System Crash As Dynamics of Complex Networks

Total Page:16

File Type:pdf, Size:1020Kb

System Crash As Dynamics of Complex Networks System crash as dynamics of complex networks Yi Yua,1, Gaoxi Xiaoa,b,1,2, Jie Zhouc, Yubo Wanga, Zhen Wangd,e,1,2, Jürgen Kurthsf,g,h, and Hans Joachim Schellnhuberf,2 aSchool of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798; bComplexity Institute, Nanyang Technological University, Singapore 639798; cDepartment of Physics, East China Normal University, Shanghai 200241, China; dQingdao University, Qingdao, Shandong 266071, China; eInterdisciplinary Graduate School of Engineering Sciences, Kyushu University, Fukuoka 816-8580, Japan; fPotsdam Institute for Climate Impact Research, 14473 Potsdam, Germany; gDepartment of Physics, Humboldt University, 12489 Berlin, Germany; and hInstitute for Complex Systems and Mathematical Biology, University of Aberdeen, Aberdeen AB24 3UE, United Kingdom Contributed by Hans Joachim Schellnhuber, August 11, 2016 (sent for review June 8, 2016; reviewed by Ying-Cheng Lai and Matjaz Perc) Complex systems, from animal herds to human nations, sometimes to explain a sudden crash when (and only when) most indi- crash drastically. Although the growth and evolution of systems have viduals are close to the borderline between alternatives; in- been extensively studied, our understanding of how systems crash is formational cascade theories (18, 19) point out that, if still limited. It remains rather puzzling why some systems, appearing individuals follow the behavior of the preceding individuals to be doomed to fail, manage to survive for a long time whereas without regarding their own information, a big shift in the some other systems, which seem to be too big or too strong to fail, system may be caused by a small shock; and studies on lock-in crash rapidly. In this contribution, we propose a network-based effects and switching cost (20, 21), which evaluate effects of system dynamics model, where individual actions based on the local the cost that individuals have to pay to change a choice, may information accessible in their respective system structures may lead help explain the existence of a pseudo-steady state. Such “ ” to the peculiar dynamics of system crash mentioned above. Exten- studies, however, have their respective limitations: Conformity sive simulations are carried out on synthetic and real-life networks, theories in themselves cannot explain how individuals get close which further reveal the interesting system evolution leading to the to the borderline; informational cascade theories may not work final crash. Applications and possible extensions of the proposed well for system crashes where individuals do not easily disre- model are discussed. gard their own information; and the critical question of how individuals overcome the lock-in effects in the system crash complex systems | system crash | pseudo-steady state | cascade behavior remains largely open. Although most of the above studies have largely ignored ef- ystems emerge and grow up, and, naturally, systems die. Al- fects of the underlying structures of connections (22), an im- Sthough extensive studies have been carried out on the growth portant trend in research on complex systems is to study them in and evolution of various complex systems, in many cases the content of various complex networks. The most notable adopting complex network-based approaches (e.g., refs. 1 and 2), studies that combine system crash dynamics and network analysis hardly any similar studies exist on system crash. As a special type are probably those on k-core cascade theory (11, 23). Specifi- of system evolution, however, system crash defies straightforward cally, the k-core of a network is defined as the maximum subset description by any of the existing models of system evolution, to the of the network where each node is connected to at least k other best of our knowledge. A few important observations of system “ ” nodes in the same subset. Assume that a network node with crash remain puzzling and require careful study: (i) Some inferior fewer than k connections may have a chance to leave the current or “outdated” systems, although appearing to be doomed to fail, “ ” system [e.g., an OSN user may need to have a large enough may survive for a very long time. Examples include living fossils number of connections to justify the effort of staying on (11)]. such as coelacanths, which have survived for more than 80 million years (3), some depleted-but-not-eliminated species under compe- Significance tition or faced by seemingly unstoppable invasion (4), and social systems such as the final Qing dynasty in China, which went through 70 y of disastrous defeats and rebellions with surprising robustness System crash, as an essential part of system evolution, sometimes until its sudden termination in 1911 (5). We term such systems happens in peculiar manners: