RESTRICTING THE SPREAD OF FIRESTORMS IN SOCIAL NETWORKS

Size: px
Start display at page:

Download "RESTRICTING THE SPREAD OF FIRESTORMS IN SOCIAL NETWORKS"

Transcription

1 Association for Information Systems AIS Electronic Library (AISeL) ECIS 2014 Proceedings RESTRICTING THE SPREAD OF FIRESTORMS IN SOCIAL NETWORKS Anastasia Mochalova Katholische Universität Eichstätt-Ingolstadt, Ingolstasdt, Germany, Alexandros Nanopoulos Katholische Universität Eichstätt-Ingolstadt, Ingolstadt, Germany, Follow this and additional works at: Anastasia Mochalova and Alexandros Nanopoulos, 2014, "RESTRICTING THE SPREAD OF FIRESTORMS IN SOCIAL NETWORKS", Proceedings of the European Conference on Information Systems (ECIS) 2014, Tel Aviv, Israel, June 9-11, 2014, ISBN This material is brought to you by the European Conference on Information Systems (ECIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in ECIS 2014 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact

2 RESTRICTING THE SPREAD OF FIRESTORMS IN SOCIAL NETWORKS Complete Research Mochalova, Anastasia, Katholische Universität Eichstätt-Ingolstadt, Auf der Schanz 49, Ingolstadt, Germany, Nanopoulos, Alexandros, Katholische Universität Eichstätt-Ingolstadt, Auf der Schanz 49, Ingolstadt, Germany, Abstract We investigate the social-media phenomenon defined as online firestorms : sudden discharges of large quantities of negative word-of-mouth that spreads rapidly through online social networks. Firestorms can start due to various reasons, such as online marketing campaigns that backfired or dissatisfaction of customers, and are a consequence of opening social media channels to the crowds. Firestorms have affective and viral nature and therefore posing severe threats, such as harming brand reputation and causing customer losses. Our motivation in this paper is the development of optimized forms of counteraction to firestorms, which engage individuals to act as supporters and initiate the spread of positive word-of-mouth, helping to constrain the firestorm as much as possible. We describe the required optimization as a seed-selection problem in the context of firestorms by explaining the differences it has compared to its examination in other existing contexts. We propose a new seed-selection method that is based on the concept of local centrality, which unlike existing social network analytics, selects supporters based not on the global structure of the social network, but locally, i.e., by taking into account the areas of a social network that have been affected by the negative word-of-mouth. Experimental evaluation with data from a real social network demonstrates that the proposed method presents several advantages compared to seed-selection based on commonly used global centrality scores. Keywords: Online Firestorms, Social Media Phenomena, Social Network Analytics, Network Centrality, Information Diffusion. 1 Introduction Social media have become an important part of the everyday life of companies, since they offer direct communication channels with their customers. However, they also make companies susceptible to negative word-of-mouth (nwom) (Hennig-Thurau et al., 2010), that is, comments about an organization s products, service quality, or trustworthiness, which are passed on from one person to another and may adversely affect its business (Richins, 1984). This can cause the emergence of socialmedia phenomena, such as online firestorms, which are sudden discharges of large quantities of nwom that spread rapidly in social media (Pfeffer, Zorbach and Carley, 2013). The reasons for the emergence of firestorms can be varying. It can be due to a marketing campaign that backfired, for example the Twitter campaigns of McDonald s, which asked people to share their stories using a Twenty Second European Conference on Information Systems, Tel Aviv

