, Minna, Nigeria Abstract—The number of mobile phone users is increasing CDR contains metadata that describes a specific instance tremendously. The social interaction between these mobile of a telecommunication transaction (calls, messages and phone users can be represented using social network graphs. Internet services) but does not include the content of that This type of study has very important applications in various transaction, for example, CDR for a particular call contains areas especially in the detection of criminal groups who also both the caller and receiver‘s number, the time stamp (date use these devices to interact and plan their activities. and time), the duration of the call, the base station ID of the Moreover, the study of identifying influential nodes in social caller‘s location and other related information. CDR may network of any kind is currently receiving attention in the capture thousands or millions of users within a specific time research arena. This is because identification of influential and place and it can be used to create a network of mobile nodes of any network is significant to understanding the network. This becomes very important if the network in phone subscribers. CDR is a huge repository of human question is a criminal network, considering the insecurities of behavioural data and it belongs to the group of data being the current time. In this paper, a survey of influential nodes currently described as Big Data. The information from CDR detection methods is carried out, we first define the problems reveals the inter-relationship network between mobile phone associated with influential nodes detection and then examine subscribers at various spheres, generally called social various methods of identifying influential nodes. We also networks. A mobile phone network is a social structure that consider techniques employed in analysing users in the mobile represents the interconnection of mobile phone subscribers phone network. based on call detail record (CDR). An example of a social network of mobile phone users is shown in Fig. 1. The idea Keywords—social network; mobile phone network; of forming a social interaction between mobile phone users influential nodes detection; centrality measures; support researchers in the different area of studies like personal mobility prediction, fraud detection in telecommunication [2], urban planning and development, geographical partitioning [3] and intelligence gathering for national security [4]. I. INTRODUCTION Human beings normally form groups or clusters based on Since the invention of mobile communication and other certain commonalities. These groups (called communities) services attached to it, many people find it better and cheaper also reflected on the communication data. Networks are to communicate using the medium than wired made up of communities and in each community, there are communication thereby attracting more subscribers to use nodes with varying degrees of influence, these nodes are mobile communication network. A survey carried out by called influential nodes. A good area of application of mobile international telecommunication union (ITU) shows that the phone network is in the detection of influential mobile population of mobile phone subscribers increased from 738 subscribers. For instance, a network of mobile phone million in the year 2000 to 7 billion in 2015 and within this subscribers which is created by collecting call record same time the proportion of population covered by a 2G information from a reasonable number of actors (that act as mobile cellular network increased from 58% to 95% with seeds) will consist of different communities and some users more remote areas captured [1]. In developing countries, at within these communities will influence other users either least one member of every household communicates using a positively or negatively. The major problem in this area is mobile phone. Each subscriber enjoys making calls and how to accurately determine the genuine influential receiving calls from other users and enjoys the same for short individuals in a social network. In this paper, we present an messages and Internet services. Telecommunication overview of various ways of finding influential nodes in a networks have really made the world a global village in the social network. sense that peoples‘ social reach has expanded even across The remainder of this paper is organised as follows: borders. The log of activities of each user is stored on the Section II provides a brief background and review of related user‘s phone and