JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2015, Vol. 45 ›› Issue (1): 1-8.doi: 10.6040/j.issn.1672-3961.1.2014.120

    Next Articles

Comparison and analysis on measure indexes for structural hole nodes in social network

HAN Zhongming, WU Yang, TAN Xusheng, LIU Wen, YANG Weijie   

  1. College of Computer and Information Engineering, Beijing Technology and Business University, Beijing 100048, China
  • Received:2014-03-26 Revised:2014-12-02 Online:2015-02-20 Published:2014-03-26

Abstract: In order to analyze different factors that affected structural holes measurement in social networks, seven existing methods to measure structural hole nodes were analyzed. Four groups of 12 simulated networks were built. Measure indexes for structural hole nodes were deeply and overall analyzed and compared in the simulated network, which were testified and analyzed in social network of Renren websites. The experimental results showed that seven existing methods perform poorly on identifying the structural hole nodes and some methods were highly correlated. Among these seven methods, betweenness centrality was relatively more effective.

Key words: social network, structural hole, constraint coefficient of network, node importance, betweenness centrality

CLC Number: 

  • TP393
[1] 陈静, 孙林夫. 复杂网络中节点重要度评估[J]. 西南交通大学学报, 2009, 44(3):426-429. CHEN Jing, SUN Linfu. Evaluation of node importance in complex networks[J]. Joural of Southwest Jiaotong University, 2009, 44(3):426-429.
[2] NARDELLI E, PROIETTI G, WIDMAYER P. Finding the most vital node of a shortest path[J]. Theoretical Computer Science, 2003, 296(1):167-177.
[3] 饶育萍, 林竞羽, 周东方. 网络抗毁度和节点重要性评价方法[J]. 计算机工程, 2009, 35(6):14-16. RAO Yuping, LIN Jingyu, ZHOU Dongfang. Method for network invulnerability and node importance evaluation[J]. Computer Engineering, 2009, 35(6):14-16.
[4] 陈勇, 胡爱群, 胡啸. 通信网中节点重要性的评价方法[J]. 通信学报, 2004, 25(8):129-134. CHEN Yong, HU Aiqun, HU Xiao. Evaluation method for node in communication networks[J]. Journal of China Institute of Communication, 2004, 25(8):129-134.
[5] 李鹏翔, 任玉晴, 席酉民. 网络节点(集)重要性的一种度量指标[J].系统工程,2004, 22(4):13-20. LI Pengxiang, REN Yuqing, XI Youmin. An importance measure of actors(set) within a network[J]. System Engineering, 2004, 22(4):13-20.
[6] PAGE L, BRIN S, MOTWANI R, et al. The pagerank citation ranking:bringing order to the web[R]. California: Stanford InfoLab, 1998.
[7] ZHANG Y, XU K, LIU Y, et al. Modeling of scale-free network based on pagerank algorithm[C]//Processdings of Future Computer and Communication 2010 2nd International Conference.Wuhan:IEEE Computer Society Press, 2010, 3:783-786.
[8] KALISH Y, ROBINS G. Psychological predispositions and network structure:The relationship between individual predispositions, structural holes and network closure[J]. Social Networks, 2006, 28(1):56-84.
[9] DI V F, HEMPHL J, MAGNUSSON M, et al. Exploring the role of structural holes in learning:an empirical study of Swedish pharmacies[J]. Journal of Knowledge Management, 2012, 16(4):576-591.
[10] SUSSKIND A M, ODOM P R, VICCARI A E. Team leaders and team members in interorganizational networks an examination of structural holes and performance[J]. Communication Research, 2011, 38(5):613-633.
[11] RONALD S B.The social structure of competition[J]. Networks and organizations:Structure, form and action, 1993, 65:57-91.
[12] RONALD S B. Social Capital, structural holes and the entrepreneur[J]. RevveFrancaise de Sociologie, 1995, 36(4):599.
[13] RONALD S B. Structural holes and good ideas1[J]. American Journal of Sociology, 2004, 110(2):349-399.
[14] FREEMAN L C. A set of measures of centrality based on betweenness[J]. Sociometry, 1977, 40:35-41.