3 specific hashtag. The campaign backfired when people started sharing negative stories. Another reason can be the dissatisfaction of customers and public with the company or its products; for instance, the insurance company Progressive faced an online firestorm after defending an offender in order not to pay out victim s insurance policy. 1 The affective and viral nature of firestorms poses severe threats with potentially unforeseen and uncontrollable consequences, such as harming brand reputation and causing customer losses (Hennig- Thurau et al., 2010; Pfeffer, Zorbach and Carley, 2013). This motivates companies to monitor social media for nwom, by using text mining and sentiment analytics (Pang and Lee, 2008), which are becoming available also as online services (e.g. Based on this information, companies can create contingency plans and develop forms of counteractions that can be used in case of firestorms. Counteractions can involve proactive or reactive strategies (Van Noort and Willemsen, 2012), where a major role is given to the defense through loyal customers (supporters) who can be engaged into the propagation of positive WOM (pwom) and, thus, increase resilience to nwom (Bhattacharya and Sen, 2004). Supporters can spread pwom in order to destabilize as many people as possible in their negative attitude forming (Pfeffer, Zorbach and Carley, 2013). The involvement of supporters increases the success of a counteraction to a firestorm, because if pwom were to come directly from the company, people might be reluctant to accept it, since they may perceive it as advertising. In contrast, pwom from the supporters can spread more effectively, since users of online social networks are influenced more by their social contacts than by direct communication from companies; that was demonstrated in recent surveys, which showed that: 78% of consumers trust social peer recommendations over traditional web advertising. 2 Motivated by these factors, our paper aims at investigating firestorms and focuses on how social network analysis can be applied to the problem of restricting the spread of nwom by optimizing the counteraction through the involvement of supporters. The main research question addressed is how to identify the appropriate supporters (called seeds) that will initiate the propagation of pwom that will constrain the spread of the nwom as much as possible. Our approach focuses on optimizing counteractions to firestorms, where pwom is used only as a mean of minimizing the spread of nwom. Maximizing the spread of pwom is not identical to minimizing the spread of nwom, because minimization of the number of negatively activated nodes can be performed through few but well selected seeds, which will prevent many other nodes from becoming negatively activated even by staying inactive, i.e., not necessarily becoming positively activated. In contrast, the positive activation of several nodes may not necessarily be able to prevent many other nodes from becoming negatively activated, because those positively activated nodes might not had been exposed at all to nwom and thus they do not correspond to prevented negative activations. In this paper we investigate how seed-selection methods based on centrality can be used to constrain the spread of nwom. We propose a novel method that, unlike existing seed-selection methods based on global centrality (i.e., how central is a member in terms of the entire structure of a social network), selects seeds according to their local centrality, which is defined in terms of both the structure of the social network and the members that have been already affected by nwom. The experimental results show that our method compares favorably to seed-selection based on global centrality. The rest of this paper is organized as follows: in Section 2 we present the related work and explain in more detail the motivation for this study. In Section 3 the examined problem and the proposed 1 For both cases see more details at: and intentious.com/2011/11/23/qantasluxury-crashes-into-ground-we-take-twitter-down-for-the-ride/ 2 See Twenty Second European Conference on Information Systems, Tel Aviv

4 methodology is described. In Section 4 the structure and setup of our experimental evaluation is presented, with the results being presented in Section 5. Finally, Section 6 concludes the paper. 2 Related Work Firestorms have only recently started to be investigated as social media phenomena that involve nwom against a person, company, or group, and create the need for developing effective counteractions (Pfeffer, Zorbach and Carley, 2013). Among the various forms of possible counteractions to nwom in social media (Hennig-Thurau et al., 2010), the spread of pwom by supporters has been identified as a very effective mean (Van Noort and Willemsen, 2012), especially in the case of firestorms (Pfeffer, Zorbach and Carley, 2013). Although these existing studies motivate the use of supporters in general, they do not propose specific methods with which seeds can be selected in an optimal way that will constrain the spread of nwom during a firestorm as much as possible. In this paper, we try to close this gap by proposing a method for this seed-selection problem. The seed-selection problem in online social networks is mainly a computing one based on information available about the network, one needs to identify influential users to start the viral spread (Probst, Grosswiele and Pfleger, 2013) and predict how this spread will diffuse in the network (Fang et al., 2013). Seed-selection has been mostly studied in the context of viral marketing, where the main goal is to maximize the number of users that will adopt the message of a viral campaign. This direction of research was pioneered by Kempe, Kleinberg and Tardos (2003), who proposed models of information diffusion that investigate how a specific piece of information propagates in an online social network and activates its members during a viral marketing campaign. A limitation of existing approaches in this research direction is, however, that they require information about influence factors in the network, i.e., the amount at which users influence one another (Goyal, Bonchi and Lakshmanan, 2012). The exact quantification of influence factors requires data that is often not available or cannot be used due to privacy reasons. To overcome this limitation, centrality scores have been used that select as seeds users that have a globally central position within the structure of a social network and, thus, can reach a larger part of the network (Hinz et al., 2011). Another limitation of all aforementioned approaches is that they are applicable only to the case where a single homogeneous piece of information is being diffused, which in the context of viral marketing can be considered as a form of pwom. However, they do not take into account the possibility that nwom may be propagated at the same time. To address this, several extensions to existing models have been proposed that incorporate negative opinions (e.g. Chen et al., 2011, He et al., 2012). This holds, for example, when two companies engage in marketing campaigns competing for customers. But these studies focus mostly on the problem of seed-selection in terms of maximizing the spread of pwom in the presence of nwom, by activating as many nodes as possible for one of the campaigns and prevail over competitor (Bharathi, Kempe and Salek, 2007; Carnes at al., 2007; Goyal and Kearns, 2012), but not on constraining the opposite campaign which is the goal in restricting firestorms. A limited number of works have focused on minimizing the spread of the competing contagion, which is similar to the goal of this paper. One of such studies (Budak, Agrawal and El Abbadi, 2011) proposed a diffusion model for two types of information spreading simultaneously in a social network, where the first type corresponds to true and the second to false information. Seed-selection methods have been proposed to start the propagation of true information that will limit the spread of false information. Specifically, seed-selection has been performed based on a greedy hill-climbing algorithm, a centrality score, and some heuristics based on prediction of nwom spread. However, all these methods (apart from the centrality score) require knowledge of influence factors, which can be a limitation as described above. More importantly, the case of true-versus-false information spread Twenty Second European Conference on Information Systems, Tel Aviv