also recorded with the Mobile Network works. Section III describes different methods of identifying Operators (MNOs). The information collected by the MNOs influential nodes in a mobile phone network. Finally, we is referred to as Call Detail Record (CDR). conclude this paper in Section IV. 213 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) in the social network. This is added to the fact that researchers and investigators have taken full advantage of social network analysis to unravel the operation of terrorists and criminals [4]. Crime investigation application becomes more necessary now that communication networks have changed the way people live and transact business. It is intuitively believed that criminals rely on this network for planning criminal activities of all sorts. In our study, we focus on identifying important and interesting nodes in a mobile phone network and we discuss some of the previous studies that have been done in this research area by first looking at the major problems and concepts employed in the detection of important nodes and different approaches that had been applied so far. Vertex list, V Edge List, E Weight, W A C B 10 B F G 15 C D F 3 D A E 12 E E D 7 F A F 13 Figure 1. A snapshot of a mobile phone network sample with circles indicating mobile phone users and edge weight colour coded from yellow G C E 4 (weak link) to red (strong link) [5] E F 9 A B 9 A G 12 II. RELATED WORK B E 14 C A 8 2.1 Background D B 11 There is a rapidly growing literature on influential nodes Graph, G = (V,E,W) discovery in social networks, which indicates that a lot of study had been carried out in this field [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17]. However, due to the challenges of getting mobile phone data, little studies have Figure 2. Modelling graph from a set of vertex, edge and weight. been carried out on discovering communities and important mobile subscribers in the mobile phone network. A mobile 2.2 Influential Nodes Detection Problem phone network is treated like any other social network that has a tree network structure. Social network is usually Influential nodes are set of nodes whose roles are very modelled as a graph, G=(V,E), where V is a set containing important in the spread of influence across the network. all nodes (actors) in the network and E is also a set These nodes have the tendency to influence other nodes containing all edges (links) between two elements (pairs) of either constructively or destructively. Influential nodes and set V. If the direction of the edges is considered the graph is ―key nodes‖ seem to be the same. According to Borgatti [6], said to be directed or undirected if otherwise. Also, when the influential nodes‘ problem can either be a key player corresponding weight, W of the edges is considered, the problem positive (KPP-Pos.) or key player problem negative graph, G=(V,E,W) is said to be weighted or binary (KPP-Neg.). KPP-Pos. is defined with respect to the way key (unweighted) if otherwise. A simple description of how an nodes are connected and integrated into the network, while undirected and weighted graph is modelled from set V, E and KPP-Neg. is defined in relation to the network reliance on its W is shown in Fig. 2. key nodes to sustain its connectedness. Exploring social network data requires basic concepts of Recently, [7][16] presented an overview of existing graph representation, analysis and visualisation [18]. These techniques of finding important and influential nodes in concepts include centrality measures, shortest path problems, social networks. In this paper, we extend the study of Probst clustering techniques and network density. This is necessary by reviewing more novel approaches in finding prominent when interpreting the result in order to have a good nodes in the social network with emphasis on mobile phone understanding of the social interactions between nodes in a network. For clarity, we classify some of the previous work network. Due to the rich resources in social network on influential nodes detection into two categories: centrality analysis, it serves as a tool for analysing and visualising big and non-centrality measures. data [19]. Some major areas of study in the social network 1) Centrality measures analysis are community structure, detection of cliques and In graph theory and network analysis, the most important discovery of key nodes and neighbours. Recently, more tool is centrality measure. Centrality measures are attention has been given to the detection of influential nodes considered as structural measures of