Information and Influence Propagation in Social Networks

Total Page:16

File Type:pdf, Size:1020Kb

Information and Influence Propagation in Social Networks YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 1 Social influence and viral phenomena YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 2 Voting mobilization: A Facebook study • Voting mobilization [Bond et al, Nature’2012] – show a facebook msg. on voting day with faces of friends who voted – generate 340K additional votes due to this message, among 60M people tested YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 3 Influence Propagation Modeling and Influence maximization task • Studies the stochastic models on how influence propagates in social networks – Its properties, e.g. submodularity • Influence maximization: given a budget 푘, select at most 푘 nodes in a social network as seeds to maximize the influence spread of the seeds – Applications in viral marketing, diffusion monitoring, rumor control, etc. YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 4 Outline of This Talk • Basic concepts: influence diffusion models, influence maximization task, submodularity, greedy algorithm • Scalable algorithm based on reverse influence sampling (RIS) • Influence-based centrality measures – Shapley centrality – Single Node Influence (SNI) centrality • Other models and tasks YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 5 Independent cascade model • Directed graph 퐺 = (푉, 퐸) • Each edge (푢, 푣) has a influence probability 푝(푢, 푣) • Initially seed nodes in 푆0 are activated • At each step 푡, each node 푢 activated at step 푡 − 1 activates its 0.3 neighbor 푣 independently with 0.1 probability 푝(푢, 푣) • Influence spread 휎(푆): expected number of activated nodes • Correspond to bond percolation YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 6 Linear threshold model 0.5 • Each edge (푢, 푣) has a influence 0.6 weight 푤 푢, 푣 : – when 푢, 푣 ∉ 퐸, 푤 푢, 푣 = 0 – σ푢 푤 푢, 푣 ≤ 1 0.3 0.3 • Each node 푣 selects a threshold 휃푣 ∈ [0,1] uniformly at random 0.4 0.3 0.7 • Initially seed nodes in 푆0 are activated 0.1 • At each step, node 푣 checks if the weighted sum of its active in- 0.2 0.8 neighbors is greater than or equal to 0.3 its threshold 휃푣, if so 푣 is activated YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 7 Interpretation of IC and LT models • IC model reflects simple contagion, e.g. information, virus • LT model reflects complex contagion, e.g. product adoption, innovations (activation needs social affirmation from multiple sources [Centola and Macy, AJS 2007]) • More general models are studied: triggering model, general threshold models, decreasing cascade model, etc. – Note: not all models correspond to reachability on random graphs, e.g. general threshold model corresponds to random hyper-graphs (ongoing research) YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 8 Influence maximization • Given a social network, a diffusion model with given parameters, and a number 푘, find a seed set 푆 of at most 푘 nodes such that the influence spread of 푆 is maximized. • NP-hard • Based on submodular function maximization • [Kempe, Kleinberg, and Tardos, KDD’2003] YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 9 Submodular set functions • Sumodularity of set functions 푓: 2V → 푅 – for all 푆 ⊆ 푇 ⊆ 푉, all 푣 ∈ 푉 ∖ 푇, 푓 푆 ∪ 푣 − 푓 푆 ≥ 푓 푇 ∪ 푣 − 푓(푇) – diminishing marginal return 푓(푆) – an equivalent form: for all 푆, 푇 ⊆ 푉 푓 푆 ∪ 푇 + 푓 푆 ∩ 푇 ≤ 푓 푆 + 푓 푇 • Monotonicity of set functions 푓: for all 푆 ⊆ 푇 ⊆ 푉, |푆| 푓 푆 ≤ 푓(푇) • Influence spread function 휎(푆) is monotone and submodular in the IC model (and many other models) YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 10 Example of a submodular function and its maximization problem • set coverage elements – each entry 푢 is a subset of some base elements sets | 푢∈푆 푢ڂ | = coverage 푓 푆 – – 푓 푆 ∪ 푣 − 푓 푆 : additional coverage of 푣 on 푆 top of 푆 푇 • 푘-max cover problem – find 푘 subsets that maximizes their total coverage 푣 – NP-hard – special case of IM problem in IC model YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 11 Submodularity of influence diffusion models • Based on equivalent live-edge graphs 0.3 0.1 diffusion dynamic random live-edge graph: edges are randomly removed Pr(set A is activated given seed Pr(set A is reachable from S in set S) random live-ledge graph) YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 12 Random live-edge graph for the IC model and its reachable node set • Random live-edge graph in the IC model – each edge is independently selected as live with its influence probability • Pink node set is the active node set 0.3 reachable from the seed set in a 0.1 random live-edge graph • Equivalence is straightforward (it is essentially bond