scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Fuzzy Relative Willingness: Modeling Influence of Exogenous Factors in Driving Information Propagation Through a Social Network

08 Oct 2020-IEEE Access (Institute of Electrical and Electronics Engineers (IEEE))-Vol. 8, pp 186653-186662
TL;DR: A novel fuzzy relative willingness (FRW) model is developed that is able to accurately identify both top- $k$ most content producers and diffusion effect based on external influence and provides a compelling framework to model uncertainties pertaining to the influence as well as the susceptibility of individuals for both network and exogenous effects.
Abstract: A high percentage of information that propagates through a social network is sourced from different exogenous sources. E.g., individuals may form their opinions about products based on their own experience or reading a product review, and then share that with their social network. This sharing then diffuses through the network, evolving as a combination of both network and external effects. Besides, different individuals (nodes in a social network) have different degrees of exposition to their external sources, as well. Modeling this influence of external sources is important in order to understand the diffusion process and predict future content sharing patterns. Recognizing this fusion of intrinsic (network) effect and exogenous (external) effect, this paper develops a novel fuzzy relative willingness (FRW) model. Leveraging a fuzzy set approach provides a way to handle the uncertainties arising within the human concept of willingness. We demonstrate that FRW is able to accurately identify both top- $k$ most content producers and diffusion effect based on external influence. We also demonstrate that the fuzzy set theory provides a compelling framework to model uncertainties pertaining to the influence as well as the susceptibility of individuals for both network and exogenous effects.

Content maybe subject to copyright    Report

Citations
More filters
01 Nov 2010
TL;DR: It is found that since the 1970s, the rate of recovery from obesity has remained relatively constant, while the rates of both spontaneous infection and transmission have steadily increased over time, suggesting that the obesity epidemic may be driven by increasing rates of becoming obese, both spontaneously and transmissively, rather than by decreasing rates of losing weight.
Abstract: Many behavioral phenomena have been found to spread interpersonally through social networks, in a manner similar to infectious diseases. An important difference between social contagion and traditional infectious diseases, however, is that behavioral phenomena can be acquired by non-social mechanisms as well as through social transmission. We introduce a novel theoretical framework for studying these phenomena (the SISa model) by adapting a classic disease model to include the possibility for ‘automatic’ (or ‘spontaneous’) non-social infection. We provide an example of the use of this framework by examining the spread of obesity in the Framingham Heart Study Network. The interaction assumptions of the model are validated using longitudinal network transmission data. We find that the current rate of becoming obese is 2 per year and increases by 0.5 percentage points for each obese social contact. The rate of recovering from obesity is 4 per year, and does not depend on the number of non-obese contacts. The model predicts a long-term obesity prevalence of approximately 42, and can be used to evaluate the effect of different interventions on steady-state obesity. Model predictions quantitatively reproduce the actual historical time course for the prevalence of obesity. We find that since the 1970s, the rate of recovery from obesity has remained relatively constant, while the rates of both spontaneous infection and transmission have steadily increased over time. This suggests that the obesity epidemic may be driven by increasing rates of becoming obese, both spontaneously and transmissively, rather than by decreasing rates of losing weight. A key feature of the SISa model is its ability to characterize the relative importance of social transmission by quantitatively comparing rates of spontaneous versus contagious infection. It provides a theoretical framework for studying the interpersonal spread of any state that may also arise spontaneously, such as emotions, behaviors, health states, ideas or diseases with reservoirs.