Weakened systems may survive for as being in a “pseudo-steady state” before their final crashes. a surprisingly long time before suddenly meeting their final ends, (ii) Systems that appear to be too big or too strong to fail whereas seemingly unbeatable giants may drastically crash to sometimes crash rapidly. Well-known examples include the virtual nonexistence. We propose a model that describes system crashes of various ecological and biological systems, which, in crash as a consequence of some relatively simple local in- some cases, occur much faster than expected (6, 7) or even for formation-based individual behaviors: Individuals leave networks no obvious reason (8, 9). Similar phenomena exist in human according to some most straightforward assessment of current society, e.g., the sudden crash of the Soviet Union (10) and the and future benefits/risks. Of note, such a simple rule may enable crash of the once biggest online social network (OSN), a single push/mistake to cause multistage-style system crash. Friendster, in less than 1 y (11). To help understand the Our study helps to make sense of the process where complex crashes of ecological (6, 7, 12), biological (8, 9), neurological systems go into unstoppable cascading declines and provides (13), physical and cyberphysical (14), economic (15, 16), social a viewpoint of predicting the fate of some social/natural (5, 10, 11), and many other complex systems, new modeling ap- systems. proaches to describe the process and dynamics of a system crash Author contributions: Y.Y., G.X., J.Z., Y.W., Z.W., J.K., and H.J.S. designed research; Y.Y., are needed. G.X., J.Z., Y.W., and Z.W. performed research; and Y.Y., G.X., Z.W., J.K., and H.J.S. wrote Some relevant studies, although not focusing directly on sys- the paper. tem crash, may help in understanding a few aspects of system Reviewers: Y.-C.L., Arizona State University; and M.P., University of Maribor. crash or system crash under some special cases, and are hence The authors declare no conflict of interest. worth mention. The largest class of relevant studies is probably 1Y.Y., G.X., and Z.W. contributed equally to this work. those on herd behavior, which refers to system behavior where 2To whom correspondence may be addressed. Email: [email protected], zhenwang0@ individuals in a group act collectively without centralized control gmail.com, or [email protected]. – (17 22). For example, conformity theories (17), which focus on This article contains supporting information online at www.pnas.org/lookup/suppl/doi:10. exploring the mechanism leading to uniform behavior, may help 1073/pnas.1612094113/-/DCSupplemental. 11726–11731 | PNAS | October 18, 2016 | vol. 113 | no. 42 www.pnas.org/cgi/doi/10.1073/pnas.1612094113 Downloaded by guest on September 29, 2021 dynamics. For example, although it is difficult to provide a rigid proof, in our extensive numerical simulations on various synthetic and real-life networks, neither the k-cascade model nor the q-cascade model has ever allowed the emergence of the pseudo- steady state. The proposed model is tested on various synthetic and real-life networks. Considering the increasing importance of OSNs and the relative easiness in getting the data of OSN structures, the testing on real-life networks will mainly focus on OSNs, although the proposed model certainly applies to many different kinds of complex systems. For the well-known case of Friendster’s quick crash, where there exist relatively abundant data on the whole Fig. 1. Schematic illustration of KQ cascade with ks = 3 and q = 0.5. In a classic k-core cascade, the four nodes within the yellow square forming up a process (11), we perform individual-based simulations to mimic three-core would stay on while other nodes would leave. In the KQ cascade, the actions of each individual. A good match is achieved with however, because node 1 has lost more than 50% of its original neighbors, it some interesting insights. will leave in the next time step, which leaves each of the three nodes within the blue triangle with fewer than three connections, leading to the final Results crash of the network. The KQ-Cascade Model. We start with an original network GðV, EÞ, where V is the set of vertices and E is the set of edges. To keep the KQ-cascade model simple, we introduce only two key pa- Measuring the k-core of a network therefore estimates how many rameters: the critical degree k and the loss-tolerance coefficient nodes may stay on when the value of k increases due to various s q. In the ith time step, any node with a degree k < ks or having reasons. This theory, however, can only explain a sudden system lost more than q proportion of its original connections may leave crash when there exists a big jump in the value k due to the network with a probability fiðkÞ. some special reasons. Other interesting developments include An example of the KQ-cascade model is illustrated in Fig.