percolation) YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 13 Random live-edge graph for the LT model and its reachable node set • Random live-edge graph in the LT model – each node select at most one incoming edge, with probability equal to its influence weight • Pink node set is the active node set reachable from the seed set in a 0.3 random live-edge graph 0.1 • Equivalence is based on uniform threshold selection from [0,1], and linear weight addition • Not exactly a bond percolation YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 14 Submodularity of influence diffusion models (cont’d) • Submodularity of 푅 ⋅, 퐺퐿 • for any 푆 ⊆ 푇 ⊆ 푉, 푣 ∈ 푉 ∖ 푇, • if 푢 is reachable from 푣 but not from 푇, 푆 푇 then • 푢 is reachable from 푣 but not from 푆 푣 푢 • Hence, 푅 ⋅, 퐺퐿 is submodular • Therefore, influence spread 휎 푆 is marginal contribution of submodular in the IC model 푣 w.r.t. 푇 YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 15 Greedy algorithm for submodular function maximization 1: initialize 푆 = ∅ ; 2: for 푖 = 1 to 푘 do 3: select 푢 = argmax푤∈푉∖푆[푓 푆 ∪ 푤 − 푓(푆))] 4: 푆 = 푆 ∪ {푢} 5: end for 6: output 푆 YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 16 Property of the greedy algorithm • Theorem: If the set function 푓 is monotone and submodular with 푓 ∅ = 0, then the greedy algorithm achieves (1 − 1/푒) approximation ratio, that is, the solution 푆 found by the greedy algorithm satisfies: 1 ′ 푓 푆 ≥ 1 − max ′ ′ 푓(푆 ) 푒 푆 ⊆푉, 푆 =푘 YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 17 Hardness of Influence Maximization and Influence Computation • In IC and LT models, influence maximization is NP-hard – IC model: reduction from the set cover problem • In IC and LT models, computing influence spread 휎(푆) for any given 푆 is #P-hard [Chen et al. KDD’2010, ICDM’2010]. – IC model: reduction from the s-t connectedness counting problem. • Implication of #P-hardness of computing 휎(푆) – Greedy algorithm needs adaptation --- using Monte Carlo simulations YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 18 MC-Greedy: Estimating influence spread via Monte Carlo simulations • For any given S • Simulate the diffusion process from 푆 for 푅 times (R should be large) • Use the average of the number of active nodes in 푅 simulations as the estimate of 휎(푆) • Can estimate 휎(푆) to arbitrary accuracy, but require large R – Theoretical bound can be obtained using Chernoff bound. YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 19 Theorems on MC-Greedy algorithm • Polynomial time, but could be very slow: 70+ hours on a 15k node graph YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 20 Simulation on Real Network NetHEPT in uniform IC: p=0.01 weighted IC: 푝 푢, 푣 = 1/푑푣 NetHEPT: collaboration network on arxiv MC-Greedy[20000] is the best MC-Greedy[200] is worse than Degree Random is the worst YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 21 Probabilists’ View vs. Computer Scientists’ View on Diffusion Probabilists’ view Computer scientists’ view subject (stochastic) diffusion on random networks (stochastic) diffusion on fixed networks (often equivalent to deterministic diffusion on random sub-networks of the fixed network) network family of random networks (푛 → ∞, e.g. fixed network with arbitrary topology configuration model), infinite lattice, etc. diffusion models percolation, SIR, SIS, etc. independent cascade (equivalent to bond percolation), linear threshold, triggering, general threshold, etc. goal reveal properties of the diffusion, e.g. optimization, e.g. influence maximization condition of the phase transition method and tools probabilistic analysis, Markov process, submodularity analysis, submodular branching process, maximization, concentration inequalities focus probabilistic analysis, phase transition algorithm design, efficiency, approximation ratio condition, size distribution, etc. YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 22 Outline of This Talk • Basic concepts: influence diffusion models, influence maximization task, submodularity, greedy algorithm • Scalable algorithm based on reverse influence sampling (RIS) • Influence-based centrality measures – Shapley centrality – Single Node Influence (SNI) centrality • Other models and tasks YEP Workshop on Information Diffusion on Random Graphs, March 27, 2019 23 Ways to improve scalability • Fast deterministic heuristics – Utilize model characteristic – MIA/IRIE heuristic for IC model [Chen et al. KDD’10, Jung et al. ICDM’12] – LDAG/SimPath heuristics for LT model [Chen et al. ICDM’10, Goyal et al. ICDM’11] • Monte Carlo simulation based – Lazy evaluation [Leskovec et al. KDD’2007], Reduce the number of influence spread evaluations • New approach based on Reverse Influence Sampling (RIS) • First proposed by Borgs et al.