5 closely resembles the case of defamation, i.e., communication of false statements that harm the reputation of organizations or individuals. 3 Based on this, the approach of Budak, Agrawal and El Abbadi (2011) is based on the premise that individuals, when faced with both true and false information, will always accept the true one, because the false information can be easily disproved. This premise, however, does not hold in the context of firestorms, since the decisions of individuals are not only affected by their personal inherent preferences, but also by the so called negativity bias that makes them more likely to accept and propagate nwom (Rozin and Royzman, 2001). To summarize, seed-selection has been examined in the context of the following applications: Viral Marketing. Only one type of information (pwom) is being spread and seeds are used to maximize this spread (Kempe, Kleinberg and Tardos, 2003; Hinz et al., 2011). Competitive Marketing. Two or more competing messages are being propagated through word-of-mouth. They are represented by multiple cascades, where pwom and nwom compete for attention of users in a network (He et al., 2012; Chen et al., 2011; Bharathi, Kempe and Salek, 2007; Carnes at al., 2007; Goyal and Kearns, 2012). The goal of seedselection is to maximize the spread of pwom, and not to limit the spread of nwom. Defamation. nwom in form of false information being propagated competing with pwom in form of information proven true (Budak, Agrawal and El Abbadi, 2011; Nguyen et al., 2012). When facing both nwom and pwom, user will accept the latter as it contains the proof of its verity. We focus on firestorms where both pwom and nwom are being spread in a social network, and nwom is not representing false information that is self-evidently discarded when contradicted with pwom. Our approach focuses on the objective of constraining the spread of nwom as much as possible and our seed-selection method considers a local target in order to constrain firestorms. 3 Proposed Methodology 3.1 Problem Description A social network represented by a simple, undirected 4, and unweighted graph G(V,E) is given. V is the set of nodes corresponding to the users of the network and E is the set of edges corresponding to the social ties among the users. Each node of V can be inactive, negatively activated, or positively activated. Initially, all nodes are inactive and once nwom starts spreading during a firestorm, nodes exposed to nwom may become negatively activated. We examine the so called progressive spread of WOM, where activated nodes (negatively or positively) do not modify their opinions (Kempe, Kleinberg and Tardos, 2003). For a node to become activated (negatively or positively) it is not enough just to be exposed to the corresponding WOM, but also to accept it by performing an action, e.g. Liking, posting, or sharing. Let N V be the set of users that have been activated negatively at each time step. The problem of limiting the spread of nwom can be then considered as identifying a set S V of k seed nodes who will become positively activated and start propagating pwom that will activate positively other nodes that are socially connected to them with edges in E. The number of selected seeds k is predefined and represents the cost of the counteraction to a firestorm. The larger k is, the more seeds have to be 3 See: 4 Our approach can be easily extended to the case of directed social connections, such as the directed relation between followers and followees in Twitter. Twenty Second European Conference on Information Systems, Tel Aviv