influence that indicate 214 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) a user‘s position in a social network. Degree centrality, bridge along the shortest path between two other nodes. The betweenness centrality, closeness centrality, and eigenvector betweenness centrality of a user, v is given by centrality are the four widely used centrality measures in st (v) determining the relative importance of a user within a BC (v) s t vV st (4) network. Although these measures have limitations, they have been proven to be the basis of other methods of identifying key nodes based on specific purposes within a where st is the number of shortest paths in the graph, G social network [20]. between nodes ―s‖ and ―t‖; st (v) is the number of shortest paths in the graph, G between nodes ―s‖ and ―t‖ that a) Degree Centrality: is defined as the number of pass through user ―v‖. Nodes with high betweenness are edges incident upon a user. In other words, this measure responsible for controlling the spread of information across indicates how many nodes can be directly reached by a the graph. However, they might not be responsible for particular node. The degree centrality of a user, v is given causing maximum disconnection (fragment) within the by: network [6]. Brandes also presented an algorithm for computing the betweenness index of a large number of DC (v) deg(v) (1) nodes [25]. d) Eigenvector Centrality: Eigenvector centrality (also deg(v, G) |{u V : (u, v) E}| (2) called eigencentrality) is a measure of how well a particular user is connected to other influential nodes. This is one of Nodes with high degree centrality score might be the oldest centrality measures developed to assist the social considered influential. The flaw of this centrality measure is analyst in recognising the behaviour of people [26]. To that it relies on direct connections between nodes. Using this determine eigenvector centrality, it is imperative to first find individual centrality alone to determine the key nodes will the adjacency matrix, A of the graph, G. Given result in the selection of nodes that only have a high number A a(v, u) for a binary network. of direct connections. b) Closeness Centrality: According to Bavelas, Where: closeness centrality of a user as the reciprocal of the sum of its distances from all other nodes [21]. This measure is 0, 1, if the link between node v and u exist , effective in describing the hierarchy among members of a a v, u group and can also be used to indicate how fast a user can otherwise. reach every other user in the network. The closeness centrality of a user, v is given by: The eigenvector centrality of a node, v is mathematically defined as: 1 1 CC (v) d (v, u ) (3) xv x uM ( v ) u (5) u The boundary of the summation, is all members of the where (u, v) E and d (v, u ) is the sum of the length set of neighbours of v, M(v). In matrix representation, eigenvector centrality is expressed mathematically as: of all shortest paths from u all other nodes from node ―v‖. Okamoto et al. [22] introduced an efficient algorithm for discovering the top k-highest closeness centrality nodes 1 xv Axu (6) called TOPRANK. The algorithm is made up of the approximate algorithm and exact algorithm. The approximate algorithm is applied to identify the top nodes Where is the eigenvalue (constant) and xv is the with high centrality scores while the exact algorithm is used corresponding eigenvector of the adjacency matrix, A. to rank the detected nodes. [23] presented a closeness Eigenvector centrality is much related to Katz centrality centrality algorithm that efficiently determines the closeness [27], a universality of degree centrality. Katz centrality scores of each user any time the social network structure is measures the relative influence of nodes within a social modified. The changes involve the insertion of a new edge network by determining the number of the immediate or the removal of an existing edge. neighbours (first-degree nodes) and also all further nodes in c) Betweenness Centrality: Betweenness-based the network that connect to the node under consideration centrality measures were first introduced by Freeman in through these close neighbours. [24]. The author discovered that it is important to generalise e) Other Centrality-Based Approaches: The number of the concept of point centrality and structural properties of centrality measures extends beyond the four metrics the social network from past study[21]. Betweenness discussed earlier. It is quite interesting that most of the new centrality expresses the number of times a user acts