Recommended publications
  • Obtaining and Using Evidence from Social Networking Sites
    U.S. Department of Justice Criminal Division Washington, D.C. 20530 CRM-200900732F MAR 3 2010 Mr. James Tucker Mr. Shane Witnov Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94110 Dear Messrs Tucker and Witnov: This is an interim response to your request dated October 6, 2009 for access to records concerning "use of social networking websites (including, but not limited to Facebook, MySpace, Twitter, Flickr and other online social media) for investigative (criminal or otherwise) or data gathering purposes created since January 2003, including, but not limited to: 1) documents that contain information on the use of "fake identities" to "trick" users "into accepting a [government] official as friend" or otherwise provide information to he government as described in the Boston Globe article quoted above; 2) guides, manuals, policy statements, memoranda, presentations, or other materials explaining how government agents should collect information on social networking websites: 3) guides, manuals, policy statements, memoranda, presentations, or other materials, detailing how or when government agents may collect information through social networking websites; 4) guides, manuals, policy statements, memoranda, presentations and other materials detailing what procedures government agents must follow to collect information through social- networking websites; 5) guides, manuals, policy statements, memorandum, presentations, agreements (both formal and informal) with social-networking companies, or other materials relating to privileged user access by the Criminal Division to the social networking websites; 6) guides, manuals, memoranda, presentations or other materials for using any visualization programs, data analysis programs or tools used to analyze data gathered from social networks; 7) contracts, requests for proposals, or purchase orders for any visualization programs, data analysis programs or tools used to analyze data gathered from social networks.
    [Show full text]
  • Chazen Society Fellow Interest Paper Orkut V. Facebook: the Battle for Brazil
    Chazen Society Fellow Interest Paper Orkut v. Facebook: The Battle for Brazil LAUREN FRASCA MBA ’10 When it comes to stereotypes about Brazilians – that they are a fun-loving people who love to dance samba, wear tiny bathing suits, and raise their pro soccer players to the levels of demi-gods – only one, the idea that they hold human connection in high esteem, seems to be born out by concrete data. Brazilians are among the savviest social networkers in the world, by almost all engagement measures. Nearly 80 percent of Internet users in Brazil (a group itself expected to grow by almost 50 percent over the next three years1) are engaged in social networking – a global high. And these users are highly active, logging an average of 6.3 hours on social networks and 1,220 page views per month per Internet user – a rate second only to Russia, and almost double the worldwide average of 3.7 hours.2 It is precisely this broad, highly engaged audience that makes Brazil the hotly contested ground it is today, with the dominant social networking Web site, Google’s Orkut, facing stiff competition from Facebook, the leading aggregate Web site worldwide. Social Network Services Though social networking Web sites would appear to be tools born of the 21st century, they have existed since even the earliest days of Internet-enabled home computing. Starting with bulletin board services in the early 1980s (accessed over a phone line with a modem), users and creators of these Web sites grew increasingly sophisticated, launching communities such as The WELL (1985), Geocities (1994), and Tripod (1995).
    [Show full text]
  • International Students' Use of Social Network Sites For
    INTERNATIONAL STUDENTS’ USE OF SOCIAL NETWORK SITES FOR COLLEGE CHOICE ACTIVITIES AND DECISION MAKING Natalia Rekhter Submitted to the faculty of the University Graduate School in partial fulfillment of the requirements for the degree Doctor of Philosophy in the School of Education Indiana University June 2017 Accepted by the Graduate Faculty, Indiana University, in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Doctoral Dissertation Committee _______________________________________________________________ Committee Chairperson, Robin Hughes, Ph.D. _______________________________________________________________ Committee Member, Donald Hossler, Ph.D. _______________________________________________________________ Committee Member, Gary Pike, Ph.D. _______________________________________________________________ Committee Member, James Scheurich, Ph.D. _______________________________________________________________ Committee Member, Eric Wright, Ph.D. Date of Defense March 9, 2017 ii I dedicate this dissertation to my husband, Mark Rekhter, M.D., Ph.D. Thank you for always encouraging me to persist, believing in me, listening to my endless self-doubts, always finding words of reassurance, and for being by my side all the way. I also dedicate this dissertation to my sons Ilya and Misha, who inspired me by their own successes, intelligence, and dedication. iii Acknowledgements I was able to complete this dissertation research only because of the encouragement, guidance, support and care of my dissertation research advisor Dr. Donald Hossler. Dr. Hossler, thank you for your infinite patience, for challenging my views, for always inspiring me to do better and reach higher, for your suggestions, your guidance, your feedback and your trust in me. An opportunity to work with you and learn from you made a profound impact on me as a person and as a researcher.
