Abstract
Knowledge discovery and data mining provide an array of solutions for real-world problems. When facing business requirements, the ultimate goal of knowledge discovery is not the knowledge itself but rather making the gained knowledge practical. Consequently, the models and patterns found by the mining methods often require post-processing. To this end, actionable knowledge discovery has been introduced which is developed to extract actionable knowledge from data. The output of actionable knowledge discovery is a set of actions that help the domain expert to gain the desired outcome. Such a process where a set of actions are extracted is called action extraction. One of the challenges of action extraction is to incorporate causal dependencies among the variables to find actions with higher effectiveness compared to when no such dependencies are used. The goal of this paper is to dive into the lesser studied subject of “action discovery in social networks” and intends to extract actions by utilizing the casual structures discovered from such data. Furthermore, in order to capture the underlying information within a social network, we extract the corresponding structural features. We propose a method called SF-ICE-CREAM (Social Features included Inductive Causation Enabled Causal Relationship-based Economical Action Mining) to overcome the challenges introduced above. This method uses structural features to find the underlying causal structures within a social network and incorporates them into the action extraction process.
Introduction
Social networks have been a rich source of study due to their continuous evolution over the past decade. A variety of data mining methods have been carried out by scientists on social data to extract knowledge. Detection of social anomalies and smart advertisement are just a few to name among the applications of such knowledge. The typical data mining methods provide either predictive or descriptive models by processing such data which results in useful knowledge. But when we face the real-world problems, having only a model of the data would not suffice because we rather require to change the current situation towards a desirable one by immediate actions and interventions according to the business requirements. In order to intervene, i.e. apply the suggestions that could potentially result in an improved situation, a field of study called “Actionable knowledge Discovery” has been introduced. However, in the actionable knowledge discovery domain, like other typical data mining tasks, the foundation of the gained knowledge is the correlations discovered inside the input data. Meanwhile, these correlations do not necessarily imply causality and as a result, the suggested actions are solely based on statistical correlations rather than the actual causal dependencies. Subsequently, these methods fail to guarantee the desired outcome. Pearl introduced the impact of causality in data mining for the first time in [1] and then proposed a method to extract causal structures from data with Verma in [2]. Extracting causal structures has lots of limitations and complexities and it is near impossible in most cases. But in the works such as [3], we can see that these structures can be found if certain assumptions are made. We can furthermore see that using these structures can improve the quality of actions compared to when only the correlations are used. Considering causal structures in the actionable knowledge discovery domain has been a lesser researched subject to the best of our knowledge and none of the works in the field has discovered actionable knowledge from social networks while incorporating causality.
Markedly, action mining in social networks has recently been introduced in [4, 5] where the relationships between individuals are incorporated in the mining process. In this work, cost-effective action mining is turned into an optimization problem where the objective is defined as obtaining a desired label for an intended object while minimizing the cost of changes suggested by the extracted actions. The problem is modeled using random walks over the network and solved by Stochastic Gradient Descent. Although this work has comprehensively extracted actions from a social network, it does not calculate the impact of causality. Whereas, in this paper we intend to incorporate causality in the action mining process.
In addition to causality, in social network data, the relationships between objects is another important factor. To the best of our knowledge, methods of actionable knowledge discovery use data where each object and its features are independent of others. In other words, the data is in a tabular format where each record comprises features without regarding the dependencies inside the data.
In this paper, we propose a method that extracts actionable knowledge while exploiting causal structures inside social network data. We also intend to shift away from the typical features used in this domain and use features solely based on the relationships among the objects inside the network. Such features called structural features. To the best of our knowledge, this is the first research that tackles the extract ion of actionable knowledge from causal structures of social networks. Therefore, our detailed contributions in this paper is as follows: Extract interpretable structural features based on the relationships inside a social network. Extract causal structures from the extracted structural features. Extract actions from social network graph using causal structures of structural features.
