Structural Hole Theory in Social Network Analysis: A Review

Social networks now connect billions of people around the world, where individuals occupying different positions often represent different social roles and show different characteristics in their behaviors. The structural hole (SH) theory demonstrates that users occupying the bridging positions betw...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on computational social systems Vol. 9; no. 3; pp. 724 - 739
Main Authors Lin, Zihang, Zhang, Yuwei, Gong, Qingyuan, Chen, Yang, Oksanen, Atte, Ding, Aaron Yi
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.06.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2329-924X
2373-7476
DOI10.1109/TCSS.2021.3070321

Cover

Abstract Social networks now connect billions of people around the world, where individuals occupying different positions often represent different social roles and show different characteristics in their behaviors. The structural hole (SH) theory demonstrates that users occupying the bridging positions between different communities have advantages since they control the key information diffusion paths. Users of this type, known as SH spanners, are important when it comes to assimilating social network structures and user behaviors. In this article, we review the use of SHs theory in social network analysis, where SH spanners take advantage of both information and control benefits. We investigate the existing algorithms of SH spanner detection and classify them into information flow-based algorithms and network centrality-based algorithms. For practitioners, we further illustrate the applications of SH theory in various practical scenarios, including enterprise settings, information diffusion in social networks, software development, mobile applications, and machine learning (ML)-based social prediction. Our review provides a comprehensive discussion on the foundation, detection, and practical applications of SHs. The insights can facilitate researchers and service providers to better apply the theory and derive value-added tools with advanced ML techniques. To inspire follow-up research, we identify potential research trends in this area, especially on the dynamics of networks.
AbstractList Social networks now connect billions of people around the world, where individuals occupying different positions often represent different social roles and show different characteristics in their behaviors. The structural hole (SH) theory demonstrates that users occupying the bridging positions between different communities have advantages since they control the key information diffusion paths. Users of this type, known as SH spanners, are important when it comes to assimilating social network structures and user behaviors. In this article, we review the use of SHs theory in social network analysis, where SH spanners take advantage of both information and control benefits. We investigate the existing algorithms of SH spanner detection and classify them into information flow-based algorithms and network centrality-based algorithms. For practitioners, we further illustrate the applications of SH theory in various practical scenarios, including enterprise settings, information diffusion in social networks, software development, mobile applications, and machine learning (ML)-based social prediction. Our review provides a comprehensive discussion on the foundation, detection, and practical applications of SHs. The insights can facilitate researchers and service providers to better apply the theory and derive value-added tools with advanced ML techniques. To inspire follow-up research, we identify potential research trends in this area, especially on the dynamics of networks.