Recommended publications
  • Investigating the Observability of Complex Contagion in Empirical Social Networks
    Investigating the Observability of Complex Contagion in Empirical Social Networks Clay Fink1, Aurora Schmidt1, Vladimir Barash2, John Kelly2, Christopher Cameron3, Michael Macy3 1Johns Hopkins University Applied Physics Laboratory 2Graphika, Inc. 3Cornell University NSF-IBSS, San Diego, CA, August 1-2, 2016 This work was funded by the Minerva Initiative through the United States Air Force Office of Scientific Research (AFOSR) under grant FA9550-15-1-0036. 1 / 15 Complex contagions and social movements Threshold-based, or complex, models of social contagion may partly explain the initiation of mass mobilizations and social movements 2 / 15 Prior work Threshold models of collective behavior and theoretical predictions (Granovetter 1978, 1973); (Centola, Macy 2007); (Barash, Cameron, Macy 2012) Observational Studies: focus on empirical adoption thresholds Coleman, et al. (1966); Valente (1996): empirical studies of social reinforcement for medical practices and diffusion of innovations; Romero, et al. (2011), Fink, et al. (2016): spread of hashtags on Twitter; State and Adamic (2015): adoption of Equal-Sign profile pictures on Facebook 3 / 15 Overestimation of adoption thresholds b c b c a a e d e d At time t none of a's neighbors By time t + dt all neighbors have adopted have adopted. If a now adopts, what was their actual adoption threshold? 4 / 15 This work We formulate comparable probabilistic models of simple and complex contagion to generate predictions of Twitter hashtag diffusion events Using the follow network of 53K Nigerian 2014 users
    [Show full text]
  • Mathematical Modeling of Complex Contagion on Clustered Networks
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Frontiers - Publisher Connector ORIGINAL RESEARCH published: 15 September 2015 doi: 10.3389/fphy.2015.00071 Mathematical modeling of complex contagion on clustered networks David J. P. O’Sullivan *, Gary J. O’Keeffe, Peter G. Fennell and James P. Gleeson Mathematics Applications Consortium for Science and Industry, Department of Mathematics and Statistics, University of Limerick, Limerick, Ireland The spreading of behavior, such as the adoption of a new innovation, is influenced by the structure of social networks that interconnect the population. In the experiments of Centola [15], adoption of new behavior was shown to spread further and faster across clustered-lattice networks than across corresponding random networks. This implies that the “complex contagion” effects of social reinforcement are important in such diffusion, in contrast to “simple” contagion models of disease-spread which predict that epidemics would grow more efficiently on random networks than on clustered networks. To accurately model complex contagion on clustered networks remains a challenge because the usual assumptions (e.g., of mean-field theory) regarding tree-like networks are invalidated by the presence of triangles in the network; the triangles are, however, Edited by: crucial to the social reinforcement mechanism, which posits an increased probability of Javier Borge-Holthoefer, a person adopting behavior that has been adopted by two or more neighbors. In this Qatar Computing Research Institute, Qatar paper we modify the analytical approach that was introduced by Hébert-Dufresne et al. Reviewed by: [19], to study disease-spread on clustered networks.