6 positively activated initially and we assume that this cost is proportional to k (Kempe, Kleinberg and Tardos, 2003). Our objective is to constrain the effect of the firestorm, i.e., minimize the number of nodes in N that will be activated negatively in the end. Therefore, we do not focus on maximizing the final number of positively activated nodes. 3.2 Selecting Seeds based on Local Centrality Existing research proposed to select seeds according to how central their position is with respect to the network structure represented by graph G (Hinz et al., 2011). The intuition is that, the more central a node is, the more likely it is to reach many other nodes. By computing a centrality score c(v) for each node v V, we select the top-k nodes with the highest scores as seeds. In the case of a counteraction to a firestorm, when central nodes are selected as seeds, they are expected to be more effective in spreading pwom. Moreover, by selecting central nodes as seeds, we prevent them from becoming negatively activated, and thus we prevent negative activation that could have been achieved by them. Several algorithms have been proposed to compute centrality scores, such as degree, betweenness, closeness and Eigenvector centrality (see Borgatti and Everett (2006) for more details). Initial experimental comparison of some of these centrality scores indicated that they have comparable performance (Hinz et al., 2011), however Eigenvector centrality has been recently reported to have the overall best performance (Goyal, Bonchi and Lakshmanan, 2012; Mochalova and Nanopoulos, 2012). That is why in this study we focus on Eigenvector centrality it is defined as the principal eigenvector of the adjacency matrix defining the network. It computes relative scores to all nodes in the network based on the principle that connections to nodes having a high score contribute more to the score of the node in question, i.e., not only the connectedness of each node analyzed but also the connectedness of neighboring nodes is also taken into account. A variant of Eigenvector centrality is, for example, involved in Google s search engine. The aforementioned centrality score can be characterized as global, because it is computed based on the entire network structure. Despite their aforementioned advantages, global centrality scores present also the following disadvantages in the case of selecting seeds for a counteraction to a firestorm: 1. Global centrality scores ignore the nodes in set N, which have been already negatively activated. This means that the counteraction to a firestorm tries to initiate the propagation of pwom, by selecting seeds that have high global centrality, regardless of which nodes have been already affected by nwom. However, seeds with high global centrality may be far away, in terms of the topology of the network structure, from the negatively activated nodes in N. Thus, they may not become able to prevent many negative activations (despite the fact that they may achieve many positive activations see the discussion in Section 3.1 about these two different objectives). Additionally, recent findings showed that influence propagation in viral processes in social networks often happens only within a close proximity of the seeds (Cha, Mislove and Gummadi, 2009), thus spread started with a globally central seed might not even reach the contaminated area. By using local centrality scores (White and Smyth, 2003), the target (contaminated area) is taken into account, their performance, however, were not yet considered for firestorms. 2. The above problem becomes worse when considering that pwom initiated by seeds that are globally central requires intermediate nodes to further propagate this pwom in order to reach the areas of the network that contain the negatively activated nodes. Therefore, selecting seeds based on their global centrality is based on the premise that intermediate nodes will be also willing to perform such further propagation of pwom. This premise may not be valid in general (Aral, Muchnik and Sundararajan, 2013) even if intermediate nodes become Twenty Second European Conference on Information Systems, Tel Aviv

7 positively activated, they may be unwilling to further propagate pwom to their friends (we examine this issue in more detail in our experimental study in Sections 4 and 5). 3. It is assumed that nodes with high global centrality scores are always available to become seeds. Nevertheless, global centrality represents a measure of node importance in a social network and, thus, it may be harder to convince nodes of pronounced importance that have high global centrality to become seeds that will spread pwom (Hinz et al., 2011). More importantly, due to the first disadvantage above, global centrality scores remain unchanged as long as the network structure is not changed. This means that the same top-k nodes with the highest global centrality scores have to be always selected, assuming again that they will be always willing to engage with every counteraction to several different firestorms, because each one will try to activate them as seeds for the propagation of pwom. Evidently, this naïve assumption does not reflect reality. To overcome these disadvantages, we developed a local centrality score, which takes into account the already negatively activated nodes in N. The proposed score examines the neighbors of nodes in N (i.e., nodes that are connected to nodes in N with edges from the set E defined in Section 3.1) and selects as seeds among them those neighbors with the highest Eigenvector centrality score. (We focus on Eigenvector centrality because of its good overall performance as mentioned above; however other centrality scores can be used, too.) An example is depicted in Figure 1. The checkered node represents the node that initiated the propagation nwom. This node managed to negatively activate its neighbors, which are depicted as black colored. The local centrality score will consider all neighbors of these negatively activated nodes; these considered nodes are depicted as hatched. Among those, the top-k with the highest Eigenvector centrality will be selected as seeds. Figure 1. Example for the local centrality: the checkered node is the initiator of a firestorm; Black nodes are negatively activated; Hatched nodes will be considered as seeds of the counteraction; White nodes are not activated yet. The local centrally score avoids the first disadvantage of global centrality because it takes into account the set of negatively activated nodes N, by considering as seeds only nodes that are neighbors of nodes in N. It avoids also the second disadvantage, because seeds with high local centrality are closer to the area of the network that is affected by nwom, and thus they can become more effective in constraining farther spread of nwom, because they can positively activate nodes around this area that will block the farther spread of nwom without the need of having many intermediate nodes that are willing to spread pwom. The local centrality score also avoids the third disadvantage, because it does not necessarily select nodes with high global centrality. Therefore, by being less pronounced, seeds with higher local centrality may be more available for spreading pwom. Moreover, seeds selected with local centrality will be different for different counteractions, because they will have a different set of negatively activated nodes N, which affects the computation of local centrality scores. Twenty Second European Conference on Information Systems, Tel Aviv