Author Gong, Qingyuan
Chen, Yang
Zhang, Yuwei
Ding, Aaron Yi
Lin, Zihang
Oksanen, Atte
Author_xml – sequence: 1
  givenname: Zihang
  orcidid: 0000-0003-4262-6354
  surname: Lin
  fullname: Lin, Zihang
  email: zihanglin18@fudan.edu.cn
  organization: School of Computer Science, Fudan University, Shanghai, China
– sequence: 2
  givenname: Yuwei
  orcidid: 0000-0003-2110-1858
  surname: Zhang
  fullname: Zhang, Yuwei
  email: zhangyuwei18@fudan.edu.cn
  organization: School of Computer Science, Fudan University, Shanghai, China
– sequence: 3
  givenname: Qingyuan
  surname: Gong
  fullname: Gong, Qingyuan
  email: gongqingyuan@fudan.edu.cn
  organization: School of Computer Science, Fudan University, Shanghai, China
– sequence: 4
  givenname: Yang
  orcidid: 0000-0003-4749-3060
  surname: Chen
  fullname: Chen, Yang
  email: chenyang@fudan.edu.cn
  organization: School of Computer Science, Fudan University, Shanghai, China
– sequence: 5
  givenname: Atte
  orcidid: 0000-0003-4143-5580
  surname: Oksanen
  fullname: Oksanen, Atte
  email: atte.oksanen@tuni.fi
  organization: Faculty of Social Sciences, Tampere University, Tampere, Finland
– sequence: 6
  givenname: Aaron Yi
  orcidid: 0000-0003-4173-031X
  surname: Ding
  fullname: Ding, Aaron Yi
  email: aaron.ding@tudelft.nl
  organization: Department of Engineering Systems and Services, TU Delft, Delft, The Netherlands
BookMark eNp9kE1LAzEQhoNUsNb-APGy4Hnr5GOTjZ5KUSsUBbeCt5DGLKaum5rsWvrv3aXFgwdPMwzvMzM8p2hQ-9oidI5hgjHIq-WsKCYECJ5QEEAJPkJDQgVNBRN80PdEppKw1xM0jnENAJhkmSAwRDdFE1rTtEFXydxXNlm-Wx92iauTwhvXTR9ts_XhI5nWutpFF6-TafJsv53dnqHjUlfRjg91hF7ubpezebp4un-YTRepIZI2KdZAeUlXkmSUMyNzLYWR2Zu1qyzLV1xrEMQSYKXBDHPGabkS2AqRG5HnnNIRutzv3QT_1drYqLVvQ_dOVIQLIJCzDLoU3qdM8DEGW6pNcJ867BQG1WtSvSbVa1IHTR0j_jDGNbpxvm6CdtW_5MWedNba30uSAccyoz9FMHR9
CODEN ITCSGL
CitedBy_id crossref_primary_10_4018_IRMJ_349977
crossref_primary_10_1016_j_inffus_2024_102797
crossref_primary_10_1080_23742917_2024_2400729
crossref_primary_10_1007_s13132_023_01219_7
crossref_primary_10_23919_JSC_2022_0018
crossref_primary_10_1016_j_patter_2023_100839
crossref_primary_10_1186_s12961_025_01303_1
crossref_primary_10_1111_exsy_13451
crossref_primary_10_1016_j_knosys_2024_111929
crossref_primary_10_1186_s12906_024_04564_5
crossref_primary_10_1109_ACCESS_2023_3345219
crossref_primary_10_1109_TEM_2023_3295813
crossref_primary_10_1049_2024_8846233
crossref_primary_10_1080_09537325_2023_2269267
crossref_primary_10_1109_TKDE_2021_3091503
crossref_primary_10_3390_jmse11081585
crossref_primary_10_3390_e26040315
crossref_primary_10_3390_sym15010211
crossref_primary_10_1016_j_eswa_2024_124513
crossref_primary_10_1016_j_heliyon_2023_e13192
crossref_primary_10_1142_S0129183124502322
crossref_primary_10_1155_2022_2036370
crossref_primary_10_1080_15256480_2024_2443440
crossref_primary_10_1016_j_ssci_2024_106766
crossref_primary_10_1177_20539517241270714
crossref_primary_10_3390_agriculture14050649
crossref_primary_10_1016_j_conbuildmat_2024_139647
crossref_primary_10_1016_j_heliyon_2024_e33966