as a measures were related one way or the other to the four most 215 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) popular centrality measures with a little modification. closeness centrality, betweenness centrality and eigenvector Stephenson and Zelen suggested a new centrality measure centrality to determine the influence factor of actors in an called Information centrality [28]. This centrality has online social network obtained from Facebook [9]. The study statistical theory background that considers all the path shows that these three centrality measures are important in signals in a social network. Although this centrality is measuring the influence of each user and as well as the applied to undirected networks only, it supersedes other influence of the entire social network. Srinivas and traditional centrality measures in identifying the most Velusamy [10] presented an algorithm that combines degree central nodes. In [29], the authors proposed an optimal inter- centrality and clustering coefficient to discover influential centrality measure, which takes into account both the user‘s nodes in three different datasets collected from Facebook. The clustering coefficient feature is used to enhance the centrality and its impact on the centrality of the other nodes. traditional degree centrality. According to their study, the Using a criminal network, the authors‘ findings indicated nodes with the least degree indicated that they are more that the key criminal is criminal with the highest optimal connected and thus, the most influential. The algorithm is inter-centrality in the network and the removal of this found to be effective in discovering important nodes. In [38], criminal would greatly reduce the crime rate. In [30] and a criminal network is constructed and analysed using [31], the authors extended the work of Ballester et al., by PageRank and other centrality measures to identify key presenting an inter-centrality with key group dimension. criminals. The modified inter-centrality explores the key group whose 2) Non-centrality measures nodes are different from the nodes with highest individual In this subsection, we consider previous studies that inter-centralities. employed other techniques different from centrality Ilyas and Radha introduced a new centrality called approach in detecting influential nodes. principal component centrality (PCC), a variant of a) Information theory: Shetty and Adibi [39] presented eigenvector centrality [32]. PCC is based on principal an information theory approach called graph entropy to component analysis (PCA) and karhunen loeve transform discover the dominant nodes within a social network. The (KLT) which handles graph adjacency matrix as a covariance matrix. Contrary to eigenvector centrality, PCC graph entropy of the entire network is determined every provides more features for centrality computation. Moreover, time a user is removed from the network. The removal of an investigation was carried out to detect influential nodes in nodes that cause great disorder in the graph entropy are seen two separate datasets using eigenvector centrality and as influential nodes. Furthermore, [40] described an entropy principal component centrality [33]. Their results showed measure based on Shannon measure of uncertainty. This that eigenvector centrality considered the most influential entropy is applied to networks whose traffic moves along node within the largest community in a network and paths by transference. One great advantage of this measure consequently ranks the neighbours of the influential node is nodes with betweenness score of zero can actually have and ignores other nodes in the remaining small communities reasonable entropy values. In another developmental study, that have low eigenvector scores. In the case of PCC, it Ortiz-Arroyo et al. [41] proposed two entropy-based considered both the nodes in the largest community and measures called connectivity entropy and centrality entropy. other nodes with zero eigenvalues in small communities. The authors further demonstrated how the entropy-based Despite the introduction of these new centrality measure can effectively solve the two key player problems measures, the fact still remains that an individual centrality [6]. Although their result is similar to that of combinatorial measure might not be the most appropriate for identifying optimisation algorithms the major setback for entropy influential nodes in a social network. A centrality measure is approach is it cannot work on large graphs. The approach is applied depending on a specific role of nodes in the network. computationally difficult to implement because it requires a For instance, nodes that are influential gossipers or most path finding algorithm to simplify the operation of the spreaders of virus function as information regulators in the entropy centrality. network. Another different purpose is identifying nodes that can maximally disrupt the social network. The irregularities b) Activity Based: This measure focuses on the in some of these individual centrality measures have open up activities between nodes in a social network. Goldenberg et fascinating research fields on group and improved centrality al.