{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:27:38Z","timestamp":1777854458903,"version":"3.51.4"},"reference-count":58,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2017,12]]},"abstract":"<jats:p>In recent years, social networks have played a strong role in diffusing information among people all around the globe. Therefore, the ability to analyse the diffusion pattern is essential. A diffusion model can identify the information dissemination pattern in a social network. One of the most important components of a diffusion model is information perception which determines the source each node receives its information from. Previous studies have assumed information perception to be just based on a single factor, that is, each individual receives information from their friend with the highest amount of information, whereas in reality, there exist other factors, such as trust, that affect the decision of people for selecting the friend who would supply information. These factors might be in conflict with each other, and modelling diffusion process with respect to a single factor can give rise to unacceptable results with respect to the other factors. In this article, we propose a novel information diffusion model based on non-dominated friends (IDNDF). Non-dominated friends are a set of friends of a node for whom there is no friend better than them in the set based on all considered factors, considering different factors simultaneously significantly enhance the proposed information diffusion model. Moreover, our model gives a chance to all non-dominated friends to be selected. Also, IDNDF allows having partial knowledge by each node of the social network. Finally, IDNDF is applicable to different types of data, including well-known real social networks like Epinions, WikiPedia, Advogato and so on. Extensive experiments are performed to assess the performance of the proposed model. The results show the efficiency of the IDNDF in diffusion of information in varieties of social networks.<\/jats:p>","DOI":"10.1177\/0165551516667656","type":"journal-article","created":{"date-parts":[[2016,9,13]],"date-time":"2016-09-13T21:59:12Z","timestamp":1473803952000},"page":"801-815","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["Modelling information diffusion based on non-dominated friends in social networks"],"prefix":"10.1177","volume":"43","author":[{"given":"Niloofar","family":"Mozafari","sequence":"first","affiliation":[{"name":"Department of Computer Science, Engineering, and Information Technology, School of Electrical and Computer Engineering, Shiraz University, Iran"}]},{"given":"Ali","family":"Hamzeh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Engineering, and Information Technology, School of Electrical and Computer Engineering, Shiraz University, Iran"}]},{"given":"Sattar","family":"Hashemi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Engineering, and Information Technology, School of Electrical and Computer Engineering, Shiraz University, Iran"}]}],"member":"179","published-online":{"date-parts":[[2016,9,1]]},"reference":[{"key":"bibr1-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1145\/2503792.2503797"},{"key":"bibr2-0165551516667656","first-page":"497","volume-title":"Proceedings of the knowledge data discovery (KDD \u201809)","author":"Leskovec J"},{"key":"bibr3-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11104-9_142"},{"key":"bibr4-0165551516667656","first-page":"417","volume-title":"Proceedings of the IEEE\/ACM international conference on advances in social networks analysis and mining","author":"Saito S"},{"key":"bibr5-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1145\/2627534.2627559"},{"key":"bibr6-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2015.02.007"},{"key":"bibr7-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1038\/nature14604"},{"key":"bibr8-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2014.09.010"},{"key":"bibr9-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2313024"},{"key":"bibr10-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05164-2_1"},{"key":"bibr11-0165551516667656","first-page":"1932","volume-title":"Proceedings of the IEEE conference on computer communications (INFOCOM)","author":"Lu Z"},{"key":"bibr12-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1177\/0165551514565318"},{"key":"bibr13-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.09.019"},{"key":"bibr14-0165551516667656","first-page":"49","volume-title":"Proceedings of 9th ACM SIGCOMM conference on international measurement","author":"Benevenuto F"},{"key":"bibr15-0165551516667656","first-page":"369","volume-title":"Proceedings of the 10th ACM SIGCOMM conference on international measurement","author":"Jiang J"},{"key":"bibr16-0165551516667656","first-page":"43","volume-title":"Proceedings of 8th ACM SIGCOMM conference on international measurement","author":"Nazir A"},{"key":"bibr17-0165551516667656","first-page":"63","volume-title":"Proceedings of the 9th ACM SIGCOMM conference on international measurement conference","author":"Nazir A"},{"key":"bibr18-0165551516667656","first-page":"35","volume-title":"Proceedings of the 9th ACM SIGCOMM conference on international measurement conference","author":"Schneider F"},{"key":"bibr19-0165551516667656","doi-asserted-by":"crossref","unstructured":"Aral S, Brynjolfssen E, Alstyne MV. Productivity effects of information diffusion in networks. Cambridge, MA: MIT Center for Digital Business, 2007, p. 234.","DOI":"10.2139\/ssrn.987499"},{"key":"bibr20-0165551516667656","first-page":"675","volume-title":"Proceedings of the international conference on computational science and engineering","author":"Apolloni