    [Show full text]
  • Social Networking: a Guide to Strengthening Civil Society Through Social Media
    Social Networking: A Guide to Strengthening Civil Society Through Social Media DISCLAIMER: The author’s views expressed in this publication do not necessarily reflect the views of the United States Agency for International Development or the United States Government. Counterpart International would like to acknowledge and thank all who were involved in the creation of Social Networking: A Guide to Strengthening Civil Society through Social Media. This guide is a result of collaboration and input from a great team and group of advisors. Our deepest appreciation to Tina Yesayan, primary author of the guide; and Kulsoom Rizvi, who created a dynamic visual layout. Alex Sardar and Ray Short provided guidance and sound technical expertise, for which we’re grateful. The Civil Society and Media Team at the U.S. Agency for International Development (USAID) was the ideal partner in the process of co-creating this guide, which benefited immensely from that team’s insights and thoughtful contributions. The case studies in the annexes of this guide speak to the capacity and vision of the featured civil society organizations and their leaders, whose work and commitment is inspiring. This guide was produced with funding under the Global Civil Society Leader with Associates Award, a Cooperative Agreement funded by USAID for the implementation of civil society, media development and program design and learning activities around the world. Counterpart International’s mission is to partner with local organizations - formal and informal - to build inclusive, sustainable communities in which their people thrive. We hope this manual will be an essential tool for civil society organizations to more effectively and purposefully pursue their missions in service of their communities.
    [Show full text]
  • Collaborative Filtering for Orkut Communities: Discovery of User Latent Behavior
    Collaborative Filtering for Orkut Communities: Discovery of User Latent Behavior Wen-Yen Chen∗ Jon-Chyuan Chu∗ Junyi Luan∗ University of California MIT Peking University Santa Barbara, CA 93106 Cambridge, MA 02139 Beijing 100084, China [email protected] [email protected] [email protected] Hongjie Bai Yi Wang Edward Y. Chang Google Research Google Research Google Research Beijing 100084, China Beijing 100084, China Beijing 100084, China [email protected] [email protected] [email protected] ABSTRACT General Terms Users of social networking services can connect with each Algorithms, Experimentation other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows Keywords over time, users have even greater need for effective commu- nity recommendations in order to meet more users. In this Recommender systems, collaborative filtering, association paper, we investigate two algorithms from very different do- rule mining, latent topic models, data mining mains and evaluate their effectiveness for personalized com- munity recommendation. First is association rule mining 1. INTRODUCTION (ARM), which discovers associations between sets of com- munities that are shared across many users. Second is latent Much information is readily accessible online, yet we as Dirichlet allocation (LDA), which models user-community humans have no means of processing all of it. To help users co-occurrences using latent aspects. In comparing LDA with overcome the information overload problem and sift through ARM, we are interested in discovering whether modeling huge amounts of information efficiently, recommender sys- low-rank latent structure is more effective for recommen- tems have been developed to generate suggestions based on dations than directly mining rules from the observed data.
    [Show full text]
  • Social CRM in Higher Education Introduction Many Colleges And
    Social CRM in Higher Education Introduction Many colleges and universities employ sophisticated CRM (customer relationship management) tools to manage relationships with their constituents. Campuses use CRM to help recruit high- quality students, communicate with parents, manage relationships with current students, promote events, and keep in contact with alumni. The growing popularity of Web 2.0 social network tools creates a new challenge for colleges. Many of their most important constituents, late-teen and early twenty-year olds, are abandoning traditional CRM media such as print, email, and telephones in favor of social media. Having invested heavily in CRM during the past decade campuses must now retool their communication strategies to incorporate social media. The integration of social networking sites into CRM systems is known as “Social CRM.” Social networking sites include blogs, wikis, social bookmarking, consumer reviews, and video sharing. Table 1 provides a list of Web 2.0 tools and the names of popular web sites that provide these tools. The popularity of social software sites has increased dramatically in recent years. Four of the top ten most popular web sites in April 2012 are social software sites (Alexa.com, 2012). Social software is very popular with college students. A 2007 survey of 31,500 first-year college students found that 94-percent used social networking sites at least weekly (Higher Education Research Institute, 2007). RateMyProfessors.com, a social networking site that allows anonymous ratings of professors, is visited by approximately 3 million college students each month. It claims to publish over 10 million student-generated ratings of more than one million professors (RateMyProfessors.com, 2010).
