Modeling Information Flow in Face-to-Face Meetings while Protecting Privacy
Author(s)Rudolph, Larry; Zhenghao, Chen
Social networks have been used to understand how information flows through an organization as well as identifying individuals that appear to have control over this information flow. Such individuals are identified as being central nodes in a graph representation of the social network and have high "betweenness" values. Rather than looking at graphs derived from email, on-line forums, or telephone connections, we consider sequences of bipartite graphs that represent face-to-face meetings between individuals, and define a new metric to identify the information elite individuals. We show that, in our simulations, individuals that attend many meetings with many different people do not always have high betweenness values, even though they seem to be the ones that control the information flow.
Computer Science (CS)
social networks, universal hashing, privacy, information flow, pervasive computing, face-to-face meetings, models, location tracking