[42] claimed that some individuals are more important measures that can be universal in identifying the most than others based on their activity. The authors proposed an influential nodes [34][35]. Some studies also considered activity based measure for identifying influential nodes by combining two or more centralities measures in getting a selecting hub with high in-degree and out-degree in a general set of influential nodes. Sathik and Rasheed directed network. Heidemann et al. revealed that not all proposed an algorithm to identify sets of key players based connection links are active in a social network and the on centrality measures [36]. The authors addressed the key active links are insignificant [43]. They proposed an player problems [6], using closeness centrality, degree undirected activity based measure by modifying the centrality and betweenness centrality. Zaman [37] in his PageRank algorithm for discovering important nodes in the (unpublished) PhD thesis recommended a new centrality network. The modified PageRank also considers the measure known as rumor centrality that determines the source of rumor (gossip) and how influence (gossip) spread weighted edges between the nodes. across a microblogging website (twitter). c) User Preferences and Attributes: Zhang et al.[11] Lately, in order to adequately discover real influential developed an algorithm while trying to solve the influence nodes. Ahsan et al. described a scheme that combines maximisation problem called greedy algorithm based on 216 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) user preferences (GAUP). The algorithm is applied along machine learning technique that aims to find out how one with an extended independent cascade (EIC) model and item affects another by analysing how frequently certain takes the user preferences into the influence diffusion items appear together in a specific dataset [15]. ‗Association process, thus making it the first algorithm that mines the rule learning is carried out by applying two norms, namely, top-k influential nodes based on user preferences while support and confidence. Support specifies the proportion of trying to solve influence maximisation problem. This such items, while confidence specifies how many times algorithm surpasses the existing greedy algorithm that uses those rules in the whole dataset are accurate. The influential independent cascade (IC) model. Canali and Lancellotti [44] nodes are listed as nodes with a confidence level of 95% and presented a numerical method of detecting key nodes in a above. The technique is easy to implement and proven to be social network by considering the nodes‘ attributes similar to PageRank and degree centrality. (personal information, nodes preferences, activities, uploaded contents, content accesses). The desired attributes of the nodes were collected and summed up using principal III. IDENTIFYING INFLUENTIAL NODES IN A MOBILE PHONE component analysis (PCA). The dimension of the PCA is NETWORK matched with the nodes attributes and the dimension that In this section, research methods that are applied in greatly reflect the nodes‘ attributes is considered in defining detecting influential nodes in mobile phone networks were a metric that determines the influential nodes in the social discussed. Over time, researchers attempted to study and network. For each metric selected, the authors ranked the analyse Call Detail Record (CDR) [5][45]. However, Mobile nodes and selected the top influential nodes accordingly. Network Operator(s) (MNOs) are strongly reluctant to release mobile phone data to the public due to privacy issue. d) Profile based characteristics: Nodes interactions are In cases where CDR is released to third parties, MNOs might characterised as either popular, active or both. Eirinaki et al. conceal the identity of their users or non-disclosure introduced a measure named ProfRank [12], that uses the agreement (NDA's) contract is involved in protecting popularity and activity characteristics to identify the most customers' privacy. But if the agreement fails, another way to influential nodes within a social network. The authors also collect CDR from mobile phone users is to develop a showed that the measure performed better than betweenness programme that extract users‘ log of activities. The centrality and Pagerank. programme is usually installed on user‘s mobile phone and each information retrieved from the user is stored in a e) Influence Graph: Agarwal et al.