    [Show full text]
  • 'Social-Network' Infrastructure to Improve Peer-To-Peer Overlay
    Leveraging ‘Social-Network’ Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut Zahid Anwar†‡ William Yurcik‡ Vivek Pandey† Asim Shankar† Indranil Gupta† Roy H. Campbell† † Department of Computer Science ‡ National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign USA {anwar,byurcik}@ncsa.uiuc.edu {pandey1,shankar}@uiuc.edu {indy,rhc}@cs.uiuc.edu Abstract directly. This adds value to the edges of a network where the information is being collected and used. Application-level peer-to-peer (P2P) network Gnutella – a popular file sharing application, overlays are an emerging paradigm that facilitates broadcasts messages to all the peers in the path of the decentralization and flexibility in the scalable query. A querying peer sends the query to all of its deployment of applications such as group peers, who in turn send the query to all of their peers communication, content delivery, and data sharing. until the query reaches a peer that produces a hit However the construction of the overlay graph topology matching the query. This peer sends back a reply optimized for low latency, low link and node stress and containing its address, the size of the file, speed of lookup performance is still an open problem. We present transfer, etc. The reply traverses the same path but in a design of an overlay constructed on top of a social reverse order back to the querying peer. This passing of network and show that it gives a sizable improvement in messages generates much traffic in the network, often lookups, average round-trip delay and scalability as leading to congestion and slow responses.
    [Show full text]
  • Centrespread Centrespread 15 MAY 28-JUNE 03, 2017 MAY 28-JUNE 03, 2017
    14 centrespread centrespread 15 MAY 28-JUNE 03, 2017 MAY 28-JUNE 03, 2017 Friendster Google+ LAUNCHED: June 2011 FOUNDER: Jonathan Abrams, PRESENT STATUS: Active Peter Chin Smarting from its failed attempts in LAUNCHED: March 2002 social networking through Orkut and Buzz, PRESENT STATUS: Shifted to online gaming Google decided to take Facebook head-on with in 2011 and shut down in June 2015 Google+. Integrated into Gmail, Google+ tried a Within a year of its launch, Friendster had three slightly different approach to social networking million users but soon had to contend with the Orkut than Facebook, offering users the option of cat- likes of MySpace and Facebook. It was sold to egorising their friends into "circles". But users FOUNDER: Orkut Buyukkokten a Malaysian internet company in 2009 LAUNCHED: January 2004 were not too kicked about it and it reportedly for $100 million. PRESENT STATUS: Shut in September 2014 has remained a mere afterthought in At the time of the sale, Friendster had Started by Buyukkokten, a Turkish engineer social media, despite a redesign around 75 million users in Asia. Friendster at Google, Orkut was the result of the search giant's in late 2015 turned into an online gaming platform failure to buy Friendster. Orkut, while not much of a in 2011 and was disabled four success in the US, proved big in Brazil and India, its years later two key markets. But in September 2010, Facebook, which debuted two weeks after Orkut's launch, went past Orkut in terms of number of users in India, and a year later, did the same in Brazil.
    [Show full text]
  • Facebook Clinches Top Spot in India: Research 26 August 2010, by Neha Lall
    Facebook clinches top spot in India: research 26 August 2010, by Neha Lall "Even though Orkut belongs to Google it is not as cool as the rest of Google, it feels like Orkut is always trying to play catch up in terms of features and functionality," said leading Indian blogger Kiruba Shankar. According to comScore India is the seventh largest social networking market, with the audience up 43 percent in the past year. The firm estimated that there were 945 million unique users of social networking sites in July worldwide, with the United States, China and A survey showed that Facebook has become the number one social networking site in India, toppling Germany the biggest markets. Google-owned Orkut in one of the few major markets the site had a leadership position. Internet use is much higher in Indian cities where infrastructure is more complete and where more people have access to computers. Facebook has become the number one social In a nation of more than a billion, only around networking site in India, toppling Google-owned seven million people are broadband Internet Orkut in one of the few major markets the site had subscribers, according to a recent report by a leadership position, a survey showed Thursday. consultancy Booz and Company. US-based global research firm comScore said Many analysts hope the advent of new high-speed Facebook had moved into the top spot in July, third-generation mobile phone networks will greatly backing up separate research by Indian online increase Internet usage in the country because far monitor ViziSense which showed a similar trend.
