Information Propagation on Twitter

Information Propagation on Twitter

Information Propagation on Twitter Eldar Sadikov Maria Montserrat Medina Martinez Stanford University Stanford University [email protected] [email protected] Goal ABSTRACT A and may not receive B’s tweets. These connections nat- We analyze URL and tag propagation on Twitter social net- urally• Study form information a directed social propagation network where on nodesTwitter are from the work with 54 million nodes and 1.5 billion edges, one of the usersthe of thenetwork service standpoint and edges represent the subscriptions. largest social networks studied in academia. We specifically focus on the interplay of external and network influences. Secretary of state Clinton announces 2012 Int’l AIDS conference We attribute propagation to the network whenever a user to be held in U.S.: http://bit.ly/8Bc #WorldsAIDSDay mentions a tag or URL after one of its neighbors has pre- • Given:Figure 1: An example of a tweet viously mentioned it, and to external influence otherwise. Tweets, as shown in Figure 1, often contain URLs and We develop a new metric to measure external influence and – The social network tags. Tags are tokens prefixed with a #, e.g. “WorldsAIDS- an efficient algorithm to calculate it. The insight we obtain – Sequence of nodes that mentioned a hashtag or Day”in Figure 1, and often used to indicate the tweet’s topic from the external influence metric paired with the analysis URL in chronological order or event. On the other hand, URLs are typically HTTP links of cascade dynamics of the network influence, not only val- to• newsStudy articles, topology pictures, and or characteristics videos. of infected idates some of the previously observed phenomena in other Innodes this paper, in the we studygraph the propagation of URLs and tags social networks but also provides new insight into the inter- over the Twitter social network. Specifically, we look at the play of network and external influences over the lifetime of users (i.e. nodes in the network) that mention a particular memes in the network. URL or tag in chronological order, their distribution over the network, and the presence/absence of edges between them. Categories and Subject Descriptors We will generally refer to such chronological distribution as H.2.8 [Database Management]: Database applications— information propagation, where information, in our context, Data mining will refer to the URLs and tags. There are a number of factors that make Twitter inter- esting for studying information propagation and make our General Terms work different from the previous work in the area. First of Experimentation, Measurement, Algorithms all, Twitter, unlike much of the previously studied media such as news feeds, blogs, emails, has an explicit social (i.e. Keywords subscription) network. Our work is one of the first ones to look at information propagation on a real social network Social networks, information propagation which is, on top of all, one of the largest ones known to date. Second of all, because information on Twitter often spreads 1. INTRODUCTION in the form of tags and URLs, there is no burden of data Twitter is a social networking and micro-blogging service cleaning and thus no potential bias in results. Thirdly, Twit- which has become popular over the last couple of years. ter URLs and tags, in themselves, are interesting to study Twitter users send and read messages known as tweets. Tweets, as people often now rely on them to find trends and news as shown in Figure 1, are text-based posts up to 140 char- on the web. acters long and are delivered to the author’s subscribers, While Twitter users can discover information directly from known as followers. Such subscriptions form directed not al- the network, i.e. by reading the tweets of the users they fol- ways symmetric connections, where user A may follow user low, they can equally discover information from outside of B and, hence, receive A’s tweets, but user B may not follow the network, e.g. from TV, newspapers, online news aggre- gators (e.g., Google News), etc. In this work, we attempt to understand how to differentiate between the two cases and propose new metrics to quantitatively analyze them. To our knowledge, this is one of the first attempts to study Permission to make digital or hard copies of all or part of this work for the contribution of external sources to information spread personal or classroom use is granted without fee provided that copies are in social networks. Moreover, most of the work up to date not made or distributed for profit or commercial advantage and that copies has focused on propagation directly via the network, i.e., in bear this notice and the full citation on the first page. To copy otherwise, to our setting, the case when users find information directly republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. from the people they follow. However, even to this respect, Copyright 200X ACM X-XXXXX-XX-X/XX/XX ...