8 3.3 The Examined Diffusion Model To be able to test the performance of the proposed local centrality score (see Section 3.2), we implemented diffusion processes over the structure of a given social network (the details for the real data set that we used will be given in Section 4.1). For this purpose, we focused on a widely applied diffusion model that is called Independent Cascade (IC) (Kempe, Kleinberg and Tardos, 2003). Given the structure of a social network, which as described in Section 3.1 is represented by a graph G(V,E), IC starts by activating the seeds and then continues in discrete steps. When a node v becomes active at time step t, it has a single chance to activate each of the currently inactive neighboring nodes connected to it. For each such neighboring node w, node v has probability p vw to succeed in activating w with the same status as v (positive or negative). If v succeeds, then w becomes active at step t + 1 and recursively tries to activate its own currently inactive neighbors. Otherwise, v makes no further attempts to activate w. The process runs until no more activation is possible. This model is an extension of the existing IC model (Kempe, Kleinberg and Tardos, 2003). Our extensions include the following: i) incorporation of a stopping probability (described in detail at the end of this Section); and ii) modifying the way the probability p vw is defined, by not just being dependent on the influence one node has on its neighbor, but on the following three factors: 1. Influence factor i vw that represents how much influence node v has on w, i.e., how likely is w to become activated by node v. We computed influence factors based on the intensity of communication between each pair of nodes (see Section 4.1 for more details). Influence factors represent the social influence among members of social networks (Kempe, Kleinberg and Tardos, 2003). 2. Inherent preference θ w that user w has about the element (product, brand, etc.) for which nwom and pwom are being spread (Aral, Muchnik and Sundararajan, 2013). We assume that θ w is a random variable that follows Beta distribution (i.e., θ w ~ Beta(α,β)) and takes values in the range [0, 1]. Values closer to 0 (closer to 1) indicate lower (higher) susceptibility to the firestorm. When the value of θ w is closer to 0.5, then w has a neutral inherent preference and is equally likely to get convinced by nwom and pwom. The factor of inherent preference represents the so called anchoring effect that has been identified to cause individuals to be biased towards their inherent preference (a.k.a. attitude); thus, the stronger their inherent preference, the more resistant they are to changes of external factors such as social influence represented by the influence factor (Ahluwalia, 2000). 3. Negativity bias n, which increases the probability of v activating its neighbor w when v is activated negatively, and decreases that probability when v is positively activated. The factor of negativity bias causes nwom to have more impact than pwom (Rozin and Royzman, 2001), since individuals are relatively more likely to be influenced by negative than positive experiences, as have been identified in studies about social media. 5 We represent negativity bias through n, a small (positive) constant. Although these three factors have been identified in existing research (see citations above), they have not yet been considered in diffusion models like IC. Therefore, although they may not be exclusive (additional factors need possibly to be investigated), their consideration can enhance the IC model. Based on the above factors, when a node v tries to activate a currently inactive neighboring node w, then the probability of activation depends on the status of v (i.e., whether v is already activated positively or negatively) and is calculated as following: p + vw = i vw (1 θ w ) n p vw = i vw θ w + n 5 See: Twenty Second European Conference on Information Systems, Tel Aviv