crossref_primary_10_3390_agriculture14050683
crossref_primary_10_1007_s10479_024_06119_w
crossref_primary_10_1109_ACCESS_2023_3287214
crossref_primary_10_1007_s00607_022_01125_x
crossref_primary_10_1016_j_heliyon_2024_e36658
crossref_primary_10_1109_ACCESS_2023_3281412
Cites_doi 10.1002/job.1994
10.1146/annurev-psych-113011-143828
10.2307/1914185
10.1086/667856
10.1016/S0378-8733(97)00005-1
10.1016/j.socnet.2020.07.009
10.1007/978-3-030-01129-1_29
10.1145/2187836.2187907
10.1109/TEM.2020.2972347
10.1137/0201010
10.1016/j.knosys.2016.07.007
10.5465/amd.2015.0108
10.1086/225469
10.1016/j.physa.2020.124944
10.1109/MC.2016.166
10.1007/s00026-005-0237-z
10.1145/2806416.2806468
10.1086/421787
10.1145/2488388.2488461
10.1007/s11628-013-0184-z
10.1609/aaai.v30i1.10003
10.1145/1368088.1368161
10.1016/j.socnet.2009.11.002
10.4159/9780674029095
10.1145/2124295.2124382
10.1109/ASONAM.2018.8508292
10.1186/s40649-020-00079-4
10.1145/3086695
10.1016/j.knosys.2020.105916
10.1145/3342280.3342319
10.1016/j.techsoc.2014.08.001
10.1145/1386790.1386835
10.1109/TKDE.2015.2453956
10.1007/s00168-008-0245-8
10.1016/j.ins.2019.07.072
10.1146/annurev-soc-081309-150054
10.1145/2746230
10.1016/j.socnet.2015.04.008
10.1109/ICC.2019.8761301
10.1016/j.comnet.2020.107336
10.1609/aaai.v32i1.11257
10.1145/2806416.2806431
10.1109/TKDE.2015.2477304
10.1016/j.ijintrel.2010.08.001
10.1109/ACCESS.2017.2758353
10.1109/ICDM.2011.48
10.1145/3341161.3342881
10.1145/956755.956769
10.1145/2441776.2441781
10.1109/TKDE.2017.2651825
10.1109/TNN.2008.2005605
10.24963/ijcai.2018/288
10.1080/00207540701224582
10.1137/1.9781611975321.37
10.1145/2939672.2939807
10.1145/2795235
10.1109/ICME.2018.8486450
10.1007/978-3-030-18576-3_31
10.1016/j.chb.2016.08.021
10.1109/ICDM.2019.00082
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TCSS.2021.3070321
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Social Sciences (General)
EISSN 2373-7476
EndPage 739
ExternalDocumentID 10_1109_TCSS_2021_3070321
9406195
Genre orig-research
GrantInformation_xml – fundername: TU Delft Safety & Security Institute
– fundername: iSafe project
– fundername: “PCL Future Greater-Bay Area Network Facilities for Large-Scale Experiments and Applications”
  grantid: LZC0019
– fundername: National Natural Science Foundation of China
  grantid: 62072115; 71731004; 61602122
  funderid: 10.13039/501100001809
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
IFIPE
IPLJI
JAVBF
M43
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c293t-1a036f3b925364c98a97c95deeb558b6aa072e204fc1416463fb71e778c788633
IEDL.DBID RIE
ISSN 2329-924X
IngestDate Mon Jun 30 05:25:07 EDT 2025
Thu Apr 24 22:58:43 EDT 2025
Tue Oct 07 10:03:08 EDT 2025
Wed Aug 27 02:36:16 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-1a036f3b925364c98a97c95deeb558b6aa072e204fc1416463fb71e778c788633
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-4143-5580
0000-0003-4262-6354
0000-0003-4749-3060
0000-0003-2110-1858
0000-0003-4173-031X
PQID 2670208450
PQPubID 2040411
PageCount 16
ParticipantIDs crossref_primary_10_1109_TCSS_2021_3070321
crossref_citationtrail_10_1109_TCSS_2021_3070321
proquest_journals_2670208450
ieee_primary_9406195
PublicationCentury 2000
PublicationDate 2022-06-01
PublicationDateYYYYMMDD 2022-06-01
PublicationDate_xml – month: 06
  year: 2022
  text: 2022-06-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE transactions on computational social systems