Our goal is to ultimately obtain a set of suggestions that could help to alter the undesired situation. In other words, for an intended object in an undesired class, we are looking for a set of suggestions to change the feature values of the intended object such that the altered object would be in the desired class. This is the definition of an action. That is, an action is a suggestion to change the value of a specific feature of the intended object in order to make its situation more desirable. A process in which a set of such actions are extracted for any given object in an undesirable state is called Action Mining. In some methods like [6] and also in ours, a cost is associated for each change of features values which is dependent to the deficit of original feature value and the feature value suggested by the action. Such methods are called economical because they incorporate such costs. We will show that our method outperforms its competitors on social network data in terms of different measures of action quality such as effectiveness.
Since actions suggest some changes on the value of features, structural features extracted by the feature extraction method should be interpretable by a domain expert. Therefore, we utilize a ReFeX-based method introduced in [6] by extending it to provide distinguishable features. For action extraction, we use ICE-CREAM method proposed in [3] exploiting the causal structures extracted so far. We name it SF-ICE-CREAM (Structural Features-based ICE-CREAM) The rest of this paper is structured as follows. We review the latest works of this field in the related works section. In the terminology section, we redefine some terms and definitions for disambiguation and integrity. In the proposed method section we thoroughly examine our method. Then we show the experimental results and present comparisons with other state-of-the-art methods in the experiments section. Finally, in the discussion and future works section, we conclude the research and propose future works.
Related work
Since the scientific contribution of our work is mainly focused on action mining, in this section we review the latest researches in the literature. Each research and its application will be described concisely. It is noteworthy that very few of the works in this field have studied causality. Furthermore, to the best of our knowledge, causality in social networks is not investigated in the researches in the action mining literature.
Action mining is part of a subdomain of data mining called Actionable Knowledge Discovery (AKD), which is concerned with finding the knowledge which not only is of technical significance but also satisfies domain expectations, and can be applied to operations with minimal further effort of domain experts [7]. Action mining methods find an optimal action for a given instance (Transductive methods) or find rules for different groups of similar instances (Inductive methods) which can afterwards be used to produce actions.
Ras et al. in (Ras & Wieczorkowska, 2000) defined the concept of action rules and proposed a method to produce the rules using pairs of classification rules. Afterwards, this work was developed to mine action rules without pre-existing classification rules through an Apriori-like algorithm to handle big data based on Map-Reduce framework [8].
Su et al. [9] introduced actionable behavioral rule mining which aims to extract action rules from an object-based data for affecting an entity behavior. The data includes observations (objects) of an entity instead of members of an entity. In addition, there is a current observation where each change of a proposed action rule needs to change an attribute value of the entity from the current observation. In [10], Su et al. proposed a method to extract actionable behavioral rules based on decision trees.
While an action rule is a set of changes that need to be made for achieving the desired result, meta-actions are the actions that need to be executed in order to trigger corresponding changes. In [11], Ranganathan et al. proposed a new efficient system, to generate meta-actions by implementing Specific Action Rule discovery based on Grabbing Strategy (SARGS) and applying it to Twitter data for semantic analysis.
In [12], Kuang et al. have worked on a hierarchical meta-action ordering strategy (used to represent action rules and their corresponding triggers in a tree-like structure) along with the effects of meta-nodes. The method in [13] developed by Almardini et al. aims to find meta-actions by clustering patients using a graph-based model. This method is specifically designed to solve the prediction of patients’ treatment path taken from readmission to the end of their treatment problem. Kuang et al. in [14] proposed one of the main modules of HAMIS (recommender system designed for 34 industrial services companies). Their method introduces a module that is responsible for discovering meta-actions from a massive set of textual comments obtained from their customers during surveys about their satisfaction with the company’s provided services.
The work in [15] has been developed by Touati et al. in which the evaluation of action rules is done by measuring the benefits of meta-actions by two measures of probability and reliability of performance.