    [Show full text]
  • Associative Diffusion and the Emergence of Cultural Variation
    Beyond “Social Contagion”: Associative Diffusion and the Emergence of Cultural Variation∗ Amir Goldberg Stanford University Sarah K. Stein Stanford University July 16, 2018 Abstract Network models of diffusion predominantly think about cultural variation as a prod- uct of social contagion. But culture does not spread like a virus. In this paper, we pro- pose an alternative explanation which we refer to as associative diffusion. Drawing on two insights from research in cognition—that meaning inheres in cognitive associations between concepts, and that such perceived associations constrain people’s actions— we propose a model wherein, rather than beliefs or behaviors per-se, the things being transmitted between individuals are perceptions about what beliefs or behaviors are compatible with one another. Conventional contagion models require an assumption of network segregation to explain cultural variation. In contrast, we demonstrate that the endogenous emergence of cultural differentiation can be entirely attributable to social cognition and does not necessitate a clustered social network or a preexisting division into groups. Moreover, we show that prevailing assumptions about the effects of network topology do not hold when diffusion is associative. ∗Direct all correspondence to Amir Goldberg: [email protected]; 650-725-7926. We thank Rembrand M. Koning, Daniel A. McFarland, Paul DiMaggio, Sarah Soule, John-Paul Ferguson, Jesper Sørensen, Glenn Carroll, Sameer B. Srivastava, Jerker Denrell, Robert Gibbons and participants of the MIT conference on Categories and Shared Mental Models for helpful comments and suggestions. The usual disclaimer applies. Introduction Contemporary societies exhibit remarkable and persistent cultural differences on issues as varied as musical taste and gun control.
    [Show full text]
  • Complex Contagion and the Weakness of Long Ties
    Complex Contagion and the Weakness of Long Ties Damon Centola and Michael Macy Cornell University September 12, 2005 Complex Contagion and the Weakness of Long Ties Abstract The strength of weak ties is that they tend to be long – they connect socially distant locations. Recent research on “small worlds” shows that remarkably few long ties are needed to give large and highly clustered populations the “degrees of separation” of a random network, in which information can rapidly diffuse. We test whether this effect of long ties generalizes from simple to complex contagions – those in which the credibility of information or the willingness to adopt an innovation requires independent confirmation from multiple sources. Using Watts and Strogatz’s original small world model, we demonstrate that long ties not only fail to speed up complex contagions, they can even preclude diffusion entirely. Results suggest that the spread of collective actions, social movements, and risky innovations benefit not from ties that are long but from bridges that are wide enough to transmit strong social reinforcement. Balance theory shows how wide bridges might also form in evolving networks, but this turns out to have surprisingly little effect on the propagation of complex contagions. We find that hybrid contagions, in which a critical mass of low-threshold nodes trigger the remaining high threshold nodes, can propagate on perturbed networks. However, of greater importance is the finding that wide bridges are a characteristic feature of spatial networks, which may account in part for the widely observed tendency for social movements to diffuse spatially. 2 “All politics is local.” – Rep.
    [Show full text]
  • The Complex Contagion of Doubt in the Anti-Vaccine Movement
    COMPLEX CONTAGION OF DOUBT THE COMPLEX CONTAGION OF DOUBT IN THE ANTI-VACCINE MOVEMENT Damon Centola, Ph.D. “FUD” is the fear, uncertainty, and doubt that IBM salespeople instill in the minds of potential customers who might be considering [competitors’] products…. The idea, of course, was to persuade buyers to go with safe IBM gear rather than competitors’ equipment. The Jargon File (cited in Raymond, 1991) INTRODUCTION Measles virus The measles virus is a “simple contagion” that is transmitted through contact between an infected person and a susceptible person. When someone who is newly infected becomes contagious, that person can transmit the disease to someone else who is susceptible, who in turn can transmit it to another, and so on. The result: One highly connected person can trigger an epidemic. Information can act like a simple contagion as well. If I tell you recent news about the availability of a new measles, mumps, and rubella (MMR) vaccine, you can easily repeat it to someone who can then repeat it to someone else. Each new contact and repetition leads to more transmission of the information. The result is the same: One highly connected person can accelerate word-of-mouth transmission of news, allowing it to spread “virally” across a community (Centola & Macy, 2007). But anti-vaccine sentiment is different. It is a “complex contagion.” Simply hearing a piece of anti-vaccine propaganda does not change a person’s beliefs. Rather, people need to be convinced—the hallmark of a complex contagion—through contact with several peers who can reinforce the legitimacy of a point of view.