$10.00. our findings not just confirm the already observed phenom- 1 ena, but also unveil new interesting dynamics. Last but not disease propagation model [1], where once infected, a node least, the findings we report in this paper have applications cannot be reinfected (all mentions of some URL or tag x in news and trend detection and tracking. after the first mention are ignored). In summary, our contributions are as follows: Cascades: • Basic analysis of Twitter social network properties (Sec- Definition 7. For a given infection hx, hv1, v2, . , vnii, tion 3) we define its infection graph at step k, 1 ≤ k ≤ n, as a • Metric to measure the contribution of external sources subgraph Ck(Vk,Ek) of G(V, E), where Vk = ∪1≤i≤kvi and to information propagation in a social network: 1) its there is an edge (vi, vj ) ∈ Ek iff (vi, vj ) ∈ E and i < j. formal definition, 2) efficient algorithm to compute it, Definition 8. In a given infection graph Ck(Vk,Ek), we 3) its evaluation on real data and 4) comparison of its refer to its connected components as cascades. behavior on real data to two simple synthetic informa- tion propagation models (Section 4) Definition 9. A cascade is said to be non-trivial if its • Comprehensive analysis of the network contribution to size is greater than 1. the spread of URLs/tags on Twitter (Section 5) Definition 10. A node vk is said to be cascaded if for a given infection hx, hv , v , . , v ii and its graph C (V ,E ), 2. PRELIMINARIES 1 2 n n n n vk is in a non-trivial cascade. We begin by introducing our terminology and notation. Definition 11. For infection hx, hv1, v2, . , vnii and its Network: Given subscription (i.e. follow) relationships 0 between Twitter users, we define the Twitter network as graph Ck+1(Vk+1,Ek+1), 1 ≤ (k + 1) ≤ n, let V be the set a directed graph G = (V, E), where each node in V is a of incoming neighbors of vk+1. Node vk+1 is said to merge cascades if the nodes in V 0 belong to more than one cascade Twitter user. For any two users v1 ∈ V, v2 ∈ V there is an in the graph Ck(Vk,Ek) at step k of the same infection. edge (v1, v2) ∈ E if and only if v2 follows v1. In other words, we introduce an edge from v1 to v2 as long as v2 subscribes to tweets of v1, and, hence, information in the form of URLs 3. DATA SET or tags posted by v is observed by (i.e. flows to) v . 1 2 Network: We have been continuously monitoring a sample Definition 1. For any two nodes vi ∈ V and vj ∈ V , of all publicly available tweets over the last six month and, the distance d(vi, vj ) from vi to vj is defined as the shortest from each observed user ID among the collected tweets, we directed path in the network from vi to vj . If such path does explored the Twitter network structure in a breadth-first- not exist, d(vi, vj ) = ∞. search manner. We collected this way follow relationships (i.e. IDs of people a user follows) for almost 54,310,622 users Stream: which is 99.9% of all user IDs known to us. The graph we have obtained has 1,491,979,651 edges with average number Definition 2. Tweet is a triple hv, m, ti, where v ∈ V of followees (in-degree of a node in the network, per our is the user who posted the tweet, m is the text of the tweet definition) per user at 27.47. (message), and t is the time when the tweet was posted. Here we provide some other basic stats on the collected network. Definition 3. Stream is a sequence of tweets hhv1, m1, t1i, hv2, m2, t2i,...i, where any tweet hvi, mi, tii precedes another • Figure 2 shows the out-degree distribution of the net- tweet hvj , mj , tj i iff ti ≤ tj . work plotted on the log-log scale, i.e. the distribution of the number of followers per user. One can observe For simplicity, we will assume that we have access to only that the distribution follows the power law. The power one stream. This stream may either contain all publicly law exponent is 1.95, estimated by the complementary available tweets or a sample of all the tweets. cumulative distribution function (CCDF) method, and Definition 4. For a given URL or tag x, user v men- 1.84, as estimated by the maximum likelihood estimate (MLE) method.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us