Cui et al. used additive tree models (ATM) to extract actions [18] using a transductive method. ATMs are typically not very well interpreted when extracting actions so in the paper a new framework is proposed to post-process such ATMs capable of proposing an actionable plan to modify each input with minimum cost to achieve the desired state. The main approach of this work is to formulate optimal action mining to an integer linear programming problem. In [19] Lu et al. proposed yet another approach to extract actions from ATMs. Here the optimal actionable planning (OAP) is targeted and defined for each ATM. Then a heuristic method is proposed to find the optimal solution from the state space graph.
In [4] action mining from social networks is tackled. An action suggests a set of optimal changes in the weight of edges. The proposed method utilizes a node classification technique based on label propagation to ultimately calculate the optimal changes in the edges of the input graph which turns the label of the intended node to a desired one. The problem is an optimization problem which is modeled using random walks and solve using stochastic gradient descent.
In [20] Li et al. refer to the concepts of both actionable knowledge and causality and assert causality as a principle in data mining. In this paper, actionability is declared as an important property of knowledge. In order to carry out an action, the discovered knowledge has to imply causal relationships to be able to justify the occurrences inside the data under consideration. Having a set of simple data mining tools can be beneficial to discover causal relationships. Although these tools do not guarantee their finding to be absolutely causal but are capable of finding candidates excluding non-causal features. In [3] Shamsinejad et al. try to solve the problem that the correlations found do not necessarily imply causation. To address this, they proposed ICE-CREAM in which actions are extracted using inductive causation introduced by Pearl and Verma in [2]. They benefit from a causal structure obtained from data and use causal inference to extract actions based on causality.
The common characteristics of these researches are that they are mainly focused on either business or health domains. The works focused on social network data do not incorporate causal dependencies; hence, they fail to carry out causal inference. Whereas our method focuses on social network data, incorporates causal dependencies in the network and performs causal inferences to achieve more qualified actions.
Terminology and preliminary
The concepts and definition of actionable knowledge discovery vary in different sources. We intend to redefine the terms used in this paper for clarification and better understanding. Table 1 briefly describes notations and symbols used throughout the paper.
Notations and definitions
Notations and definitions

Sample casual network.
In our method, a causal network is extracted from a set of structural features and we use them to extract actions. We will dive into the details of this method in the next section.
We intend to extract actions using the causal network extracted from a social network graph. To this end, we are going to take the following steps: Extract the structural features from the social network represented as a graph. Extract a causal network based on the structural features.
The causal network will then be used in the action extraction process.
Feature extraction
To capture the information which lies within the dependencies inside the network data, we extract structural features and later feed them into the action mining process. To extract such features we utilize ReFeX [6]. The output of this method is a set of features built based on the structure of the network. ReFeX calculates three simple measures: degree, ego-net degree and ego-net out-degree for each node. These features are called local, meaning they can be easily induced by probing only the neighborhood of each node [6]. Furthermore to generate more features that further describe the nodes of the graph, ReFeX performs an iterative process including the following steps: initially calculates the three aforementioned measures for each node v inside the graph G. It specifically creates a feature vector of size three for each node in its first phase. Then for each node v and each measure m defines a new measure m′ which is the aggregate of m over the neighbors of v. These aggregation values are then added to the corresponding feature vectors. The feature generation process continues until no new information is given by the newly added features. In other words, ReFeX keeps only the most informative features.
There are other novel methods proposed in this category such as [24–27] which also extract structural features. These methods produce structural features by either matrix factorization or random walks that are only informative. However, it is unclear what exactly their features and their values represent. In other words, there is no set of predefined features and since an action suggests a change in the value of some features, we clearly need to extract a predefined set of structural features. Particularly, due to real-world business requirements, it is an interest to suggest some interpretable changes in the value of features which make sense according to the related domain. In this regard, we chose ReFeX and extend it by retaining additional descriptions for the structural features (in the feature vectors) for the sake of providing a set of trackable features. That is, how the structural features are used regarding the changes suggested by an action set are applied inside the network.