    [Show full text]
  • Proximity, Interactions, and Communities in Social Networks: Properties and Applications
    PROXIMITY, INTERACTIONS, AND COMMUNITIES IN SOCIAL NETWORKS: PROPERTIES AND APPLICATIONS. By Tommy Nguyen A Thesis Submitted to the Graduate Faculty of Rensselaer Polytechnic Institute in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY Major Subject: COMPUTER SCIENCE Examining Committee: Boleslaw K. Szymanski, Thesis Adviser Sibel Adal´ı,Member James A. Hendler, Member Gyorgy Korniss, Member Mohammed J. Zaki, Member Rensselaer Polytechnic Institute Troy, New York October 2014 (For Graduation December 2014) c Copyright 2014 by Tommy Nguyen All Rights Reserved ii CONTENTS LIST OF TABLES . vi LIST OF FIGURES . vii ACKNOWLEDGMENT . ix ABSTRACT . .x 1. INTRODUCTION . .1 1.1 Ranking Information in Social Networks . .2 1.2 Small Worlds and Social Stratification . .4 1.3 Summary of Contributions & Organization . .6 1.3.1 Organization . .7 2. LITERATURE REVIEW . 10 2.1 Ranking Techniques . 10 2.1.1 Web Conceptualization . 10 2.1.2 User Data & Trust Models . 11 2.1.3 Learning to Rank . 13 2.2 Small-world Problem . 15 2.2.1 Six Degrees of Separation . 15 2.2.2 Social Stratification . 16 3. SOCIAL NETWORK ANALYSIS . 18 3.1 Geography, Co-Appearance, & Interactions . 19 3.1.1 Data Collection . 19 3.1.2 Notations & Definitions . 20 3.1.3 Data Analysis & Results . 21 3.1.4 Limitations . 24 3.2 Incorporating Geography into Community Detection . 24 3.2.1 Clique Percolation Method . 25 3.2.2 Modularity Maximization . 26 3.2.3 Speaker-Label Propagation (GANXiS) . 27 3.3 Contrasting Communities to Null Models . 28 3.3.1 Techniques for Generating Covers . 29 iii 3.3.2 Measuring Covers & Communities .
    [Show full text]
  • The Routing of Complex Contagion in Kleinberg's Small-World
    The Routing of Complex Contagion in Kleinberg's Small-World Networks? Wei Chen1, Qiang Li2, Xiaoming Sun2, and Jialin Zhang2 1 Microsoft Research 2 Institute of Computing Technology, Chinese Academy of Sciences Abstract. In Kleinberg's small-world network model, strong ties are modeled as deterministic edges in the underlying base grid and weak ties are modeled as random edges connecting remote nodes. The probability of connecting a node u with node v through a weak tie is proportional to 1=juvjα, where juvj is the grid distance between u and v and α ≥ 0 is the parameter of the model. Complex contagion refers to the propagation mechanism in a network where each node is activated only after k ≥ 2 neighbors of the node are activated. In this paper, we propose the concept of routing of complex contagion (or complex routing), where at each time step we can select one eligible node (nodes already having two active neighbors) to activate, with the goal of activating the pre-selected target node in the end. We consider decentralized routing scheme where only the links connected to already activated nodes are known to the selection strategy. We study the routing time of complex contagion and compare the result with simple routing and complex diffusion (the diffusion of complex contagion, where all eli- gible nodes are activated immediately in the same step with the goal of activating all nodes in the end). We show that for decentralized complex routing, the routing time is lower bounded by a polynomial in n (the number of nodes in the network) for all range of α both in expectation and with high probability (in 1 α particular, Ω(n α+2 ) for α ≤ 2 and Ω(n 2(α+2) ) for α > 2 in expectation).