PublicationTitleAbbrev TCSS
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref57
ref12
ref56
ref15
ref59
ref14
ref58
ref53
ref52
ref11
ref55
ref10
ref54
ref17
ref16
ref19
ref18
ref51
ref50
Krebs (ref2) 2002; 24
ref46
ref45
ref48
ref47
ref42
ref41
ref44
ref43
ref49
ref8
ref7
ref9
ref4
ref3
ref6
ref5
Borgatti (ref32) 1998; 21
ref40
Katz (ref30) 1955
ref35
ref34
ref37
ref36
ref31
ref33
ref1
ref39
ref38
Stovel (ref29) 2012; 38
ref24
ref23
ref26
ref25
ref20
ref63
ref22
ref21
ref28
ref27
ref60
ref62
ref61
References_xml – ident: ref18
  doi: 10.1002/job.1994
– ident: ref27
  doi: 10.1146/annurev-psych-113011-143828
– volume-title: Personal Influence, The Part Played by People in the Flow of Mass Communications
  year: 1955
  ident: ref30
– ident: ref62
  doi: 10.2307/1914185
– ident: ref42
  doi: 10.1086/667856
– ident: ref60
  doi: 10.1016/S0378-8733(97)00005-1
– ident: ref3
  doi: 10.1016/j.socnet.2020.07.009
– ident: ref52
  doi: 10.1007/978-3-030-01129-1_29
– ident: ref36
  doi: 10.1145/2187836.2187907
– ident: ref19
  doi: 10.1109/TEM.2020.2972347
– ident: ref43
  doi: 10.1137/0201010
– volume: 21
  start-page: 27
  issue: 2
  year: 1998
  ident: ref32
  article-title: Network measures of social capital
  publication-title: Connections
– ident: ref44
  doi: 10.1016/j.knosys.2016.07.007
– ident: ref15
  doi: 10.5465/amd.2015.0108
– ident: ref8
  doi: 10.1086/225469
– ident: ref54
  doi: 10.1016/j.physa.2020.124944
– ident: ref23
  doi: 10.1109/MC.2016.166
– ident: ref41
  doi: 10.1007/s00026-005-0237-z
– ident: ref11
  doi: 10.1145/2806416.2806468
– ident: ref28
  doi: 10.1086/421787
– ident: ref7
  doi: 10.1145/2488388.2488461
– ident: ref26
  doi: 10.1007/s11628-013-0184-z
– ident: ref22
  doi: 10.1609/aaai.v30i1.10003
– ident: ref25
  doi: 10.1145/1368088.1368161
– ident: ref48
  doi: 10.1016/j.socnet.2009.11.002
– ident: ref6
  doi: 10.4159/9780674029095
– ident: ref39
  doi: 10.1145/2124295.2124382
– ident: ref50
  doi: 10.1109/ASONAM.2018.8508292
– ident: ref45
  doi: 10.1186/s40649-020-00079-4
– ident: ref57
  doi: 10.1145/3086695
– ident: ref35
  doi: 10.1016/j.knosys.2020.105916
– ident: ref61
  doi: 10.1145/3342280.3342319
– ident: ref4
  doi: 10.1016/j.techsoc.2014.08.001
– ident: ref37
  doi: 10.1145/1386790.1386835
– ident: ref14
  doi: 10.1109/TKDE.2015.2453956
– ident: ref20
  doi: 10.1007/s00168-008-0245-8
– ident: ref9
  doi: 10.1016/j.ins.2019.07.072
– volume: 38
  start-page: 139
  year: 2012
  ident: ref29
  article-title: Brokerage
  publication-title: Annu. Rev. Sociol.
  doi: 10.1146/annurev-soc-081309-150054
– ident: ref58
  doi: 10.1145/2746230
– ident: ref31
  doi: 10.1016/j.socnet.2015.04.008
– ident: ref59
  doi: 10.1109/ICC.2019.8761301
– ident: ref55
  doi: 10.1016/j.comnet.2020.107336
– ident: ref47
  doi: 10.1609/aaai.v32i1.11257
– ident: ref12
  doi: 10.1145/2806416.2806431
– ident: ref56
  doi: 10.1109/TKDE.2015.2477304
– ident: ref1
  doi: 10.1016/j.ijintrel.2010.08.001
– ident: ref21
  doi: 10.1109/ACCESS.2017.2758353
– ident: ref38
  doi: 10.1109/ICDM.2011.48
– ident: ref51
  doi: 10.1145/3341161.3342881
– volume: 24
  start-page: 43
  issue: 3
  year: 2002
  ident: ref2
  article-title: Mapping networks of terrorist cells
  publication-title: Connections
– ident: ref40
  doi: 10.1145/956755.956769
– ident: ref49
  doi: 10.1145/2441776.2441781
– ident: ref13
