{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T21:57:21Z","timestamp":1761429441392,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T00:00:00Z","timestamp":1663977600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Beijing Social Science Fund","award":["21GLC050"],"award-info":[{"award-number":["21GLC050"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>With the rapid development of Internet technology, the innovative value and importance of the open source product community (OSPC) is becoming increasingly significant. Ensuring high robustness is essential to the stable development of OSPC with open characteristics. In robustness analysis, degree and betweenness are traditionally used to evaluate the importance of nodes. However, these two indexes are disabled to comprehensively evaluate the influential nodes in the community network. Furthermore, influential users have many followers. The effect of irrational following behavior on network robustness is also worth investigating. To solve these problems, we built a typical OSPC network using a complex network modeling method, analyzed its structural characteristics and proposed an improved method to identify influential nodes by integrating the network topology characteristics indexes. We then proposed a model containing a variety of relevant node loss strategies to simulate the changes in robustness of the OSPC network. The results showed that the proposed method can better distinguish the influential nodes in the network. Furthermore, the network\u2019s robustness will be greatly damaged under the node loss strategies considering the influential node loss (i.e., structural hole node loss and opinion leader node loss), and the following effect can greatly change the network robustness. The results verified the feasibility and effectiveness of the proposed robustness analysis model and indexes.<\/jats:p>","DOI":"10.3390\/e24101355","type":"journal-article","created":{"date-parts":[[2022,9,25]],"date-time":"2022-09-25T23:13:27Z","timestamp":1664147607000},"page":"1355","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Robustness Evaluation of the Open Source Product Community Network Considering Different Influential Nodes"],"prefix":"10.3390","volume":"24","author":[{"given":"Hongli","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Information, Beijing Wuzi University, Beijing 101149, China"}]},{"given":"Siqing","family":"You","sequence":"additional","affiliation":[{"name":"School of Information, Beijing Wuzi University, Beijing 101149, China"}]},{"given":"Mingxuan","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Management, University of Bristol, Bristol BS8 1TH, UK"}]}],"member":"1968","published-online":{"date-parts":[[2022,9,24]]},"reference":[{"key":"ref_1","unstructured":"Tapscott, D., and Williams, A.D. (2006). Wikinomics: How Mass Collaboration Changes Everything, Portfolio."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Panchal, J.H., and Fathianathan, M. (2008, January 3\u20136). Product Realization in the Age of Mass Collaboration. Proceedings of the ASME Design Automation Conference, Brooklyn, NY, USA.","DOI":"10.1115\/DETC2008-49865"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"021009","DOI":"10.1115\/1.4026510","article-title":"Analysis of collaborative design networks: A case study of OpenIDEO","volume":"14","author":"Fuge","year":"2014","journal-title":"J. Comput. Inf. Sci. Eng."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"813","DOI":"10.2307\/41409962","article-title":"Network Effects: The influence of structural capital on open source project success","volume":"35","author":"Singh","year":"2011","journal-title":"Manag. Inf. Syst. Q."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"841","DOI":"10.2307\/41703483","article-title":"Building member attachment in online communities: Applying theories of group identity and interpersonal bonds","volume":"36","author":"Ren","year":"2012","journal-title":"MIS Q."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"895","DOI":"10.1016\/j.jss.2011.11.010","article-title":"Factors affecting the success of open source software","volume":"85","author":"Midha","year":"2012","journal-title":"J. Syst. Softw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/978-0-387-09684-1_16","article-title":"The total growth of open source","volume":"Volume 275","author":"Russo","year":"2008","journal-title":"IFIP International Federation for Information Processing"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1115\/1.3184605","article-title":"Agent-based modeling of mass-collaborative product development processes","volume":"9","author":"Panchal","year":"2009","journal-title":"J. Comput. Inf. Sci. Eng."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.ijinfomgt.2018.11.015","article-title":"A systematic examination of knowledge loss in open source software projects","volume":"46","author":"Rashid","year":"2019","journal-title":"Int. J. Inf. Manag."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1038\/35019019","article-title":"Error and attack tolerance of complex networks","volume":"406","author":"Albert","year":"2000","journal-title":"Nature"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1109\/TLA.2019.8863322","article-title":"A robustness study of power system stabilizers using dynamic modeling","volume":"17","year":"2019","journal-title":"IEEE Lat. Am. Trans."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1016\/j.physa.2015.12.057","article-title":"Information transport in multiplex networks","volume":"447","author":"Pu","year":"2016","journal-title":"Phys. A"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.tre.2018.11.008","article-title":"Efficiency and robustness of weighted air transport networks","volume":"122","author":"Zhou","year":"2019","journal-title":"Transp. Res. E."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1111\/jscm.12050","article-title":"A contingent resource-based perspective of supply chain resilience and robustness","volume":"50","author":"Squire","year":"2014","journal-title":"J. Supply Chain Manag."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1016\/j.bushor.2018.02.001","article-title":"Open-source intelligence for risk assessment","volume":"61","author":"Hayes","year":"2018","journal-title":"Bus. Horiz."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6043","DOI":"10.1038\/s41467-020-19841-3","article-title":"Robustness and lethality in multilayer biological molecular networks","volume":"11","author":"Liu","year":"2020","journal-title":"Nat. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","article-title":"Statistical mehcanics of complex networks","volume":"74","author":"Albert","year":"2002","journal-title":"Rev. Mod. Phys."