    [Show full text]
  • IJAGR Editorial Board Editor-In-Chief: Donald Patrick Albert (Geo [email protected]), Sam Houston State U
    IJAGR Editorial Board Editor-in-Chief: Donald Patrick Albert ([email protected]), Sam Houston State U. USA Associate Editors: Jonathan Comer, Oklahoma State U., USA Thomas Crawford, East Carolina U., USA G. Rebecca Dobbs, Western Carolina U., USA Sonya Glavac, U. of New England, Australia Carol Hanchette, U. of Louisville, USA Tony Hernandez, Ryerson U., Canada Jay Lee, Kent State U., USA Shuaib Lwasa, Makerere U., Uganda John Strait, Sam Houston State U., USA David Wong, George Mason U., USA International Editorial Review Board: Bhuiyan M. Alam, The U. of Toledo, USA David Martin, U. of Southhampton, UK Badri Basnet, The U. of Southern Queensland, Australia Luke Marzen, Auburn U., USA Rick Bunch, U. of North Carolina - Greensboro, USA Adam Mathews, Texas State U., USA Ed Cloutis, U. of Winnipeg, Canada Darrel McDonald, Stephen F. Austin State U., USA Kelley Crews, U. of Texas at Austin, USA Ian Meiklejohn, Rhodes U., South Africa Michael DeMers, New Mexico State U., USA Joseph Messina, Michigan State U., USA Sagar Deshpande, Ferris State U., USA William A. Morris, McMaster U., Canada Steven Fleming, United States Military Academy, USA Petri Pellikka, U. of Helsinki, Finland Doug Gamble, U. of North Carolina - Wilmington, USA François Pinet, Cemagref - Clermont Ferrand, France Gang Gong, Sam Houston State U., USA Wei Song, U. of Louisville, USA Carlos Granell, European Commission, Italy Sermin Tagil, Balikesir U., Turkey William Graves, U. of North Carolina - Charlotte, USA Wei Tu, Georgia Southern U., USA Timothy Hawthorne, Georgia State U., USA Brad Watkins, U. of Central Oklahoma, USA Bin Jiang, U. of Gävle, Sweden Dion Wiseman, Brandon U., Canada C.
    [Show full text]
  • Gamification for Youth Engagement
    GLOBAL BROADBAND AND INNOVATIONS ALLIANCE WHAT’S NEXT September 2020 WHAT’S NEXT: Would You Like to Play a Game? By Seth Corrigan, Senior Director of Assessment and Game-Based Learning, Southern New Hampshire University INTRODUCTION This chapter is designed to inform USAID and USAID broadly relational aspects of learning and behavior implementing partners of promising developments in change. Second, role playing games – both digital and the use of games and gamification to support civic board-based role-playing games – are gaining engagement. As communities come to increasingly face recognition for their capacity to support effective volatile, uncertain, complex, and ambiguous decision- deliberation and planning among community members. making environments, games and gamified experiences Examples of games and gamification efforts are will have a growing role in informing and gathering input discussed throughout. Third, while gamification of from the public, provide means for engaging citizens e-participation is not new, current uses often leverage in fruitful deliberation, establishing supportive norms for the approach to engage community members in idea civic engagement, and forming social ties valuable for generation, sensing activities as well as city planning public participation. Youth engagement is emphasized and policymaking. Lastly, newsgames are also noted throughout. Also discussed is the current evidence base for their ability to support the critical understanding of for use of games and gamification to support public complex systems and events; increasingly the focus of understanding of complex systems and issues, civic policymaking in environments that are volatile, uncertain, engagement as well as key opportunities and barriers complex, and ambiguous. Themes associated with civic to their use for that same purpose.