  doi: 10.1109/TKDE.2017.2651825
– ident: ref63
  doi: 10.1109/TNN.2008.2005605
– ident: ref46
  doi: 10.24963/ijcai.2018/288
– ident: ref5
  doi: 10.1080/00207540701224582
– ident: ref34
  doi: 10.1137/1.9781611975321.37
– ident: ref10
  doi: 10.1145/2939672.2939807
– ident: ref24
  doi: 10.1145/2795235
– ident: ref53
  doi: 10.1109/ICME.2018.8486450
– ident: ref33
  doi: 10.1007/978-3-030-18576-3_31
– ident: ref17
  doi: 10.1016/j.chb.2016.08.021
– ident: ref16
  doi: 10.1109/ICDM.2019.00082
SSID ssj0001255720
Score 2.4552345
SecondaryResourceType review_article
Snippet Social networks now connect billions of people around the world, where individuals occupying different positions often represent different social roles and...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 724
SubjectTerms Algorithms
Applications
Applications programs
Bridges
Classification algorithms
Heuristic algorithms
Information dissemination
Information flow
Machine learning
machine learning (ML)
Measurement
Mobile applications
Mobile computing
Network analysis
Social network analysis
Social networking (online)
Social networks
Software
Software development
structural hole (SH) theory
User behavior
Title Structural Hole Theory in Social Network Analysis: A Review
URI https://ieeexplore.ieee.org/document/9406195
https://www.proquest.com/docview/2670208450
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 2373-7476
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001255720
  issn: 2329-924X
  databaseCode: RIE
  dateStart: 20140101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH_Mnbz4NcXplBw8qNitaZqm0dMYjiHMyxzsVpL0FUTZhG0X_3qbNB1-Id56yIPw3kvf9-8BXDAjVRojDbD0loM4yXWgUeQBkywXQqOSbmnf-DEZTeOHGZ814GYzC4OIrvkMu_bT1fLzhVnbVFlPWusj-RZsiTSpZrU-5VM4F1FduKSh7D0NJpMyAIxo1-l1RL-YHrdL5ccP2FmV4S6M6_tUzSQv3fVKd837N6jG_154D3a8e0n6lT7sQwPnB9CuZnCJf8dLcunBpq9acDdxALIWfIOMFq9IqmF98jwnnuqxahQnNXzJLemTqqJwCNPh_dNgFPiFCoEprfoqoKq0VwXTMuIsiY1MlRRG8hxRc57qRKlQRBiFcWFobIHHWKEFRSFSU0bKCWNH0Jwv5ngMhCkjqYkVF6wM8BRTecFliEVSUFFQnrYhrHmdGY82bpdevGYu6ghlZsWTWfFkXjxtuN6QvFVQG38dbll2bw56TrehUws0849xmUWJsKtIYx6e_E51CtuRnWpwyZUONEvG41npa6z0uVOyD2ybzwQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGGDhjShPDwyASIljO45hQghUHu3SIrFFtnOREKhFoiz8emLHqXgJsWXwSdbdOff-DmCfWaUzjjTCyluOeFqYyKAsIqZYIaVBrfzSvm4v7dzzmwfxMAXHk1kYRPTNZ9h2n76WX4zsm0uVnShnfZSYhlnBORf1tNanjIoQMmlKlzRWJ4OLfr8KARPa9pqd0C_Gx29T-fEL9nblahG6zY3qdpKn9tvYtO37N7DG_155CRaCg0nOa41YhikcrkCrnsIl4SW_koMAN324Cmd9DyHr4DdIZ_SMpB7XJ49DEqh6das4aQBMTsk5qWsKa3B_dTm46ERhpUJkK7s-jqiuLFbJjEoES7lVmVbSKlEgGiEyk2odywSTmJeWcgc9xkojKUqZ2SpWThlbh5nhaIgbQJi2ilquhWRViKeZLkqhYizTksqSiqwFccPr3Aa8cbf24jn3cUesciee3IknD-JpwdGE5KUG2_jr8Kpj9-Rg4HQLthuB5uE5vuZJKt0yUi7izd-p9mCuM-je5XfXvdstmE_cjINPtWzDTCUE3Kk8j7HZ9Qr3AXCu0lE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Structural+Hole+Theory+in+Social+Network+Analysis%3A+A+Review&rft.jtitle=IEEE+transactions+on+computational+social+systems&rft.au=Lin%2C+Zihang&rft.au=Zhang%2C+Yuwei&rft.au=Gong%2C+Qingyuan&rft.au=Chen%2C+Yang&rft.date=2022-06-01&rft.pub=IEEE&rft.eissn=2373-7476&rft.volume=9&rft.issue=3&rft.spage=724&rft.epage=739&rft_id=info:doi/10.1109%2FTCSS.2021.3070321&rft.externalDocID=9406195
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2329-924X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2329-924X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2329-924X&client=summon