Social Network Analysis and Mining for Business Applications

4 minute read

Bonchi, F., Castillo, C., Gionis, A., & Jaimes, A. (2011). Social Network Analysis and Mining for Business Applications. ACM Transactions on Intelligent Systems and Technology, 2(3), 22:1—22:37. doi:10.1145/1961189.1961194

This article classifies business processes based on the APQC Process Classification Framework that serves as a high-level, industry-neutral enterprise process model, and discusses social network analysis and mining techniques relevant to these processes.

Business Processes and Applications

The following list outlines business processes and the corresponding applications. The processes 1-5 are considered operating processes, while 6-12 denote to management and support processes.

  1. Vision & Strategy - Social Networking
  2. Products & Services - Product recommendations, social search
  3. Marketing & selling - Social CRM, Trend spotting, Social marketing, Loyalty programs, Advertising, Business intelligence, Churn prediction, Reputation monitoring
  4. Delivery - Production scheduling, customer data mining
  5. Customer Service: Customer support
  6. Human Capital - Internal social networking, recruiting, expert routing
  7. Information Technology - Resource allocation, Information sources, Content Management
  8. Financial Resources - Customer & product strategies, Customer-product mix
  9. Property Management - N.A.
  10. Environmental issues - N.A.
  11. External Relationships - Public relations programs, Social networking, Media monitoring
  12. Knowledge Management - Knowledge sharing, Internal social networks

Social Network Data

Social network data is represented as a graph G=(V,E) with either explicit or implicit connections. Implicit connections can be discovered due to

  1. follower, voting, or content (e.g. similar tags, comments, ... ) relations in social networks
  2. communication activities (e.g. calls, SMS, mails) in telecommunication networks,
  3. proximity obtained from GPS location logs or RFID tags, or
  4. user similarity.
Social networks often contain sensitive information that might require anonymization steps before analysis.

Reputation and Trust

Ziegler and Lausen (2005) distinguish between

  1. global trust (reputation), computed from the perspective of the whole network and yielding a single trust value, and
  2. local trust, denoting to the trust from the perspective of another agent allowing for multiple trust values
Many trust metrics are computed from social ties. Pretty good privacy (PGP) uses explicit trust relations to compute local trust values, the Katz index and other spectral ranking methods for ranking individuals in a social network consider votes that are passed transitively with a certain attenuation factor.

PageRank is the most popular method of this family. PageRank can also be interpreted as a random surfer who follows links at random. The score of a node corresponds to the fraction of time spend at that node by the surfer in the limit.

HITS distinguishes between a hub and an authority score. Nodes that receive many incoming links from important hubs obtain a high authority score. Hubs with many incoming links from authoritative nodes get a high hub score. As all the other spectral ranking methods, the HITS value is determined by an eigenvector computation.

Incorporation of negative feedback.

The semantics of distrust propagation ("the enemy of my enemy is my friend") are in practice less effective than the semantics of trust propagation ("the friend of my friend is my friend").

Guha et al. (2004) show that a good heuristic for computing trust propagates

  1. trust on a global and
  2. distrust only on a local (single-step) level.

Network Dynamics

Research on the properties of social networks shows that new nodes connecting to social networks will preferential attach themselves to existing nodes with a high number of connections. This is regarded as an instance of the multiplicative process, also known as the Yule process or richer-get-richer process.

Research on mining evolving graphs identifies typical evolution patterns to obtain information on the underlying evolution mechanisms.

Business Applications

Social Network analysis allows partitioning customers according to their social network community. Applications of this kind of partitioning are

  1. social recommendations (Amazon, Last.fm, etc.)
  2. social search, that exploits context from a person's connections (e.g. Linux fans $$\rightarrow$$ a search for totem returns a media player)
  3. marketing in offline settings (reward programs)
  4. security (fraud and terrorism detection)

Propagation and Virality

The idea of word-of-mouth or viral marketing is targeting the most influential users within a network to start a chain-reaction that propagates the marketing message through the network. Research on information propagation has shown that finding optimal propagation strategies in social networks is NP-hard.

One research problem in this area is distinguishing between influence and similarity, i.e. do determine whether people follow a course of action because they have interests similar to the "influential person" or because they have been influenced by that person.

Some authors have measured the effects of adding viral features such as (a) personal referrals, and (b) automatic broadcasting into products.

Churn is the business term for the fraction of individuals that leave a customer base. Churn analysis targets on

  1. determining the reasons for customers churn, and
  2. predicting individual churn so that appropriate counter measures may be taken.

Social Networking Applications

A white paper published by AT&T outlines the following business applications for social networks:

  1. promotion of products and services
  2. trend monitoring
  3. as a customer relation instrument
  4. research of new product ideas
  5. creation of customer user-groups
  6. advertising
  7. sponsoring of interactive content
  8. creation and monitoring of online focus groups

Bibliography

Guha, R., Kumar, R., Raghavan, P. and Tomkins, A. (2004). Propagation and trust and distrust. In proceedings of the 13th International Conference on World Wide Web (WWW'04). ACM Press, New York, 403-412

Ziegler, C.-N.and Lausen, G. (2005): Propagation models for trust and distrust in social networks. Information Systems Frontiers 7, 4-5, 337-358