[13] argued that dedicated database [46]. The process is expensive and takes influential bloggers are not necessarily active bloggers longer time but the result worth it. (nodes) on a blogging website. The authors defined Kiss and Bichler [47] compared the performances of statistical properties (recognition, activity generation, seven existing centrality measures including SenderRank, a novelty and eloquence) that are related to influence between new technique which was developed by the authors, to a blog post and proposed an influence graph model that identify influential users in a social network constructed measures the influence of each blog post across the from a dataset collected from a telecom company. community blog site. The influence is dependent on the SenderRank and Out-degree centrality performed well in determining the most central nodes in a network of calls influence flow and additive weight function that regulates a from a telecommunication company. In [48], degree number of comments. The influence score is assigned to centrality and betweenness centrality were combined with each blog‘s post. The maximum influence score is selected various seeding strategies to discover prominent nodes in an as the reference and its influence score as the blogger index. anonymized mobile phone network and two other social Using this index, the bloggers are ranked accordingly to the networks. index and the most influential bloggers are the top ranked. Catanese et al. [49] proposed a tool called LogAnalysis f) ShaPley value-based: Narayanam and Narahari, for scientific analysis of real phone call networks. This social while trying to solve the influence maximisation problem network analysis tool provides both statistical and visual proposed an algorithm called ShaPley value-based representation of real mobile phone network. Different centrality measures are featured in the statistical operation of Influential Nodes (SPINs)[14]. Eventually, SPINs solved this tool and they are used in ranking users according to how the top-k nodes problem and -coverage problem. The top- important they are in the phone call networks. The k problem involves the discovery of a set of influential application of this tools is not only restricted to phone call nodes for maximising the spread of information. The - networks but can also be applied in investigating criminal coverage problem focuses on the identifying the set of networks [50]. influential nodes having least cardinality with which it is Han et al. [17] presented a program called iWander that possible to influence a fixed percentage, of the nodes in runs on the mobile device of users (nodes). Random walk the social network through the process of diffusion. The messages are sent to the users at fixed length of time. authors showed that SPIN is computationally efficient when iWander determines the most influential users by computing the centrality of each node based on the total random walk compared to other existing greedy algorithms. messages received by each node. The authors carried out a g) Association Rule Learning: Erlandsson et al. theoretical analysis of the program and showed that discovered influential nodes in a social network by applying influential nodes identified by iWander can regulate the asocial rule learning. ―Association rule learning is a spread of communicable diseases and can further be used to 217 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) avoid a total epidemic. We summarised these methods in [10] A. Srinivas and R. L. Velusamy, ‗Identification of influential users Table 1. from social networks based on Enhanced Degree Centrality Measure‘, in Advance Computing Conference (IACC), 2015 IEEE International, 2015, pp. 1179–1184. TABLE I. INFLUENTIAL NODES DETECTION TECHNIQUES IN MOBILE PHONE NETWORK [11] Y. Zhang, Z. Wang, and C. Xia, ‗Identifying Key Users for Targeted Marketing by Mining Online Social Network‘, 2010, pp. 644–649 Mobile [12] M. Eirinaki, S. P. S. Monga, and S. Sundaram, ‗Identification of Authors Technique Components