To address this, we extend ReFeX (and name it ReFeX2)by keeping additional information in the feature extraction phase for each feature which will subsequently help to exactly determine the changes. We keep normalization factor, iteration number and feature type to achieve the requirements of our method. By having the following elements we can get the initial value and the type of each feature, its neighborhood and the edges to be changed: Normalization factor: it is a number for normalizing the value of features during the feature extraction phase. There are a variety of functions to do so. Having this number and the function used for normalization enables us to obtain the original value from its normalized one. Iteration number: by having this number we can find the neighborhood to which the changes should be applied. Given an object o, the features generated in the 1st iteration are neighbors of o, features from the 2nd iteration are distance-2 neighbors of o and so on. For example, the iteration number k determines the distance of neighborhood that we need to apply changes to. k corresponds to the neighborhood distance of a given object for which we suggested and action. Feature type: finally we need to determine what edges are to be modified, according to the changes suggested by the action. We need to determine whether the change is related to the degree, ego-net or ego-net out-degree to know where exactly the edges have to change. To do this we need to keep the name of each feature generated in the first phase and forward this name to the features extraction in aggregating phase. This way, when the feature extraction process finishes, each feature will have an indicator attached to it, showing its type i.e. degree, ego-net degree or ego-net out-degree.
Constructing a causal network based on the structural features
As mentioned earlier, inductive causation (IC-Algorithm) [2] will be used to extract the causal structures. This method searches for V-structures inside the data i.e. the causal inference of a variable C can only be made when the value of at least two other upstream variables such as A and B of C are known (Fig. 2).

A and B are not independent when the value of C is known.
To find the causal network, the IC-Algorithm uses conditional independence relationships between features.
Given the structural features extracted by ReFeX we can extract a causal network from them using algorithm which is the base of many proposed methods. IC is based on conditional independencies among input data to find cause and effect relationships in which the main idea is to find the V-structures mentioned earlier.
The IC algorithm takes the following steps to find the causal dependencies: for any feature pair (a, b) inside input data, search for a set S ab where a and b are conditionally independent having the features inside the set. In other words, given S ab , a and b must remain independent. Then create undirected graph G with an edge between a and b if and only if no S ab can be found for a and b. Then for any feature which is not the neighbor of a nor b, having a common neighbor c, check whether c ∈ S ab . If so, continue; otherwise, direct the edges to c i.e. a → c → b. In the remaining graph, direct the undirected edges with the following conditions: 1) the directions must not form a new V-structure and 2) the direction must not make a cycle inside the graph.
The idea of using V-structures is apparent in the above procedure. The output of IC is a causal network which is used for inference in our method. However, because of exponential complexity of the IC algorithm w.r.t the number of features, we apply a greedy approach due to the fact that we are interested in finding out a partial causal structure leading to the intended target feature. Therefore, we check the different combination of features and stop this procedure as soon as a causal network is found. The overall conception is illustrated by the following example.
The following figure is a simplified hypothetical Bayesian network built from a dataset with features S1={A, B, C, D, E, F, G} where G is selected as target feature.
Hereon, the IC algorithm is applied to the Bayesian network to find the underlying causal network. As mentioned earlier, this method is interested in finding the V-Structures affiliated with the target feature (G in this example). The network shown by Fig. 4 is the only possible causal network according to Fig. 3 because only D and E are not independent if the value of G is known.

A Bayesian network.

The Causal Network inferred for the Bayesian network in Fig. 3.
According to the obtained causal network (depicted by Fig. 4), features S2 = {D, E, G} are the upstream nodes to G. In other words, S2 is the candidate features set. Instead of incorporating S1 in the action extraction process, only S2 (where S1 ⊂ S2) is used which leads to a much less computation overhead.
We are going to extract actions based on causal relationships between features where these relationships are represented inside a causal network.
