Please wait a minute...
New Technology of Library and Information Service  2015, Vol. 31 Issue (10): 72-80    DOI: 10.11925/infotech.1003-3513.2015.10.10
Current Issue | Archive | Adv Search |
Research on Follow Influence of Triadic Structure in Social Network——Take Student Relation Network as an Example
Wu Jiang, Zhang Jinfan
School of Information Management, Wuhan University, Wuhan 430072, China
Download: PDF(837 KB)   HTML  
Export: BibTeX | EndNote (RIS)      

[Objective] Study on the effects of different triadic structures on follow influence in relation formation. [Methods] This paper uses questionnaires on 221 students at different time to get the dynamic evolution process of this network, and then analyzes the effects of different triadic structures on relation formation. [Results] The results show that triadic structures with reciprocity, transitivity and revesed relationship are more likely to form a new relation. [Limitations] This paper is unable to completely control the influences besides relation network. [Conclusions] The pattern of online and offline relation formation is the same, which is valuable for bussiness.

Received: 14 April 2015      Published: 06 April 2016
:  TP393  

Cite this article:

Wu Jiang, Zhang Jinfan. Research on Follow Influence of Triadic Structure in Social Network——Take Student Relation Network as an Example. New Technology of Library and Information Service, 2015, 31(10): 72-80.

URL:     OR

[1] Wasserman S, Faust K. Social Network Analysis: Methods and Applications [M]. Cambridge University Press, 1994: 25.
[2] Milo R, Shen-Orr S, Itzkovitz S, et al. Network Motifs: Simple Building Blocks of Complex Networks [J]. Science, 2002, 298(5594): 824-827.
[3] Donald H, Wohl R R. Mass Communication and Parasocial Interaction [J]. Psychiatry, 1956, 19(3): 215-229.
[4] Romero D M, Kleinberg J. The Directed Closure Process in Hybrid Social-Information Networks, with an Analysis of Link Formation on Twitter [C]. In: Proceedings of the 4th International AAAI Conference on Weblogs and Social Media. 2010: 138-145.
[5] Tang J, Sun J, Wang C, et al. Social Influence Analysis in Large-scale Networks [C]. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2009: 807-816.
[6] Tang J, Wu S, Sun J, et al. Cross-domain Collaboration Recommendation [C]. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2012: 1285-1293.
[7] Tan C, Lee L, Tang J, et al. User-level Sentiment Analysis Incorporating Social Networks [C]. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2011: 1397-1405.
[8] Sun J, Tang J. Models and Algorithms for Social Influence Analysis [C]. In: Proceedings of the 6th ACM International Conference on Web Search and Data Mining. ACM, 2013: 775-776.
[9] Heider F. The Psychology of Interpersonal Relations [M]. Psychology Press, 1982.
[10] Klimek P, Thurner S. Triadic Closure Dynamics Drives Scaling Laws in Social Multiplex Networks [J]. New Journal of Physics, 2013, 15(6): Article No.063008.
[11] Li M, Zou H, Guan S, et al. A Coevolving Model Based on Preferential Triadic Closure for Social Media Networks [J]. Scientific Reports, 2013, 3: Article No. 2512.
[12] Lou T, Tang J, Hopcroft J, et al. Learning to Predict Reciprocity and Triadic Closure in Social Networks [J]. ACM Transactions on Knowledge Discovery from Data (TKDD), 2013, 7(2): Article No. 5.
[13] Mollenhorst G, Völker B, Flap H. Shared Contexts and Triadic Closure in Core Discussion Networks [J]. Social Networks, 2011, 33(4): 292-302.
[14] Kossinets G, Watts D J. Empirical Analysis of an Evolving Social Network [J]. Science, 2006, 311(5757): 88-90.
[15] Hopcroft J, Lou T, Tang J. Who will Follow You Back?: Reciprocal Relationship Prediction[C]. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management. ACM, 2011: 1137-1146.
[16] Seshadhri C, Pinar A, Durak N, et al. Directed Closure Measures for Networks with Reciprocity [OL]. arXiv Preprint, 2013. arXiv: 1302.6220.
[17] Snijders T A B, Pattison P E, Robins G L, et al. New Specifications for Exponential Random Graph Models [J]. Sociological Methodology, 2006, 36(1): 99-153.
[18] Robins G, Snijders T, Wang P, et al. Recent Developments in Exponential Random Graph (p*) Models for Social Networks [J]. Social Networks, 2007, 29(2): 192-215.
[19] Kwak H, Lee C, Park H, et al. What is Twitter, a Social Network or a News Media? [C]. In: Proceedings of the 19th International Conference on World Wide Web. ACM, 2010: 591-600.
[20] Gouldner A W. The Norm of Reciprocity: A Preliminary Statement [J]. Journal of Social and Personal Relationships, 1960, 25(2): 161-178.
[21] Watts D J, Strogatz S H. Collective Dynamics of ‘Small-World' Networks [J]. Nature, 1998, 393(6684): 440-442.
[22] McPherson M, Smith-Lovin L, Cook J M. Birds of a Feather: Homophily in Social Networks [J]. Annual Review of Sociology, 2001, 27: 415-444.
[23] Huang H, Tang J, Wu S, et al. Mining Triadic Closure Patterns in Social Networks[C]. In: Proceedings of the 23rd International Conference on World Wide. International World Wide Web Conferences Steering Committee, 2014: 499-504.
[24] Easley D, Kleinberg J. Networks, Crowds, and Markets: Reasoning About a Highly Connected World [M]. Cambridge University Press, 2010.Burt R S. Structural Holes: The Social Structure of Competition [M]. Harvard University Press, 2009.