174 citations

Journal ArticleDOI
TL;DR: In this article , an agent-based social simulation environment was proposed to evaluate how the beliefs of agents representing regular Twitter users can be influenced by malicious users scattered throughout Twitter with the sole purpose of spreading misinformation.
Abstract: Social Media is used by many as a source of information for current world events, followed by publicly sharing their sentiment about these events. However, when the shared information is not trustworthy and receives a large number of interactions, it alters the public’s perception of authentic and false information, particularly when the origin of these stories comes from malicious sources. Over the past decade, there has been an influx of users on the Twitter social network, many of them automated bot accounts with the objective of participating in misinformation campaigns that heavily influence user susceptibility to fake information. This can affect public opinion on real-life matters, as previously seen in the 2020 presidential elections and the current COVID-19 epidemic, both plagued with misinformation. In this paper, we propose an agent-based social simulation environment that utilizes the social network Twitter, with the objective of evaluating how the beliefs of agents representing regular Twitter users can be influenced by malicious users scattered throughout Twitter with the sole purpose of spreading misinformation. We applied two scenarios to compare how these regular agents behave in the Twitter network, with and without malicious agents, to study how much influence malicious agents have on the general susceptibility of the regular users. To achieve this, we implemented a belief value system to measure how impressionable an agent is when encountering misinformation and how its behavior gets affected. The results indicated similar outcomes in the two scenarios as the affected belief value changed for these regular agents, exhibiting belief in the misinformation. Although the change in belief value occurred slowly, it had a profound effect when the malicious agents were present, as many more regular agents started believing in misinformation.
Journal ArticleDOI
TL;DR: In this article , an agent-based social simulation environment was proposed to evaluate how the beliefs of agents representing regular Twitter users can be influenced by malicious users scattered throughout Twitter with the sole purpose of spreading misinformation.
Abstract: Social Media is used by many as a source of information for current world events, followed by publicly sharing their sentiment about these events. However, when the shared information is not trustworthy and receives a large number of interactions, it alters the public’s perception of authentic and false information, particularly when the origin of these stories comes from malicious sources. Over the past decade, there has been an influx of users on the Twitter social network, many of them automated bot accounts with the objective of participating in misinformation campaigns that heavily influence user susceptibility to fake information. This can affect public opinion on real-life matters, as previously seen in the 2020 presidential elections and the current COVID-19 epidemic, both plagued with misinformation. In this paper, we propose an agent-based social simulation environment that utilizes the social network Twitter, with the objective of evaluating how the beliefs of agents representing regular Twitter users can be influenced by malicious users scattered throughout Twitter with the sole purpose of spreading misinformation. We applied two scenarios to compare how these regular agents behave in the Twitter network, with and without malicious agents, to study how much influence malicious agents have on the general susceptibility of the regular users. To achieve this, we implemented a belief value system to measure how impressionable an agent is when encountering misinformation and how its behavior gets affected. The results indicated similar outcomes in the two scenarios as the affected belief value changed for these regular agents, exhibiting belief in the misinformation. Although the change in belief value occurred slowly, it had a profound effect when the malicious agents were present, as many more regular agents started believing in misinformation.
Journal ArticleDOI
TL;DR: The improved decision table achieves the same control effect as the original model through experimental validation, and improves the system coordination performance index and stability, indicating that the distributed system coordination prediction model under network information mode performs well.
Abstract: : With the rapid development of network information technology, distributed system coordinated control has become an indispensable part of the network information industry in the world today. In this paper, the concepts and classifications of the distributed system coordinated control method for network information mode are introduced first, then the problems existing in the traditional network structure are analyzed in detail. Then, from the point of view of genetic algorithm theory, a support vector machine (SVM), fuzzy logic and transfer function are established to solve the actual non-linear load dispatch, in which the data is processed by neural calculation. Finally, the improved decision table achieves the same control effect as the original model through experimental validation, and improves the system coordination performance index and stability. The experimental results show that the prediction time of this model is within the range of 4s-7s, and its stability, feasibility and prediction accuracy are up to 90%. This indicates that the distributed system coordination prediction model under network information mode performs well.
References
More filters
Book
01 Jan 1962
TL;DR: A history of diffusion research can be found in this paper, where the authors present a glossary of developments in the field of Diffusion research and discuss the consequences of these developments.
Abstract: Contents Preface CHAPTER 1. ELEMENTS OF DIFFUSION CHAPTER 2. A HISTORY OF DIFFUSION RESEARCH CHAPTER 3. CONTRIBUTIONS AND CRITICISMS OF DIFFUSION RESEARCH CHAPTER 4. THE GENERATION OF INNOVATIONS CHAPTER 5. THE INNOVATION-DECISION PROCESS CHAPTER 6. ATTRIBUTES OF INNOVATIONS AND THEIR RATE OF ADOPTION CHAPTER 7. INNOVATIVENESS AND ADOPTER CATEGORIES CHAPTER 8. DIFFUSION NETWORKS CHAPTER 9. THE CHANGE AGENT CHAPTER 10. INNOVATION IN ORGANIZATIONS CHAPTER 11. CONSEQUENCES OF INNOVATIONS Glossary Bibliography Name Index Subject Index

