{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T04:16:35Z","timestamp":1695269795190},"reference-count":22,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"abstract":"<jats:p>With the average daily growth of 15000 new subscribers, the number of WeChat subscription has broken the 5,800,000 subscribers recently. WeChat subscription's topic influence calculation has been very significant. This article takes Tencent-WeChat subscription platform as the research object and focuses on the influence analysis of topic diffusion. Based on the subscription's temporal characteristics of influence, the parameters of propagation capability, and the similarity weights among different subscriptions with the same topic, the authors propose an analysis model of WeChat subscription influence.<\/jats:p>","DOI":"10.4018\/ijdcf.2019100109","type":"journal-article","created":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T10:10:22Z","timestamp":1569579022000},"page":"130-148","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of WeChat Subscription Influence Based on Topic Diffusion"],"prefix":"10.4018","volume":"11","author":[{"given":"Cong","family":"Zhang","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Yuan'An","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Lidong","family":"Zhai","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology of the Chinese Academy of Sciences, Beijing, China"}]},{"given":"Hui","family":"Lu","sequence":"additional","affiliation":[{"name":"Guangzhou University, Guangzhou, China"}]}],"member":"2432","reference":[{"key":"IJDCF.2019100109-0","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72524-4_50"},{"key":"IJDCF.2019100109-1","doi-asserted-by":"crossref","unstructured":"Cha, M., Haddadi, H., Benevenuto, F., & Gummadi, K. P. (2010). Measuring user influence in twitter: the million follower fallacy.","DOI":"10.1609\/icwsm.v4i1.14033"},{"key":"IJDCF.2019100109-2","doi-asserted-by":"crossref","unstructured":"Cha, M., Haddadi, H., Benevenuto, F., & Gummadi, P. K. (2010). Measuring User Influence in Twitter: The Million Follower Fallacy. International Conference on Weblogs and Social Media, Icwsm 2010, Washington, DC (Vol.14). DBLP.","DOI":"10.1609\/icwsm.v4i1.14033"},{"key":"IJDCF.2019100109-3","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557047"},{"key":"IJDCF.2019100109-4","unstructured":"Cong Zhang does his Ph.D. at Beijing University of Posts and Telecommunications, Beijing, China. His current research interests include IOT security, big data analysis."},{"key":"IJDCF.2019100109-5","doi-asserted-by":"publisher","DOI":"10.1007\/11527503_44"},{"key":"IJDCF.2019100109-6","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"IJDCF.2019100109-7","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"IJDCF.2019100109-8","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611275114"},{"key":"IJDCF.2019100109-9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.113"},{"key":"IJDCF.2019100109-10","unstructured":"Li, Y., Chen, W., Wang, Y., & Zhang, Z. L. (2011). Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships."},{"key":"IJDCF.2019100109-11","doi-asserted-by":"crossref","unstructured":"Liao, J. H., Shi, J., Chi, S. L., & Cheng, Y. H. (2017). Design and application of blended learning based on wechat public platform.","DOI":"10.12783\/dtssehs\/icesd2017\/11533"},{"key":"IJDCF.2019100109-12","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE.2007.4375740"},{"key":"IJDCF.2019100109-13","unstructured":"Mao, J. X., Liu, Y. Q., Zhang, M., & Ma, S. P. (2014). Social influence analysis for microblog user based on user behavior. Chinese Journal of Computers."},{"issue":"2","key":"IJDCF.2019100109-14","first-page":"163","article-title":"Short text attitude analysis based on textual characteristics.","volume":"29","author":"C. H. E. N. G.Nanchang","year":"2015","journal-title":"Journal of Chinese Information Processing"},{"key":"IJDCF.2019100109-15","unstructured":"Page, L. (1998). The pagerank citation ranking: bringing order to the web. Stanford Digital Libraries Working Paper, 9(1), 1-14."},{"key":"IJDCF.2019100109-16","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2882979"},{"issue":"2","key":"IJDCF.2019100109-17","first-page":"275","article-title":"User interest modeling approach based on short text of micro-blog.","volume":"40","author":"Y. F.Qiu","year":"2014","journal-title":"Computer Engineering"},{"key":"IJDCF.2019100109-18","doi-asserted-by":"crossref","unstructured":"Rowe, M. (2014). SemanticSVD++: Incorporating Semantic Taste Evolution for Predicting Ratings. In IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence (Vol. 1, pp. 213-220). IEEE.","DOI":"10.1109\/WI-IAT.2014.36"},{"key":"IJDCF.2019100109-19","doi-asserted-by":"crossref","unstructured":"Weng, J., Lim, E. P., Jiang, J., & He, Q. (2010). Twitter rank: finding topic-sensitive influential twitterers.","DOI":"10.1145\/1718487.1718520"},{"issue":"25","key":"IJDCF.2019100109-20","first-page":"229","article-title":"New assessment method on influence of bloggers in community of Chinese microblog.","volume":"48","author":"C.Yang","year":"2012","journal-title":"Computer Engineering and Applications"},{"key":"IJDCF.2019100109-21","unstructured":"You, B., Yan, Y. S., Sun, Y. G., & Liu, J. (2013). Method of information content evaluating semantic similarity on HowNet. Jisuanji Xitong Yingyong- Computer Systems and Applications, 22(1), 129-133."}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=238889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,20]],"date-time":"2023-09-20T23:46:12Z","timestamp":1695253572000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDCF.2019100109"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":22,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2019100109","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10]]}}}