9 Unlike the IC model that considers only positive activations and assumes for each pair of nodes a single probability p vw, in our extended IC model we account for the fact that nodes can be activated positively or negatively. For this reason, we consider two probabilities: 1) p + vw, i.e., the probability to activate w positively when v is already positively activated; and 2) p vw, i.e., the probability to activate w negatively when v is already negatively activated. Therefore, w is more likely to activate (either positively or negatively) as influence factor i vw increases the more influential node v is the more it affects its currently inactive neighbor w. Moreover, the activation of w is also affected by its inherent preference θ w, where θ w values closer to 0 (i.e., 1-θ w values closer to 1) increase the likelihood of positive activation (the other way around for values closer to 1; see the discussion above). Finally, by + adding (subtracting) the constant factor n from (to) p vw (p vw, respectively), negativity bias makes negative activations more likely relatively to positive activations. We have to emphasize that we consider all aforementioned factors (influence factor, inherent preference, negativity bias) only during the implementation of diffusion processes that reproduce spreads of nwom and pwom in order to experimentally test the proposed local centrality score in the way that is described in Section 4. Thus, to compute all centrality scores (local and global) we assume no knowledge of these factors and do not take them into account during the seed-selection, which is based only on the structure of the network. This is in accordance to the discussion in Section 2, because as mentioned there, these factors are latent and not easy to be measured in real applications (sometimes it is also not allowed to measure them in online social networks due to privacy reasons). However, these factors are used to evaluate the performance of centrality scores in our experimental study (Section 4), because they are needed to operate the IC model. Finally, our extended IC model considers a stopping probability: when a node gets activated positively, it may not necessarily try to activate its neighbors. This reflects the case when user becomes positively activated but is not willing to participate further by propagating pwom. This is contrast to the standard IC model (Kempe, Kleinberg and Tardos, 2003), which makes the assumption that each node is always willing to further propagate pwom. The use of a stopping probability is relevant to firestorms because a lot of users may be reluctant to engage in the spread of pwom, even if they have been positively activated. However, we do not use a stopping probability in case of nwom because we assume that users that become activated negatively are more eager to propagate nwom. This is another manifestation of the negativity bias mentioned above, which is based on the psychological arousal that nwom is able to create (Rozin and Royzman, 2001). 4 Experimental Design In this section, we describe the design of our experimental study that compares the centrality scores presented in Section Data Set For the experimental study we use a real data set about Facebook users from New Orleans regional network that has been made publically available by the Social Computing Group at Max Plank Institute 6. The data set contains 60,290 nodes connected by 1,545,686 edges in the social network. The average node degree is The data contains the information about interactions between nodes. These interactions are represented by wall posts, a broadcast-style messaging between users on Facebook. The data set contains 838,092 wall posts which average to 13.9 wall posts per user. For 6 The data set is available at: Twenty Second European Conference on Information Systems, Tel Aviv

10 the tasks of seed selection based on centrality scores, an undirected and unweighted graph representing the structure of this network was constructed. In order to test the performance of proposed methods using the diffusion model described in Section 3.3, a corresponding directed and weighted graph was built. This graph contains influence factors and is used only to measure the performance of each seed selection method and not for selecting the seeds themselves, which are selected based on the undirected and unweighted graph mentioned above. To build the weighted graph, information about the wall posts was used. Following the approach commonly used in related research (Kempe, Kleinberg and Tardos, 2003), we assume that the number of wall posts that user v sends to user w is an indicator of the influence that v has on w. The influence factor that v has on w is then normalized by dividing the number of messages sent from v to w by the total number of messages sent to w. This way, all influence factors are in the range between 0 and 1, and the total sum of influence factors on each node is equal to 1. The weighted graph with influence factors i vw is used to calculate the probability of activation in IC model during the experimental evaluation (see Section 3.3. for more details). 4.2 Performance Measure and Model Parameters The success in constraining the spread of nwom is measured with the number of prevented negative activations (PNA), which is the total number of nodes that are not activated negatively when a counteraction has been performed; but would had otherwise been activated negatively if a counteraction had not been performed. The latter condition is tested by running the same diffusion process (based on the model presented in Section 3.3.) with and without the use of a seed that implements the counteraction by propagating pwom. To simplify the presentation, we present PNA as a percentage of the total number of nodes that are activated negatively if counter-campaign does not take place. Thus, a PNA value of x% means that the counteraction managed to save x% of the negative activations that would have happened. Evidently, higher values of PNA correspond to a more successful counteraction. The examined values of the parameters of this model are set as follows: Inherent preference of users in the network follows Beta-distribution Beta(α,β) with α = 2 and β = 2. This corresponds to the most natural case of preference distribution in social networks, where most users are quite neutral to the propagated piece of information but there are some users with rather positive attitude and some with rather negative attitude. When assigning inherent preferences to users, we take into account the homophily principle, which states that individuals tend to socially relate to others with similar tastes and preferences. As a consequence, individual preferences correlate between people connected by social ties (Peres, Muller and Mahajan, 2010). In our case, we assume that users connected to each other will have similar inherent preferences, for example, negative, positive, or rather neutral. However, we do not implement a pure homophily structure, but we instead assume that with some probability (in our case 30%) a neighbor of the user will have different or opposite inherent preference. This is used because in reality pure homophily is expected to be rare. Negative seed set size is set to be 1% of the total number of nodes. Negative seeds are the nodes that initiate the spread of nwom by the firestorm. They are selected randomly among the top 3% of the most central nodes (according to Eigenvector centrality). This corresponds to a challenging case, because it allows the firestorm to have a major impact. Positive seed set size corresponds to the number of nodes that will be positively activated and start the spread of pwom as counteraction to the firestorm. Naturally, the bigger the seed set size, the more expensive the counter-campaign is for the company (see discussion about this cost in Section 3.1). We examined a range from 0.6% to 5% and the default value was selected to be 2%. Twenty Second European Conference on Information Systems, Tel Aviv