In order to extract actions based on the causal dependencies rather than correlations, a causal network is extracted and incorporated in the action mining process. To extract actions, we need two elements. Feature vectors and the underlying causal structure. We have adopted the method in [3] to extract actions but the features we use are structural and the causal network used is extracted from those features. In the causal network, each node is the representative of a feature and one of them is chosen as the class label. We seek causal actions so the class label has to be selected from the causal network. The nodes upstream to a target are called cause nodes. Therefore, finding such cause nodes will result in a set of the candidate target features. Once a target feature is chosen, its upstream nodes are candidate features in the action mining process. That is because of the fact that only these nodes can causally affect the target feature. So any other feature will be discarded in the action mining task. These candidate nodes will be called action features only when they show up inside an action.
Assuming we have extracted the causal network CN, we try to find the action set Γ for an intended object o ∈ O-. The quality of action sets are evaluated by using two measures namely effectiveness (formula 2) and net profit (formula 1). For a given object o the more the effectiveness of the action set the more the probability of turning the object into the desirable state. It is noteworthy that a causal network is incorporated when calculating the effectiveness of an action set. The effectiveness of an action set Γ with respect to causal network CN is as follows:
Ultimately, the goal of action extraction for an object o is to find an action set that maximizes the net profit. Each action in the form of (A, a → a′)) that A is a feature corresponding to a cause node, can be a candidate to suggest a change in the value of the goal feature. If C is the set of cause nodes, the total number of candidate actions will be ∑A∈C|Dom (A) -1| and the number of possible actions sets will be
In order to extract action sets two approaches have been proposed in the literature. One is to investigate all actions one by one (exhaustive search or ES) [3]. In ES the best action set will be chosen net profit-wise by calculating the net profit of each possible action set. However, it is apparent that searching the state space exhaustively will be intractable in medium to large datasets. The other approach is to follow a greedy search (GS) [3].
GS approach starts with an empty action set, then for each object O in an undesirable state (negative label) we add one of the candidate actions to the action set that improves the net profit of the action set compared to the other candidate actions. Then the new action set is compared to the previous action set, if the net profit of the newly obtained action set is improved, the new action will be permanently added into the action set. This continues until no action can be added to improve the net profit of the action set or no action remains. The whole process of extracting actions is briefly illustrated in the algorithm, we name it SF-ICE-CREAM. The algorithm uses the features generated by REFEX2, provided by a feature matrix F. Then, a Bayesian network is constructed out of the features where using the IC algorithm (line 3) the corresponding causal network is extracted. Finally, the greedy approach of algorithm ICE-CREAM generates the action sets for the given set of the input objects.
Experimental results
In this section, we will compare the three methods. The first method is our proposed SF-ICE-CREAM. The other methods are ICE-CREAM [3] and ICE-CREAM-EXT
1
. The latter is proposed because in some cases ICE-CREAM fails to extract causal structures from non-structural features. Therefore, for the sake of better comparisons and contextualization we extended ICE-CREAM. To this end, a limited number of simple structural features are extracted and used in the method. Particularly, for a node x, we adopted the following structural features in the action extraction process for extending ICE-CREAM to ICE-CREAM-EXT: The total number of edges adjacent to x. The total number of edges between x and its positive neighbors. The total number of edges between neighbors of x. The total number of edges between positive neighbors of x.
The number of structural features is limited to the mentioned list in order to avoid complicating the method. These features differ from the features extracted by ReFeX which are used in SF-ICE-CREAM in terms of complexity and comprehensiveness. More precisely, in addition to contextualization, our experiments demonstrate that ICE-CREAM not only fails to extract a causal network from node features occasionally, but also there are cases that even a predefined set of structural features do not lead to a causal network. However, the experiments show that using ReFeX structural features enables SF-ICE-CREAM to extract a causal network in all cases.
Using structural features improves the results compared to the competing methods. It also can be noted that we are not bound to node features to extract causal structures and we can use structural features as well.
We used a computer with 8 GB of RAM and a Core i7 1.6 GHz processor. We have also used Python programming language alongside Pomegranate, SKLearn and NetworkX packages for implementation, learning causal network, causal inference and traversing network respectively.