A"},{"issue":"4","key":"bibr21-0165551516667656","first-page":"94","volume":"11","author":"Babakhani S","year":"2014","journal-title":"Int J Comput Sci Issue"},{"key":"bibr22-0165551516667656","first-page":"721","volume-title":"Proceedings of the 18th international conference on World Wide Web","author":"Cha M"},{"key":"bibr23-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMsa066082"},{"key":"bibr24-0165551516667656","first-page":"491","volume-title":"Proceedings of the 13th international conference on World Wide Web","author":"Gruhl D"},{"key":"bibr25-0165551516667656","first-page":"591","volume-title":"Proceedings of the 19th international conference on World Wide Web","author":"Kwak H"},{"key":"bibr26-0165551516667656","first-page":"90","volume-title":"Proceedings of the international conference on weblogs and social media","author":"Lerman K"},{"key":"bibr27-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16567-2_16"},{"key":"bibr28-0165551516667656","first-page":"1145","volume-title":"Proceedings of the 21st international conference companion on World Wide Web","author":"Guille A"},{"key":"bibr29-0165551516667656","first-page":"175","volume-title":"Proceedings of the IEEE\/ACM international conference on advances in social networks analysis and mining","author":"Hajibagheri A"},{"key":"bibr30-0165551516667656","first-page":"494","volume-title":"Proceedings of the 24th association for the advancement of artificial intelligence conference","author":"Lahiri M"},{"key":"bibr31-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2011.05.005"},{"key":"bibr32-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.3200"},{"key":"bibr33-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066130"},{"key":"bibr34-0165551516667656","volume-title":"Network models of the diffusion of innovations","author":"Valente TW","year":"1995"},{"key":"bibr35-0165551516667656","first-page":"133","volume-title":"Proceedings of the 32nd international conference on distributed computing systems workshops","author":"Wang F"},{"key":"bibr36-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-0947-2"},{"key":"bibr37-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/sot096"},{"key":"bibr38-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1139\/X10-138"},{"key":"bibr39-0165551516667656","first-page":"1019","volume-title":"Proceedings of the 16th ACM SIGKDD conference on knowledge discovery and data mining","author":"Rodriguez M"},{"key":"bibr40-0165551516667656","first-page":"561","volume-title":"Proceedings of the 28th international conference on machine learning","author":"Rodriguez M"},{"key":"bibr41-0165551516667656","first-page":"23","volume-title":"Proceedings of the 6th ACM international conference on web search and data mining","author":"Rodriguez M"},{"key":"bibr42-0165551516667656","first-page":"34","volume-title":"Proceedings of the 4th international conference on weblogs and social media","author":"Choudhury M"},{"key":"bibr43-0165551516667656","first-page":"55","volume-title":"Proceedings of the 4th ACM international conference on web search and data mining","author":"Sadikov E"},{"issue":"9","key":"bibr44-0165551516667656","first-page":"1","volume":"39","author":"Goldenberg J","year":"2001","journal-title":"Acad Market Sci Rev"},{"key":"bibr45-0165551516667656","first-page":"137","volume-title":"Proceedings of the 9th international conference on knowledge discovery and data mining","author":"Kempe D"},{"key":"bibr46-0165551516667656","first-page":"1127","volume-title":"Proceedings of the 32nd international conference on automata, languages and programming","author":"Kempe D"},{"key":"bibr47-0165551516667656","first-page":"322","volume-title":"Proceedings of the advances in machine learning","author":"Saito K"},{"key":"bibr48-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1162\/106365600568220"},{"key":"bibr49-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1007\/s11721-007-0002-0"},{"key":"bibr50-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09333-8_16"},{"key":"bibr51-0165551516667656","first-page":"97","volume-title":"Proceedings of the 24th international conference on World Wide Web","author":"Rafailidis D"},{"key":"bibr52-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511543357"},{"key":"bibr53-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0890-z"},{"key":"bibr54-0165551516667656","first-page":"344","volume-title":"Proceedings of the IEEE international conference on data mining technologies for computational collective intelligence workshop at data mining","author":"Jierui X"},{"key":"bibr55-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0605965104"},{"key":"bibr56-0165551516667656","first-page":"51","volume-title":"Trust in E-services: technologies, practices and challenges","author":"Massa P","year":"2006"},{"key":"bibr57-0165551516667656","unstructured":"Levien R. Attack resistant trust metrics. Retrieved 28 December 2005, from http:\/\/www.advogato.org\/trust-metric.html"},{"key":"bibr58-0165551516667656","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.01.048"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551516667656","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/0165551516667656","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551516667656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:08:24Z","timestamp":1777504104000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0165551516667656"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,1]]},"references-count":58,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["10.1177\/0165551516667656"],"URL":"https:\/\/doi.org\/10.1177\/0165551516667656","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,1]]}}}