11 Delay shows how many nodes have to become activated negatively before the positive seed set becomes activated. This delay shows how quick is the reaction to the firestorm, with 0% being the immediate reaction after the firestorm gets noticed. We examined the range from 0% to 30% of all nodes of the network and the default value is set to 1%. Stopping probability is used to model the behavior of nodes that are positively activated but do not always try to activate their neighbors (see Section 3.3). When stopping probability is equal to x%, it means that x% of the positively activated users do not try to activate their neighbors. We examined the range from 0% to 95% and the default value is set to be 50%. Exclusion is used to exclude some percentage of top central nodes from being included in the positive seed. This is done because the nodes with highest centrality scores (the most important/pronounces users of the network) are often difficult and expensive to activate, as was described in the case of the third disadvantage of global centrality scores in Section 3.2. Therefore, through this kind of exclusion, we wanted to see how global and local (proposed) centrality scores are affected when they are faced with the challenge of not having available the involvement of the nodes with highest centrality. When exclusion is equal to x%, it means that x% of the nodes with highest Eigenvector centrality cannot be used in the positive seed set. We examined the range from 0% to 20% and the default is set to 1%. (We have to note that the Eigenvector centrality scores are distributed in a rather skewed manner and the top 1% contains the vast majority of the important nodes.) Negativity bias is set to 0.01 which brings a small shift of the network towards negativity, without eliminating the chances of pwom being diffused in the network. The decision to use these values for parameters was made after a careful and thorough examination of results. The selected values correspond to meaningful cases where there is a possibility of firestorms to emerge (i.e., nwom can be effectively spread) and pwom can also become effective in activating nodes. Outside of the selected parameter ranges it becomes either unrealistically difficult or easy for propagation (positive or/and negative) to occur. 5 Results In this section we compare the performance of global Eigenvector centrality score against its local counterpart proposed in Section 3.2. Each series of experiments takes one of the parameters and varies it whilst other parameters remain default. Since the diffusion processes with the extended IC model have a probabilistic element, each experiment is repeated 10,000 times and the average PNA values are reported. Overall in all of the experiments, local centrality outperforms global one. In the first series of experiments the impact of positive seed set size is examined. Seed set size varies from 0.6% to 5% of the total number of users in the network. The results of the experiment are presented in Figure 2(a). They show that with small seed set size of 0.6% both scores show similar results by preventing about 7% of negative activations. When the size of the seed set increases, PNA also increases; however, this increase is more pronounced in case of local centrality relatively to the global centrality score. At the same time we are witnessing diminishing return, i.e., the increase in seed set size does not lead to the same increase in PNA, which means that counteractions that involve very large seed sets may not be paying off. In the next series of experiments, we examine the impact of the delay with which the counteraction starts. The results are presented in Figure 2(b) and show that fast response gives much better results for both methods. However, the local centrality score performs better and, thus, can offer a competitive advantage in cases where some delay in the counteraction is unavoidable, e.g. when the firestorm has not been timely monitored. The third series of experiments examines the impact that stopping probability (Section 4.2) has on the performance of both the global and local centrality scores. The results shown in Figure 2(c) Twenty Second European Conference on Information Systems, Tel Aviv

12 demonstrate that, as expected, the performance of both scores decreases gradually with increase of the stopping probability. However, even for large values of stopping probability, the proposed local centrality score outperforms the global centrality score, which indicates that it is more suitable even in challenging cases where the vast majority of users in a social network is not willing to engage in the spread of pwom. PNA (%) Eigenvector centrality PNA (%) Localized Eigenvector centrality Positive seed set size (%) (a) Delay (%) (b) PNA (%) PNA (%) Figure Stopping probability (%) (c) Number of prevented negative activations (PNA) as percentage of all negative activations vs. different parameters. Results for global centrality are presented with dotted line and local centrality with solid line. The final series of experiments examines the impact of the exclusion of nodes with top centrality scores from the positive seed set (see Section 4.2). The results are presented in Figure 2(d) and they show that the local centrality score performs better than its global counterpart. More importantly, the difference in their relative PNA values increases with increasing exclusion: for 0% exclusion global centrality saves 23.2% negative activations whilst local centrality saves 25.8%, but for 20% exclusion PNA become 7.7% and 12.6% respectively. Therefore, in the cases where it is not possible to involve almost any central nodes in the counteraction, the local centrality score performs much better than the global centrality score, and as described in Section 3.2 it avoids the disadvantage of being dependant on the availability of the globally central nodes Exclusion (%) (d) Twenty Second European Conference on Information Systems, Tel Aviv

