418 research outputs found
Emergence of influential spreaders in modified rumor models
The burst in the use of online social networks over the last decade has
provided evidence that current rumor spreading models miss some fundamental
ingredients in order to reproduce how information is disseminated. In
particular, recent literature has revealed that these models fail to reproduce
the fact that some nodes in a network have an influential role when it comes to
spread a piece of information. In this work, we introduce two mechanisms with
the aim of filling the gap between theoretical and experimental results. The
first model introduces the assumption that spreaders are not always active
whereas the second model considers the possibility that an ignorant is not
interested in spreading the rumor. In both cases, results from numerical
simulations show a higher adhesion to real data than classical rumor spreading
models. Our results shed some light on the mechanisms underlying the spreading
of information and ideas in large social systems and pave the way for more
realistic diffusion models.Comment: 14 Pages, 6 figures, accepted for publication in Journal of
Statistical Physic
Estimating Infection Sources in Networks Using Partial Timestamps
We study the problem of identifying infection sources in a network based on
the network topology, and a subset of infection timestamps. In the case of a
single infection source in a tree network, we derive the maximum likelihood
estimator of the source and the unknown diffusion parameters. We then introduce
a new heuristic involving an optimization over a parametrized family of Gromov
matrices to develop a single source estimation algorithm for general graphs.
Compared with the breadth-first search tree heuristic commonly adopted in the
literature, simulations demonstrate that our approach achieves better
estimation accuracy than several other benchmark algorithms, even though these
require more information like the diffusion parameters. We next develop a
multiple sources estimation algorithm for general graphs, which first
partitions the graph into source candidate clusters, and then applies our
single source estimation algorithm to each cluster. We show that if the graph
is a tree, then each source candidate cluster contains at least one source.
Simulations using synthetic and real networks, and experiments using real-world
data suggest that our proposed algorithms are able to estimate the true
infection source(s) to within a small number of hops with a small portion of
the infection timestamps being observed.Comment: 15 pages, 15 figures, accepted by IEEE Transactions on Information
Forensics and Securit
Modeling trend progression through an extension of the Polya Urn Process
Knowing how and when trends are formed is a frequently visited research goal.
In our work, we focus on the progression of trends through (social) networks.
We use a random graph (RG) model to mimic the progression of a trend through
the network. The context of the trend is not included in our model. We show
that every state of the RG model maps to a state of the Polya process. We find
that the limit of the component size distribution of the RG model shows
power-law behaviour. These results are also supported by simulations.Comment: 11 pages, 2 figures, NetSci-X Conference, Wroclaw, Poland, 11-13
January 2016. arXiv admin note: text overlap with arXiv:1502.0016
Use of a controlled experiment and computational models to measure the impact of sequential peer exposures on decision making
It is widely believed that one's peers influence product adoption behaviors.
This relationship has been linked to the number of signals a decision-maker
receives in a social network. But it is unclear if these same principles hold
when the pattern by which it receives these signals vary and when peer
influence is directed towards choices which are not optimal. To investigate
that, we manipulate social signal exposure in an online controlled experiment
using a game with human participants. Each participant in the game makes a
decision among choices with differing utilities. We observe the following: (1)
even in the presence of monetary risks and previously acquired knowledge of the
choices, decision-makers tend to deviate from the obvious optimal decision when
their peers make similar decision which we call the influence decision, (2)
when the quantity of social signals vary over time, the forwarding probability
of the influence decision and therefore being responsive to social influence
does not necessarily correlate proportionally to the absolute quantity of
signals. To better understand how these rules of peer influence could be used
in modeling applications of real world diffusion and in networked environments,
we use our behavioral findings to simulate spreading dynamics in real world
case studies. We specifically try to see how cumulative influence plays out in
the presence of user uncertainty and measure its outcome on rumor diffusion,
which we model as an example of sub-optimal choice diffusion. Together, our
simulation results indicate that sequential peer effects from the influence
decision overcomes individual uncertainty to guide faster rumor diffusion over
time. However, when the rate of diffusion is slow in the beginning, user
uncertainty can have a substantial role compared to peer influence in deciding
the adoption trajectory of a piece of questionable information
Searching for superspreaders of information in real-world social media
A number of predictors have been suggested to detect the most influential
spreaders of information in online social media across various domains such as
Twitter or Facebook. In particular, degree, PageRank, k-core and other
centralities have been adopted to rank the spreading capability of users in
information dissemination media. So far, validation of the proposed predictors
has been done by simulating the spreading dynamics rather than following real
information flow in social networks. Consequently, only model-dependent
contradictory results have been achieved so far for the best predictor. Here,
we address this issue directly. We search for influential spreaders by
following the real spreading dynamics in a wide range of networks. We find that
the widely-used degree and PageRank fail in ranking users' influence. We find
that the best spreaders are consistently located in the k-core across
dissimilar social platforms such as Twitter, Facebook, Livejournal and
scientific publishing in the American Physical Society. Furthermore, when the
complete global network structure is unavailable, we find that the sum of the
nearest neighbors' degree is a reliable local proxy for user's influence. Our
analysis provides practical instructions for optimal design of strategies for
"viral" information dissemination in relevant applications.Comment: 12 pages, 7 figure
The Web of False Information: Rumors, Fake News, Hoaxes, Clickbait, and Various Other Shenanigans
A new era of Information Warfare has arrived. Various actors, including
state-sponsored ones, are weaponizing information on Online Social Networks to
run false information campaigns with targeted manipulation of public opinion on
specific topics. These false information campaigns can have dire consequences
to the public: mutating their opinions and actions, especially with respect to
critical world events like major elections. Evidently, the problem of false
information on the Web is a crucial one, and needs increased public awareness,
as well as immediate attention from law enforcement agencies, public
institutions, and in particular, the research community. In this paper, we make
a step in this direction by providing a typology of the Web's false information
ecosystem, comprising various types of false information, actors, and their
motives. We report a comprehensive overview of existing research on the false
information ecosystem by identifying several lines of work: 1) how the public
perceives false information; 2) understanding the propagation of false
information; 3) detecting and containing false information on the Web; and 4)
false information on the political stage. In this work, we pay particular
attention to political false information as: 1) it can have dire consequences
to the community (e.g., when election results are mutated) and 2) previous work
show that this type of false information propagates faster and further when
compared to other types of false information. Finally, for each of these lines
of work, we report several future research directions that can help us better
understand and mitigate the emerging problem of false information dissemination
on the Web
- …