phone influential social networkers‘, Int. J. Web Based Communities, vol. 8, Dataset no. No. 2, pp. 136–158, 2012. Centrality In-degree, out-degree, [13] N. Agarwal, H. Liu, L. Tang, and P. S. Yu, ‗Identifying the influential Kiss and measures and betweenness, closeness, Yes bloggers in a community‘, in Proceedings of the 2008 international Bichler[25] non-centrality Pagerank, SenderRank conference on web search and data mining, 2008, pp. 207–218. Centrality Hinz et al., [27] measures and Centrality measures and Yes [14] R. Narayanam and Y. Narahari, ‗A Shapley Value-Based Approach to non-centrality seeding techniques. Discover Influential Users in Social Networks‘, IEEE Transactions on Automation Science and Engineering, vol. 8, no. 1, pp. 130–147, Catanese et al., LogAnalysis Centrality measures. Yes Jan. 2011. [46] Centrality measures [15] F. Erlandsson, P. Bródka, A. Borg, and H. Johnson, ‗Finding Han et al., [48] iWander based on random walk Yes Influential Users in Social Media Using Association Rule Learning‘, sampling. Entropy, vol. 18, no. 5, p. 164, Apr. 2016. [16] S. Singh, N. Mishra, and S. Sharma, ‗Survey of various techniques for determining influential users in social networks‘, in Emerging Trends in Computing, Communication and Nanotechnology (ICE- IV. CONCLUSION CCN), 2013 International Conference on, 2013, pp. 398–403. We presented a background study on the detection of [17] B. Han, J. Li, and A. Srinivasan, ‗Your friends have more friends than you do: Identifying influential mobile users through random-walk influential nodes and considered the key player problems as sampling‘, IEEE/ACM Transactions on Networking, vol. 22, no. 5, our focus in this study. We also discussed some of the pp. 1389–1400, 2014. previous studies related to discovering the most important [18] A. Abraham, Ed., Computational Social Networks. London: Springer and interesting nodes in a social network. We observed that London, 2012. centrality measures are more general and effective in the [19] M. Lieberman, ‗Visualising big data: Social network analysis‘, in detection of influential nodes in social networks and mobile Digital research conference, 2014. phone network. Though, results of using non-centrality [20] D. M. B. Friedl and J. Heidemann, ‗A critical review of centrality measures are comparable to centrality measures approach. measures in social networks.‘, Business & Information Systems Thus, the idea of combining two or more centrality measures Engineering, vol. 2, no. 6, pp. 371–385, 2010. would improve detection and solve the influential nodes‘ [21] A. Bavelas, ‗Communication patterns in task-oriented groups., 22(6)‘. J. Acoust. Soc. Am, 1950. detection problem. [22] K. Okamoto, W. Chen, and X.-Y. Li, ‗Ranking of closeness centrality It would be quite interesting if this study can cover other for large-scale social networks‘, in International Workshop on areas of communication network of wireless sensors, internet Frontiers in Algorithmics, 2008, pp. 186–195. hubs and access points. [23] Ahmet Erdem Sarýyu¨ce, Kamer Kaya, Erik Saule, and U¨ mit V. C¸ atalyu¨rek, ‗Incremental closeness centrality in distributed memory.‘, REFERENCES Parallel Computing, vol. 47, pp. 3–18., 2015. [24] L. C. Freeman, ‗A Set of Measures of Centrality Based on [1] ‗The world in 2014: ICT Facts and Figures. International Betweenness‘, Sociometry, vol. 40, no. 1, p. 35, Mar. 1978. Telecommunication Union.‘ [25] U. Brandes, ‗A faster algorithm for betweenness centrality*‘, Journal [2] C. A. R. Pinheiro, ‗Community Detection to Identify Fraud Events in of mathematical sociology, vol. 25, no. 2, pp. 163–177, 2001 Telecommunications Networks‘, 2012. [3] V. D. Blondel, A. Decuyper, and G. Krings, ‗A survey of results on [26] J. R. Seeley, ‗The net of reciprocal influence: A problem in treating mobile phone datasets analysis‘, EPJ Data Science, vol. 4, no. 1, p. 1, sociometric data.‘, Canadian Journal of Psychology, vol. 3, pp. 234– 2015. 240, 1949. [27] L. Katz, ‗A new status index derived from sociometric analysis‘, [4] J. D. Farley, ‗Breaking Al Qaeda Cells: A Mathematical Analysis of Psychometrika, vol. 18, no. 1, pp. 39–43, 1953. Counterterrorism Operations (A Guide for Risk Assessment and Decision Making)‘, Studies in Conflict & Terrorism, vol. 26, no. 6, [28] K. Stephenson and M. Zelen, ‗Rethinking centrality: Methods and pp. 399–411, Nov. 2003. examples‘, Social Networks, vol. 11, no. 1, pp. 1–37, 1989. [5] J.-P. Onnela, J. Saramäki, J. Hyvönen, G. Szabó, M. A. De Menezes, [29] C. Ballester, A. Calv´o-Armengol, and Y. Zenou, ‗―Who‖s who in K. Kaski, A.