    [Show full text]
  • “Social Contagion”: Associative Diffusion and the Emergence Of
    Beyond “Social Contagion”: Associative Diffusion and the Emergence of Cultural Variation∗ Amir Goldberg Stanford University Sarah K. Stein Stanford University March 30, 2018 Abstract Network models of diffusion predominantly think about cultural variation as a prod- uct of social contagion. But culture does not spread like a virus. In this paper, we pro- pose an alternative explanation which we refer to as associative diffusion. Drawing on two insights from research in cognition—that meaning inheres in cognitive associations between concepts, and that such perceived associations constrain people’s actions— we propose a model wherein, rather than beliefs or behaviors per-se, the things being transmitted between individuals are perceptions about what beliefs or behaviors are compatible with one another. Conventional contagion models require an assumption of network segregation to explain cultural variation. In contrast, we demonstrate that the endogenous emergence of cultural differentiation can be entirely attributable to social cognition and does not necessitate a clustered social network or a preexisting division into groups. Moreover, we show that prevailing assumptions about the effects of network topology do not hold when diffusion is associative. ∗Direct all correspondence to Amir Goldberg: [email protected]; 650-725-7926. We thank Rembrand M. Koning, Daniel A. McFarland, Paul DiMaggio, Sarah Soule, John-Paul Ferguson, Jesper Sørensen, Glenn Carroll and Sameer B. Srivastava for helpful comments and suggestions. The usual disclaimer applies. Introduction Contemporary societies exhibit remarkable and persistent cultural differences on issues as varied as musical taste and gun control. This cultural variation has been a longstanding topic of sociological inquiry because it is central to how social order, and the inequalities it is founded on, is maintained (Lamont, Molnár, and Virág 2002; Bourdieu 1986; Gold- berg, Hannan, and Kovács 2016).
    [Show full text]
  • Complex Contagions in Kleinberg's Small World Model
    Complex Contagions in Kleinberg’s Small World Model Roozbeh Ebrahimi∗ Jie Gao Golnaz Ghasemiesfeh Stony Brook University Stony Brook University Stony Brook University Stony Brook, NY 11794 Stony Brook, NY 11794 Stony Brook, NY 11794 [email protected] [email protected] [email protected] Grant Schoenebecky University of Michigan Ann Arbor, MI 48109 [email protected] ABSTRACT Categories and Subject Descriptors Complex contagions describe diffusion of behaviors in a social net- J.4 [Social and Behavioral Sciences]: Sociology—social networks, work in settings where spreading requires influence by two or more social contagion; G.2.2 [Discrete Mathematics]: Graph Theory— neighbors. In a k-complex contagion, a cluster of nodes are ini- random network models tially infected, and additional nodes become infected in the next round if they have at least k already infected neighbors. It has been Keywords argued that complex contagions better model behavioral changes Social Networks; Complex Contagion; Kleinberg’s Small World such as adoption of new beliefs, fashion trends or expensive tech- Model nology innovations. This has motivated rigorous understanding of spreading of complex contagions in social networks. Despite sim- ple contagions (k = 1) that spread fast in all small world graphs, 1. INTRODUCTION how complex contagions spread is much less understood. Previ- Social acts are influenced by the behavior of others while at ous work [11] analyzes complex contagions in Kleinberg’s small same time influencing them. New social behaviors may emerge world model [14] where edges are randomly added according to a and spread in a social network like a contagion.
    [Show full text]
  • False Beliefs: Byproducts of an Adaptive Knowledge Base? 131 Elizabeth J
    “This volume provides a great entry point into the vast and growing psycho- logical literature on one of the defining problems of the early 21st century – fake news and its dissemination. The chapters by leading scientists first focus on how (false) information spreads online and then examine the cognitive processes involved in accepting and sharing (false) information. The volume concludes by reviewing some of the available countermeasures. Anyone new to this area will find much here to satisfy their curiosity.” – Stephan Lewandowsky , Cognitive Science, University of Bristol, UK “Fake news is a serious problem for politics, for science, for journalism, for con- sumers, and, really, for all of us. We now live in a world where fact and fiction are intentionally blurred by people who hope to deceive us. In this tremendous collection, four scientists have gathered together some of the finest minds to help us understand the problem, and to guide our thinking about what can be done about it. The Psychology of Fake News is an important and inspirational contribu- tion to one of society’s most vexing problem.” – Elizabeth F Loftus , Distinguished Professor, University of California, Irvine, USA “This is an interesting, innovative and important book on a very significant social issue. Fake news has been the focus of intense public debate in recent years, but a proper scientific analysis of this phenomenon has been sorely lacking. Con- tributors to this excellent volume are world-class researchers who offer a detailed analysis of the psychological processes involved in the production, dissemina- tion, interpretation, sharing, and acceptance of fake news.
    [Show full text]