Data
The popular and publicly available 2 friendship and co-authorship networks of this domain have been selected for the experiments. The details of the datasets are described in Table 2. In the friendship networks, nodes are users and edges indicate friendship relations. We consider the following friendship networks: Facebook, where labels are locales, Google+where labels are places. It is notable that due to some memory limitations in our implementation we have divided Google+dataset into two smaller sub-graphs. The mentioned friendship networks are also provided with node features which is a necessity to compare competing methods as they rely on these type of features. In co-authorship networks, the nodes are authors and an edge exists between two authors if they have co-authored the same paper. We consider co-authorship network DBLP. In order to label input data in a binary class format, the values corresponding to the target value are assumed to be positive, and otherwise negative.
Information about datasets
Information about datasets
Since DBLP does not explicitly consist of node features, therefore, we have extracted the features by exploring the textual description and the underlying citation graph which have been attached by the provider of the dataset. For every node u of the networks we generate the following features: Number of papers u authored Number of papers u authored in goal conference Number of papers in which u is the first author The time since u authored the last paper Time since u last authored a paper in goal conference Number of time slices in which u authored a paper Number of Conferences/Journals in which u authored a paper Number of Conferences/Journals in which u was the first author Number of citations of u Number of citations of u in the goal conference Number of the papers cited by u Number of the papers in the goal conference cited by u
To compare and evaluate the results of each method, we measure effectiveness, cost, net profit, time efficiency, generality, and coverage. The first three measures are defined in terminology. The rest is defined as follows:
Time Efficiency of method:
For each o ∈ O- the running time from the beginning of feature extraction until finding the best action set is recorded. This measurement is used to compare the running time of the methods (in millisecond).
Generality of action sets extracted by a method:
It is the fraction of the number of features included in the action set and the total number of features. The closer to 1 the more proportion of the features has to be changed. The lesser the number of changes suggested by an action set the more general is the action. This could be a cause of concern for some business requirements as they may prefer fewer feature changes. The generality for a given method m is defined as follows (assuming that the method extracts at least one action set for a given object):
The averaged value is used if the method is applied for a given set of objects.
Coverage of method:
For a given method m the ability of finding action sets with positive profit given a set of objects in an undesirable state for which the method could extract action sets with positive profit. As mentioned before, our goal is to find an action set for a given object which not only increases the likelihood of being in a desirable situation but also maximizes the net profit. The introduced action mining methods guarantee one action set for each object o ∈ O- but naturally, some action sets may result in profits smaller than or equal to zero due to their high costs. In these cases, we set net profits to zero for better comparisons. Given a set of objects O- in an undesirable state, the coverage of method m is as follows:
Causal networks
The main contribution of our works is to show by evidence that it is possible to extract a causal network from structural features in social networks. In the initial step, given a network dataset, a set of structural features are extracted by ReFeX. The number of structural features extracted from each dataset and their corresponding graph is as follows (Table 3):
Number of structural features of each dataset
Number of structural features of each dataset
The next step is to extract the causal network from the structural features extracted by ReFeX2. Off-the-shelf libraries of finding causal structures suffer greatly from the limit of input variables. In order to extract a causal network, feeding more than ∼20 features will cause IC to halt. We have empirically set the number of input features to 15. We use the greedy approach since an exhaustive search over the space of possible combinations is nearly infeasible for the networks under experiment.
In our experiments, we initially select the first 15 features shown as nodes numbered 0–14 in the resulting causal networks (Fig. 5 through Fig. 8). All these features were extracted by ReFeX and the first 15 features of all the datasets were of the same type. More precisely, each feature is either a degree or an aggregation of the node degree in different areas of the social network. The following are the causal networks extracted from each dataset:

The causal network of DBLP.

The causal network of Facebook.

Casual network of Google+Largest Nodes subgraph.

Causal network of Google+Largest Edges subgraph.
In each of the induced causal networks, the 15th feature was selected as the target as it is at the end of most of the possible topological sorts of each causal network. Having these networks, SF-ICE-CREAM conducts action extraction. The results are presented in the following section.
