Do Diffusion Protocols Govern Cascade Growth?

Do Diffusion Protocols Govern Cascade Growth?

Do Diffusion Protocols Govern Cascade Growth? Justin Cheng1, Jon Kleinberg2, Jure Leskovec3, David Liben-Nowell4, Bogdan State1, Karthik Subbian1, and Lada Adamic1 [email protected], [email protected], [email protected], [email protected], [email protected], [email protected], [email protected] 1Facebook, 2Cornell University, 3Stanford University, 4Carleton College Abstract Large cascades can develop in online social networks as peo- ple share information with one another. Though simple re- share cascades have been studied extensively, the full range of cascading behaviors on social media is much more di- verse. Here we study how diffusion protocols, or the social ex- changes that enable information transmission, affect cascade growth, analogous to the way communication protocols de- fine how information is transmitted from one point to another. Studying 98 of the largest information cascades on Facebook, we find a wide range of diffusion protocols – from cascading reshares of images, which use a simple protocol of tapping a single button for propagation, to the ALS Ice Bucket Chal- lenge, whose diffusion protocol involved individuals creating and posting a video, and then nominating specific others to do the same. We find recurring classes of diffusion protocols, and identify two key counterbalancing factors in the con- struction of these protocols, with implications for a cascade’s growth: the effort required to participate in the cascade, and the social cost of staying on the sidelines. Protocols requiring greater individual effort slow down a cascade’s propagation, Figure 1: The diffusion tree of a cascade with a volunteer while those imposing a greater social cost of not participating diffusion protocol, where individuals posted music from an increase the cascade’s adoption likelihood. The predictability artist whose name matched the letter they were assigned by of transmission also varies with protocol. But regardless of a friend. Edges are colored from red (early) to blue (late). mechanism, the cascades in our analysis all have a similar re- production number (≈1.8), meaning that lower rates of expo- sure can be offset with higher per-exposure rates of adoption. tap of a button) and which spread through highly connected, Last, we show how a cascade’s structure can not only differ- central nodes in a network (e.g., pages with millions of fol- entiate these protocols, but also be modeled through branch- lowers) (Goldenberg et al., 2009; Hinz et al., 2011). ing processes. Together, these findings provide a framework Unsurprisingly, the most common large cascades on Face- for understanding how a wide variety of information cascades book consist of photo, video, or link reshares. But along- can achieve substantial adoption across a network. side these simpler cascades, information and behavior is also spreading through more complex and effortful propaga- Introduction tion mechanisms. These more complex cascades are less fre- On social network platforms such as Facebook, people re- quent by comparison, but can still grow large. The ALS Ice share information they see from both friends and pages (i.e., Bucket Challenge, for example, required significant effort to the accounts of brands, organizations, or public figures). spread from one person to another: one participates by post- This resharing may prompt other friends or pages to share ing a video of oneself pouring ice water over one’s head, and as well, leading to a cascade that spreads through the net- typically participates only if one was explicitly nominated work. For these information cascades to grow large, the in- by an earlier participant. Nonetheless, the Ice Bucket Chal- formation within them must continually be replicated. Thus, lenge resulted in >17M videos shared (Facebook, 2014). one may expect that large cascades should be those whose As another example, a music challenge meme (Fig. 1, 2d) information is easily transmitted (e.g., reshareable with the required people to volunteer for and then be assigned to post about a specific music video, with the resulting cascade Copyright c 2018, Association for the Advancement of Artificial attracting >200,000 participants. Why did these cascades Intelligence (www.aaai.org). All rights reserved. succeed despite requiring more effort and being limited in Figure 2: Four primary diffusion protocols in cascading behavior on Facebook. (Names are fictitious.) (a, b) Transient and persistent copy protocols involve simple content replication. (c) Nomination protocols require participants to complete a task before inviting specific others to participate. (d) Volunteer protocols invite others to declare a desire to participate in an activity. membership? By studying the diverse social mechanisms by and also introduces a social cost to not having one’s nom- which large cascades propagate, we can gain a better under- ination accepted or not accepting the nomination. The Ice standing of the factors that govern cascade growth. Bucket Challenge follows this protocol. The present work: Diffusion protocols. Here we study • In a volunteer protocol, a participant asks for volunteers diffusion protocols, the social exchanges that enable infor- of others interested in joining, and subsequently assigns mation to be transmitted in cascades, and how such pro- a task to be fulfilled by each of them, including calling tocols explain the substantial diversity in cascade structure for additional volunteers. The effort required can vary, and growth. Similar to the way that different communication with lower social costs than nomination cascades, as only protocols define how information is transmitted between two those who are interested volunteer to participate. The mu- endpoints in a computer network (Comer, 2000), diffusion sic challenge meme described above follows this protocol. protocols define the interactions needed for information to Although we expect that these classes of protocols will not spread across edges in a social network. be exhaustive, they demonstrate both a substantial range of By collecting a variety of large cascades over multiple properties and a remarkably consistent relationship between periods, we identify four types of underlying mechanisms the number of individuals who could participate at each step (Fig. 2). These protocols can be characterized using two (exposed individuals) and the fraction of those individuals counterbalancing dimensions: the individual effort required who do participate in the spreading behavior (adopters). to participate in a cascade, and the social cost of not partic- Summary of findings. Our findings show how these four ipating. Each class of protocol induces a different combina- protocols lead to differences in the resulting cascade struc- tion of effort and social cost of not participating: ture and growth. As the individual effort required to par- • A transient copy protocol underlies reshare and copy- ticipate increases, from transient and persistent copying to paste cascades, where an individual simply copies the in- nomination and volunteering, the speed at which informa- formation, e.g., by tapping on a “reshare” button. Here, tion propagates from one node to another decreases. Though the individual effort to participating is low and there is cascades with copy protocols (or copy cascades) tend to rely effectively zero social cost to not participating. on network hubs such as pages to spread, cascades with nomination or volunteer protocols (or nomination cascades • A persistent copy protocol differs from the first in its ef- and volunteer cascades respectively) tend to do so primar- fect being persistent – that is, visible for a longer time – ily via lower-degree nodes, from person to person. As the rather than transient like a post that quickly goes by. Ex- social cost of not participating increases, the more likely it amples include cascading modifications to users’ profile is that a cascade will spread through strong ties (e.g., when pictures; for example, adopting an item such as a frame two friends have many friends in common). Higher social to place around the picture. Persistence may make non- cost also tends to result in cascades exhibiting complex dif- participation more socially costly, as it is more apparent fusion, suggesting that participants wait to observe the be- when a user has not taken part in the cascade. havior of others before acting. We also demonstrate how • In a nomination protocol, a participating individual nom- the predictability of transmission varies across these differ- inates one or more others to participate in the cascade, ent diffusion protocols; predicting successful transmission is and the nominees, if they accept the challenge, will nom- easier for nomination cascades than for copy cascades. inate others. The nomination protocol usually demands a Regardless of diffusion protocol, we find that the most unique contribution requiring varying degrees of effort, successful cascades exhibit a reproduction number close to 1.8 – that is, each new participant results in 1.8 additional versity of mechanisms that prior literature has collectively participants on average throughout its life – suggesting that considered motivates the present work on diffusion proto- successful protocols balance audience size and likelihood of cols. We contribute a comparative focus to this body of work participation. The two copy protocols have a large poten- by examining the interplay between these protocols and the tial audience at each step but low likelihoods of participa- growth of the

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us