    [Show full text]
  • Scalable Affiliation Recommendation Using Auxiliary Networks
    Scalable Affiliation Recommendation using Auxiliary Networks VISHVAS VASUKI NAGARAJAN NATARAJAN ZHENGDONG LU BERKANT SAVAS and INDERJIT DHILLON University of Texas at Austin Social network analysis has attracted increasing attention in recent years. In many social net- works, besides friendship links amongst users, the phenomenon of users associating themselves with groups or communities is common. Thus, two networks exist simultaneously: the friend- ship network among users, and the affiliation network between users and groups. In this paper, we tackle the affiliation recommendation problem, where the task is to predict or suggest new affiliations between users and communities, given the current state of the friendship and affili- ation networks. More generally, affiliations need not be community affiliations—they can be a user’s taste, so affiliation recommendation algorithms have applications beyond community rec- ommendation. In this paper, we show that information from the friendship network can indeed be fruitfully exploited in making affiliation recommendations. Using a simple way of combining these networks, we suggest two models of user-community affinity for the purpose of making affili- ation recommendations: one based on graph proximity, and another using latent factors to model users and communities. We explore the affiliation recommendation algorithms suggested by these models and evaluate these algorithms on two real world networks—Orkut and Youtube. In doing so, we motivate and propose a way of evaluating recommenders, by measuring how good the top 50 recommendations are for the average user, and demonstrate the importance of choosing the right evaluation strategy. The algorithms suggested by the graph proximity model turn out to be the most effective.
    [Show full text]
  • Google/Orkut Input
    Orkut is Google's online social network. It is particularly popular in Brazil and India. Google takes the safety of our users on orkut very seriously, and we have gone to great lengths to help protect them. Unlike many other social network sites, orkut requires users to be 18 years old to use the service. Google places a session cookie on a registrant's browser to help prevent age falsification when a user registers for orkut. Therefore, many of the issues related to the safety of young people under 18 on social networking sites do not generally apply to orkut. Google/orkut focuses its safety efforts on combating inappropriate content on orkut. We have a cross- functional team of product managers, engineers, legal and customer support employees across three continents who are dedicated to developing abuse-prevention tools for orkut. This team has a three- pronged approach to detecting and preventing abuse on the website: • Identifying and removing illegal content • Empowering users to detect and prevent abuse • Cooperating with law enforcement Identifying and Removing Illegal Content: Orkut uses cutting edge technology and manual content reviews in response to user "flags" to qualify "manual content reviews" to identify and eliminate illegal and inappropriate content from orkut. From a technological perspective Google uses the following tools: • Image scanning technology: This year we launched image scanning technology which aims to detect images of pornography (including child pornography) at the time of upload to the website, followed quickly by removal. A team of U.S. engineers worked on development of this scanning technology for more than a year, and we are very pleased with the results of the tool's detection capabilities thus far.
    [Show full text]
  • Global Social Media Directory a Resource Guide
    PNNL-23805 Rev. 1 Global Social Media Directory A Resource Guide October 2015 CF Noonan AW Piatt PNNL-23805 Rev. 1 Global Social Media Directory CF Noonan AW Piatt October 2015 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 Abstract Social media platforms are internet-based applications focused on broadcasting user-generated content. While primarily web-based, these services are increasingly available on mobile platforms. Communities and individuals share information, photos, music, videos, provide commentary and ratings/reviews, and more. In essence, social media is about sharing information, consuming information, and repurposing content. Social media technologies identified in this report are centered on social networking services, media sharing, blogging and microblogging. The purpose of this Resource Guide is to provide baseline information about use and application of social media platforms around the globe. It is not intended to be comprehensive as social media evolves on an almost daily basis. The long-term goal of this work is to identify social media information about all geographic regions and nations. The primary objective is that of understanding the evolution and spread of social networking and user-generated content technologies internationally. iii Periodic Updates This document is dynamic and will be updated periodically as funding permits. Social media changes rapidly. Due to the nature of technological change and human fancy, content in this Directory is viewed as informational. As such, the authors provide no guarantees for accuracy of the data. Revision Information Revision Number Topic Areas Updated Notes Revision 1 issued, Brazil updated; Added Updated Figure 1 and Table 1.
    [Show full text]