-L. Barabási, and J. Kertész, ‗Analysis of a large-scale crime networks. Wanted: the key player‘.‘, Discussion Paper 4421., weighted network of one-to-one human communication‘, New vol. 4421, no. CERP, 2004. Journal of Physics, vol. 9, no. 6, p. 179, 2007 [30] S. Sarangi and E. Unlu, ‗Key players and key groups in teams: A [6] S. P. Borgatti, ‗Identifying sets of key players in a social network‘, network approach using soccer data.‘ 2010. Computational and Mathematical Organization Theory, vol. 12, no. [31] U. Temurshoev, ‗Who‘s Who in Networks-Wanted: The Key Group‘, 1, pp. 21–34, Apr. 2006. Available at SSRN 1285752, 2008. [7] F. Probst, ‗Customer Relationship Management in a Digitally [32] M. U. Ilyas and H. Radha, ‗A KLT-inspired user centrality for Connected World‘, 2013. identifying influential neighborhoods in graphs‘, in Information [8] X. Zhang, J. Zhu, Q. Wang, and H. Zhao, ‗Identifying influential Sciences and Systems (CISS), 2010 44th Annual Conference on, 2010, users in complex networks with community structure. Knowledge- pp. 1–7. Based Systems‘, Knowledge-Based Systems, vol. 42, pp. 74–84, 2013 [33] M. U. Ilyas and H. Radha, ‗Identifying influential users in online [9] M. Ahsan, T. Singh, and M. Kumari, ‗Influential user detection in social networks using principal component centrality‘, in social network during community detection‘, in Cognitive Computing Communications (ICC), 2011 IEEE International Conference on, and Information Processing (CCIP), 2015 International Conference 2011, pp. 1–5 on, 2015, pp. 1–6. 218 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) [34] M. G. Everett and S. P. Borgatti, ‗The centrality of groups and [42] J. Goldenberg, S. Han, D. R. Lehmann, and J. W. Hong, ‗The role of classes‘, The Journal of mathematical sociology, vol. 23, no. 3, pp. hubs in the adoption process‘, Journal of Marketing, vol. 73, no. 2, 181–201, 1999. pp. 1–13, 2009 [35] A. Sheikhahmadi, M. A. Nematbakhsh, and A. Shokrollahi, [43] J. Heidemann, M. Klier, and F. Probst, ‗Identifying key users in ‗Improving detection of influential nodes in complex networks‘, online social networks: A PageRank based approach‘, 2010. Physica A: Statistical Mechanics and its Applications, vol. 436, pp. [44] C. Canali and R. Lancellotti, ‗A quantitative methodology based on 833–845, Oct. 2015. component analysis to identify key users in social networks‘, [36] M. M. Sathik and A. A. Rasheed, ‗A centrality approach to identify International Journal of Social Network Mining, vol. 1, no. 1, pp. 27– sets of key players in an online weblog‘, International Journal of 50, 2012. Recent Trends in Engineering, vol. 2, 2009. [45] F. C. Perkins III, System and method for processing call detail [37] T. R. Zaman, ‗Information extraction with network centralities: records. Google Patents, 2002 finding rumor sources, measuring influence, and learning community [46] A. McDiarmid, S. Bell, J. Irvine, and J. Banford, ‗Nodobo: Detailed structure‘, Massachusetts Institute of Technology, 2011 mobile phone usage dataset‘, Unpublished paper, accessed at [38] H. Sarvari, E. Abozinadah, A. Mbaziira, and D. Mccoy, ‗Constructing http://nodobo. com/papers/iet-el. pdf on, pp. 9–21, 2013. and Analyzing Criminal Networks‘, 2014, pp. 84–91. [47] C. Kiss and Bichler Martin, ‗Identification of influencers—measuring [39] J. Shetty and J. Adibi, ‗Discovering important users through graph influence in customer networks‘, Decision Support Systems, vol. 46, entropy the case of enron email database‘, in Proceedings of the 3rd no. 1, pp. 233–253, 2008. international workshop on Link discovery, 2005, pp. 74–81. [48] O. Hinz, B. Skiera, C. Barrot, and J. U. Becker, ‗Seeding strategies [40] F. Tutzauer, ‗Entropy as a measure of centrality in networks for viral marketing: An empirical comparison‘, Journal of Marketing, characterized by path-transfer flow‘, Social Networks, vol. 29, no. 2, vol. 75, no. 6, pp. 55–71, 2011. pp. 249–265, May 2007. [49] S. Catanese, E. Ferrara, and G. Fiumara, ‗Forensic analysis of phone [41] D. Ortiz-Arroyo and D. M. A. Hussain, ‗An Information Theory call networks‘, Social Network Analysis and Mining, vol. 3, no. 1, pp. Approach to Identify Sets of Key Players‘, in Intelligence and 15–33, Mar. 2013. Security Informatics, vol. 5376, D. Ortiz-Arroyo, H. L. Larsen, D. D. [50] E. Ferrara, P. De Meo, S. Catanese, and G. Fiumara, ‗Detecting Zeng, D. Hicks, and G. Wagner, Eds. Berlin, Heidelberg: Springer criminal organizations in mobile phone networks‘, Expert Systems Berlin Heidelberg, 2008, pp. 15–26 with Applications, vol. 41, no. 13, pp. 5733–5750, 2014. 219