[15] XIA S, DAI B T, LIM E P, et al. Link prediction for bipartite social networks:therole of structural holes[C]//Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)(ASONAM'12).Washington:IEEE Computer Society Press, 2012:153-157.
[16] 汪丹. 结构洞算法的比较与测评[J]. 现代情报, 2008, 28(9):153-156. WANG Dan. A comparative study on algorithm of structural holes[J].China Academic Journal Electronic Publishing House, 2008, 28(9):153-156.
[17] 邓世果, 吴干华, 杨会杰. 基于基尼系数的网络结构洞测量[J]. 上海理工大学学报, 2011, 32(5):452-456. DENG Shiguo, WU Ganhua, YANG Huijie. Gini-coefficient-based measurement to structural holes[J].Journal of University of Shanghai for Science and Technology, 2011, 32(5):452-456.
[18] 胡蓉, 邓小昭. 基于结构洞理论的个人人际网络分析系统研究[J].情报学报, 2005, 24(4):485-489. HU Rong, DENG Xiaozhao. A study on the structural holes theory-based egocentric human intelligence network analysis system[J]. Journal of the China Society for Scientific and Technical Information, 2005, 24(4):485-489.
[19] 庞科, 陈京民. 社会网络结构洞在网络参政领袖分析中的应用[J]. 武汉理工大学学报:信息与管理工程版, 2011, 33(1):86-89. PANG Ke, CHEN Jingmin. Application of structural holes of social network in analysis of leader in network political participation[J]. Joural of WUT:Information & Management Engineering, 2011, 33(1):86-89.
[20] 王国明, 李夏苗, 胡正东, 等.长株潭城市群交通网络结构洞分析[J].计算机工程与应用,2012,48(15):1-6. WANG Guoming, LI Xiamiao, HU Zhengdong, et al. Study on traffic network of urban agglomeration Chang-Zhu-Tan based on structural holes theory[J].Computer Engineering and Applications, 2012, 48(15):1-6.
[21] 廖丽平, 胡仁杰, 张光宇. 模糊社会网络的结构洞分析方法[J]. 东南大学学报:自然科学版, 2013, 43(4):900-904. LIAO Linping, HU Renjie, ZHANG Guangyu. Structural holes analysis of fuzzy social network[J]. Journal of Southwest University:Natural Science Edition, 2013, 43(4):900-904.
[22] 杜杨沁,霍有光, 锁志海. 政务微博微观社会网络结构实证分析——基于结构洞理论视角[J]. 情报杂志, 2013, 32(5):25-31. DU Yangqin, HUO Youguang, SUO Zhihai. Government microblogging social network structure:an empirical analysis based on the perspectirve of structural holes theory[J]. Journal of Intelligence, 2013, 32(5):25-31.
[23] LI H, ZHANG H, ZHAO H, et al. Research on structural holes and closeness of multi-granularity software networks[J]. Journal of Software, 2013, 8(2):337-343.
[24] ZHANG E, WANG G, GAO K, et al. Generalized structural holes finding algorithm by bisection in social communities[C]//Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing (ICGEC'12). Washington:IEEE Computer Society Press, 2012:276-279.
[25] LOU T, TANG J. Mining structural hole spanners through information diffusion in social networks[C]//Proceedings of the 22nd International Conference on World Wide Web (WWW'13). Republic and Canton of Geneva:International World Wide Web Conferences Steering Committee Press, 2013:825-836.
[26] ARASU A, CHO J, GARCIA M H, et al. Searching the web[J]. ACM Transactions on Internet Technology (TOIT), 2001, 1(1):2-43.
[27] NEWMAN M E J, WATTS D J, STROGATZ S H. Random graph models of social networks[J].Proceedings of the National Academy of Sciences of the United States of America, 2002, 99(Suppl 1):2566-2572.
[1] DU Xixi, LIU Huafeng, JING Liping. An additive co-clustering for recommendation of integrating social network [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(3): 96-102.
[2] LI Shuo, SHI Yuliang. The method of spot cluster recommendation in location-based social networks [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2016, 46(3): 44-50.
[3] LU Wenyang, XU Jiayi, YANG Yubin. LDA-based link prediction in social network [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2014, 44(6): 26-31.
Full text



No Suggested Reading articles found!