[1] Qingtian Zeng,Xiaohui Hu,Chao Li. Extracting Keywords with Topic Embedding and Network Structure Analysis[J]. 数据分析与知识发现, 2019, 3(7): 52-60.
[2] Lixin Xia,Jieyan Zeng,Chongwu Bi,Guanghui Ye. Identifying Hierarchy Evolution of User Interests with LDA Topic Model[J]. 数据分析与知识发现, 2019, 3(7): 1-13.
[3] Yang Ning, Huang Feihu, Wen Yi, Chen Yunwei. An Opinion Evolution Model Based on the Behavior of Micro-blog Users[J]. 现代图书情报技术, 2015, 31(12): 34-41.
[4] Yu Xincong, Li Honglian, Lv Xueqiang. Research on the Application of Hyponymy in the Enrollment Robot[J]. 现代图书情报技术, 2015, 31(12): 65-71.
[5] Wang Zhengjun, Yu Xiaoyi, Jin Yuling. Using Sniffer Technology to Constraint Electronic Resource Excessive Downloading[J]. 现代图书情报技术, 2015, 31(12): 95-100.
[6] Liu Zhanbing, Xiao Shibin. Collaborative Filtering Recommended Algorithm Based on User's Interest Fuzzy Clustering[J]. 现代图书情报技术, 2015, 31(11): 12-17.
[7] Wu Wankun, Wu Qinglie, Gu Jinjiang. Hot Topic Extraction from E-commerce Microblog Based on EM-LDA Integrated Model[J]. 现代图书情报技术, 2015, 31(11): 33-40.
[8] Qiang Shaohua, Wu Peng. The Research of Spatial Measure of Users' Mental Model of Website Category from the View of Regional Differences[J]. 现代图书情报技术, 2015, 31(11): 68-74.
[9] Qin Xuedong. Solution for KVM Private Cloud Management System Based on Drupal[J]. 现代图书情报技术, 2015, 31(11): 91-95.
[10] Jiang Chuntao. Automatic Annotation of Bibliographical References in Chinese Patent Documents[J]. 现代图书情报技术, 2015, 31(10): 81-87.
[11] Wang Ying, Zhang Zhixiong, Li Chuanxi, Liu Yi, Tang Yijie, Zhou Zijian, Qian Li, Fu Honghu. The Design and Implementation of Open Engine System for Scientific & Technological Knowledge Organization Systems[J]. 现代图书情报技术, 2015, 31(10): 95-101.
[12] Gui Sisi, Lu Wei, Huang Shihao, Zhou Pengcheng. User Interest Prediction Combing Topic Model and Multi-time Function[J]. 现代图书情报技术, 2015, 31(9): 9-16.
[13] Qin Xiaohui, Le Xiaoqiu. Topic Sources and Trends Tracking Towards Citation Network of Single Paper[J]. 现代图书情报技术, 2015, 31(9): 52-59.
[14] Deng Qiping, Wang Xiaomei. Identifying Influential Authors Based on LeaderRank[J]. 现代图书情报技术, 2015, 31(9): 60-67.
[15] Zheng Haishan. The Automatic System for Infrastructure Deployment in the Data Center of Library[J]. 现代图书情报技术, 2015, 31(9): 97-101.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938