38,750 citations

Journal ArticleDOI

18,643 citations

Proceedings ArticleDOI
24 Aug 2003
TL;DR: An analysis framework based on submodular functions shows that a natural greedy strategy obtains a solution that is provably within 63% of optimal for several classes of models, and suggests a general approach for reasoning about the performance guarantees of algorithms for these types of influence problems in social networks.
Abstract: Models for the processes by which ideas and influence propagate through a social network have been studied in a number of domains, including the diffusion of medical and technological innovations, the sudden and widespread adoption of various strategies in game-theoretic settings, and the effects of "word of mouth" in the promotion of new products. Recently, motivated by the design of viral marketing strategies, Domingos and Richardson posed a fundamental algorithmic problem for such social network processes: if we can try to convince a subset of individuals to adopt a new product or innovation, and the goal is to trigger a large cascade of further adoptions, which set of individuals should we target?We consider this problem in several of the most widely studied models in social network analysis. The optimization problem of selecting the most influential nodes is NP-hard here, and we provide the first provable approximation guarantees for efficient algorithms. Using an analysis framework based on submodular functions, we show that a natural greedy strategy obtains a solution that is provably within 63% of optimal for several classes of models; our framework suggests a general approach for reasoning about the performance guarantees of algorithms for these types of influence problems in social networks.We also provide computational experiments on large collaboration networks, showing that in addition to their provable guarantees, our approximation algorithms significantly out-perform node-selection heuristics based on the well-studied notions of degree centrality and distance centrality from the field of social networks.

5,887 citations

Journal ArticleDOI
TL;DR: This article developed models of collective behavior for situations where actors have two alternatives and the costs and/or benefits of each depend on how many other actors choose which alternative, and the key...
Abstract: Models of collective behavior are developed for situations where actors have two alternatives and the costs and/or benefits of each depend on how many other actors choose which alternative. The key...

5,195 citations


"Fuzzy Relative Willingness: Modelin..." refers background in this paper

  • ...Since the pioneering work of [5], [21] on viral marketing, different diffusion models [1]–[4] and algorithms to find out the influencing individuals [3], [5]–[17] have been developed....

    [...]

  • ...one question arises: ‘is understanding persons’ willingness to adopt from external a valuable factor for predicting the future content sharing pattern in the whole network?’ Information diffusion has been forefront of the research for quite sometime [1]–[4] with the objective of finding the influential nodes [3], [5]–[17]....

    [...]

  • ...RELATED WORK The work on diffusion of innovation has been started by sociologist [1], [20] and currently being explored by dif-...

    [...]

Journal ArticleDOI
TL;DR: The problem of finding the most influential nodes in a social network is NP-hard as mentioned in this paper, and the first provable approximation guarantees for efficient algorithms were provided by Domingos et al. using an analysis framework based on submodular functions.
Abstract: Models for the processes by which ideas and influence propagate through a social network have been studied in a number of domains, including the diffusion of medical and technological innovations, the sudden and widespread adoption of various strategies in game-theoretic settings, and the effects of "word of mouth" in the promotion of new products. Recently, motivated by the design of viral marketing strategies, Domingos and Richardson posed a fundamental algorithmic problem for such social network processes: if we can try to convince a subset of individuals to adopt a new product or innovation, and the goal is to trigger a large cascade of further adoptions, which set of individuals should we target?We consider this problem in several of the most widely studied models in social network analysis. The optimization problem of selecting the most influential nodes is NP-hard here, and we provide the first provable approximation guarantees for efficient algorithms. Using an analysis framework based on submodular functions, we show that a natural greedy strategy obtains a solution that is provably within 63% of optimal for several classes of models; our framework suggests a general approach for reasoning about the performance guarantees of algorithms for these types of influence problems in social networks.We also provide computational experiments on large collaboration networks, showing that in addition to their provable guarantees, our approximation algorithms significantly out-perform node-selection heuristics based on the well-studied notions of degree centrality and distance centrality from the field of social networks.

4,390 citations