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3682","DOI":"10.1103\/PhysRevLett.86.3682","article-title":"Breakdown of the internet under intentional attack","volume":"86","author":"Cohen","year":"2001","journal-title":"Phys. Rev. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1016\/j.physa.2016.12.066","article-title":"Dynamical robustness of networks against multi-node attacked","volume":"471","author":"Duan","year":"2017","journal-title":"Phys. A"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"056109","DOI":"10.1103\/PhysRevE.65.056109","article-title":"Attack vulnerability of complex networks","volume":"65","author":"Holme","year":"2002","journal-title":"Phys. Rev. E"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Lei, S., Zhang, X., Xie, S., and Zheng, X. (2021). Dynamic robustness of semantic-based collaborative knowledge network of open source project. Entropy, 23.","DOI":"10.3390\/e23040391"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"122888","DOI":"10.1016\/j.physa.2019.122888","article-title":"Robustness of open source product innovation community\u2019s knowledge collaboration network under the dynamic environment","volume":"540","author":"Zhou","year":"2020","journal-title":"Phys. A"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1038\/srep00232","article-title":"Dynamical robustness in complex networks: The crucial role of low-degree nodes","volume":"2","author":"Tanaka","year":"2012","journal-title":"Sci. Rep."},{"key":"ref_24","first-page":"81","article-title":"On the robustness of regional collaborative innovation network structure","volume":"35","author":"Tang","year":"2016","journal-title":"Value Eng."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1038\/nphys1746","article-title":"Identification of influential spreaders in complex networks","volume":"6","author":"Kitsak","year":"2010","journal-title":"Nat. Phys."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1086\/421787","article-title":"Structural holes and good ideas","volume":"110","author":"Burt","year":"2004","journal-title":"Am. J. Sociol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"058902","DOI":"10.7498\/aps.64.058902","article-title":"Ranking key nodes in complex networks by considering structural holes","volume":"64","author":"Han","year":"2015","journal-title":"Acta Phys. Sin."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1306","DOI":"10.1007\/s11424-018-7331-5","article-title":"Relative degree structural hole centrality, Crd\u2013sh: A new centrality measure in complex networks","volume":"32","author":"Sotoodeh","year":"2019","journal-title":"J. Syst. Sci. Complex."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"15501477219","DOI":"10.1177\/1550147721999285","article-title":"Identifying important nodes affecting network security in complex networks","volume":"17","author":"Liu","year":"2021","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"2150231","DOI":"10.1142\/S0217979221502313","article-title":"Method for measuring node importance in complex networks based on local characteristics","volume":"35","author":"Ruan","year":"2021","journal-title":"Int. J. Mod. Phys. B"},{"key":"ref_31","unstructured":"Ding, L., Wang, J., and Wei, W. (July, January 27). Method for detecting key nodes who occupy structural holes in social network sites. Proceedings of the PACIS 2016 Proceedings, Chiayi, China."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"127662","DOI":"10.1016\/j.physa.2022.127662","article-title":"An agent-based model of opinion dynamics with attitude-hiding behaviors","volume":"603","author":"Zhu","year":"2022","journal-title":"Phys. A"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1016\/j.dss.2014.03.008","article-title":"Listen to me\u2014Evaluating the influence of micro-blogs","volume":"62","author":"Li","year":"2014","journal-title":"Decis. Support Syst."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.infsof.2015.10.002","article-title":"Understanding the popular users: Following, affiliation influence and leadership on Github","volume":"70","author":"Blincoe","year":"2016","journal-title":"Inf. Softw. Technol."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1111\/j.1540-5885.2011.00791.x","article-title":"Opinion leaders\u2019 role in innovation diffusion: A simulation study","volume":"28","author":"Jager","year":"2011","journal-title":"J. Prod. Innov. Manag."},{"key":"ref_36","first-page":"268592","article-title":"Identifying network public opinion leaders based on markov logic networks","volume":"2014","author":"Zhang","year":"2014","journal-title":"Sci. World J."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Ye, H., and Du, J. (2017, January 20\u201322). Opinion leader mining of social network combined with hierarchical sentiment analysis. Proceedings of the 2017 Chinese Intelligent Automation Conference, Tianjin, China.","DOI":"10.1007\/978-981-10-6445-6_70"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1016\/j.eswa.2013.08.033","article-title":"SuperedgeRank algorithm and its application in identifying opinion leader of online public opinion supernetwork","volume":"41","author":"Ma","year":"2014","journal-title":"Expert Syst. Appl."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.physa.2016.04.035","article-title":"Robustness of single and interdependent scale-free interaction networks with various parameters","volume":"460","author":"Wang","year":"2016","journal-title":"Phys. A"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1177\/14761270030013002","article-title":"The small world of the American corporate elite, 1982\u20132001","volume":"1","author":"Davis","year":"2003","journal-title":"Strateg. Organ."},{"key":"ref_41","first-page":"54","article-title":"Key nodes in complex networks identified by multi-attribute decision-making method","volume":"62","author":"Yu","year":"2013","journal-title":"Acta Phys. Sin."},{"key":"ref_42","first-page":"287","article-title":"Multiple attributes decision making-methods and applications","volume":"4","author":"Tzeng","year":"2011","journal-title":"Eur. J. Oper. Res."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/10\/1355\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:38:46Z","timestamp":1760143126000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/10\/1355"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,24]]},"references-count":42,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2022,10]]}},"alternative-id":["e24101355"],"URL":"https:\/\/doi.org\/10.3390\/e24101355","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2022,9,24]]}}}