In order to run the methods and perform our experiments, we have run each method 100 times over 100 randomly selected objects among O-. We have also selected the target feature randomly from the end of the causal network to avoid biased results and to better challenge the methods as it is more reasonable to traverse through the end of the network. In other words, a target feature is one which exists at the end of the most topological sorts of the causal network. Furthermore, the values inside the results tables are averaged for all the input instances.
We will see in the following tables that the effectiveness and net profit of our method outperform other methods. For simplicity SF-ICE-CREAM, ICE-CREAM-Ext and ICE-CREAM are abbreviated as SFIC, ICX, and IC respectively.
Table 4 shows the performance of the methods against Facebook dataset. Our method outperforms others in net profit and effectiveness. It is noteworthy that the effectiveness and the net profit of ICX are more than that of IC which shows that using even simple structural features can also improve the performance.
Comparison of methods in the Facebook dataset
Comparison of methods in the Facebook dataset
As IC fails to extract causal network from Google+dataset so only SFIC and ICX are compared. We can see the better performance of our method here as well (shown in Table 5).
Comparison of SFIC and ICX in Google+ dataset
In the co-authorship network even with the simple structural features, ICX fails to extract causal networks. Only SFIC managed to successfully perform against this dataset. Table 6 shows the results of SFIC in DBLP dataset.
SFIC results in DBLP dataset
According to results, the NetProfit of the proposed SFIC method outperforms the others significantly. The ultimate goal of the three methods is to obtain the maximum net profit possible and the proposed method has achieved the goal. As formally defined earlier NetProfit is tightly related to effectiveness and cost. However, in most cases, the NetProfit of SFIC is high in spite of the high cost. In this cases, although the cost of SFIC is much higher, its prominent effectiveness offsets the high cost which results in a better NetProfit.
The generality of SFIC is better than the competitors on average, i.e. actions suggested by SFIC are more general than the ones suggested by the other methods. In fact, the number of features to be tweak in order to reach to a desirable situation is less than the others (IC does not involve structural features at all). It is interesting for business owners because they are more willing to tweak less features as possible, yet gain a higher profit.
The setback of our methods shows when putting coverage into perspective, SFIC does not guarantee to find action sets for all possible input objects yet our method has produced comparable results.
The running time of the methods lie within the same lane since there are not significant differences between them in average.
We proposed the idea of using the underlying causal network inside social network data and utilized it for action mining. We discussed how structural features can be regarded as a principle when analyzing such data. We also targeted the problem of neglecting the structural features when working on network data and we reintroduced one of the methods addressing this issue. It could be seen that using such features can greatly enhance the quality of action sets compared to when no features derived from graph structure are used. We introduced a hybrid method called SF-ICE-CREAM which is a combination of two methods, one in the field of structural feature extraction and the other for extracting actions with respect to the causal network.
Even though our method clearly improves its base methods but needs improvements itself. Solving the uncertainty of automatically induced casual networks is a bottleneck in this method. Because it is a time-consuming process and has high computational complexity and it also has many assumptions that may degrade the truthfulness of discovered causal dependencies, therefore, reduces the reliability of extracted action sets. In addition, our method assumes that there are no missing or noisy data present and the variables are all discrete. Another setback of the method is the increase of its computational complexity as the number of features increase. In this case, we need to limit the number of input variables which means not all of the features can be included in the process. Proposing a framework specifically designed to preprocess the input social data can be beneficial.
The massive amount of generated social data is also a challenge since it disables our method to perform on real-world massive social graphs. Having a distributed version of the proposed method can also be beneficial towards increasing the applicability of our method in real-world problems.
Finding causal networks themselves has a lot of challenges. In our method, one of the main steps is to find the causal network from the input data. To this end, a handful of libraries and methods have been introduced but none of them is able to include all the features since their complexity increases exponentially as the inputs grow in number. This is also a setback because it weakens the method to solve real-world problems with a large number of features.