13 6 Conclusions We investigated the social-media phenomenon of online firestorms, which are a consequence of the susceptibility to negative word-of-mouth that companies and organizations suffer because of opening their social media channels to the crowds (Hennig-Thurau et al., 2010). We examined the seedselection problem in the context of firestorms, which asks for a method of finding users in an online social network that will initiate the spread of positive word-of-mouth in order to prevent many other users from becoming affected by the negative word-of-mouth that is being spread during the firestorm. Our method is based on local centrality, where the seeds are being selected by analyzing the centrality scores not globally, i.e., based on the entire structure of the social network, but locally, i.e., according to their relation to the users that have been already affected by the negative word-of-mouth. Experimental results showed that the proposed approach performs better and more stable in restricting the spread of firestorms. Moreover, they showed that although factors, such as the delay in the reaction to a firestorm or the unwillingness of rest users to spread further pwom represent crucial challenges, the proposed method achieves relatively better performance as with respect to these challenges. There are some important managerial implications from our study: First, the proposed method can allow managers to develop more successful counteractions to firestorms, by utilizing social network analytics (in the form of centrality scores) based on information about the structure of a social network. Such information is in general available, and thus the proposed method avoids the use of critical data that may violate the privacy of users (such as data needed to specify influence factors in several existing related works). The use of social network analysis for studying social media phenomena is an emerging topic of interest both in research and practice, and our study follows this direction. Second, the extended model of information diffusion (Section 3.3), which considers many factors related to firestorms, can offer managers insights that can bring business value, by answering questions such as: What is the impact of users inherent preferences?, What is the effect of the size of the seed set and up to which point the involvement of more seeds does not pay off?, or up to which delay it is not possible any more to perform a counteraction to a firestorm?. Such questions can be studied by testing several combinations of the parameters of the model, in order to help managers examine in advance several different scenarios towards the preparation of counteractions. Our work, however, has some limitations. We consider a static network, whereas social networks are dynamic. We plan to extend our study to include dynamic changes that will need updating of centrality scores. Another limitation is that we assume complete identification of negatively affected nodes. Some communications stay private and, additionally, sentiment-analysis tools might fail to recognize several negatively affected nodes. We plan to extend our work, by enabling partial knowledge of negative spread. We also intend to investigate additional methods of measuring local centrality, such Markov centrality and Shortest paths (White and Smyth, 2003). Finally, we will extend the proposed model to include the possibility of a node to change its state (i.e., non-progressive diffusion). Acknowledgements Work supported by Katholische Universität Eichstätt-Ingolstadt with the PRO FORschung (PROFOR) project Innovative Campaign Management System for Viral Marketing in Social Networks. Reference Ahluwalia, R. (2000). Examination of Psychological Processes Underlying Resistance to Persuasion. Journal of Consumer Research 27 (2), Aral, S., Muchnik, L. and Sundararajan, A. (2013). Engineering social contagions: Optimal network seeding in the presence of homophily. Network Science, 1(02), Twenty Second European Conference on Information Systems, Tel Aviv

14 Bharathi, S., Kempe, D., and Salek, M. (2007). Competitive influence maximization in social networks. Internet and Network Economics, Bhattacharya, C. B. and Sen, S. (2004). Doing Better at Doing Good: When, Why, and How Consumers Respond to Corporate Social Initiatives. California Management Review, 47(1), Borgatti, S. P. and Everett, M. G. (2006). A graph-theoretic perspective on centrality. Social networks, 28(4), Borgatti, S. P. (2005). Centrality and network flow. Social networks, 27(1), Budak, C., Agrawal, D. and El Abbadi, A. (2011). Limiting the spread of misinformation in social networks. In Proceedings of the 20th international conference on World Wide Web, Carnes, T., Nagarajan, C., Wild, S. and Zuylen, A. (2007). Maximizing influence in a competitive social network: a follower s perspective. Proceedings of the ninth international conference on Electronic commerce, Cha, M., Mislove, A. and Gummadi, K. (2009). A measurement-driven analysis of information propagation in the flickr social network. Proceedings of the 18th international conference on World wide web. WWW '09, Liu, Z., Rincon, D., Sun, X., Wang, Y., Wei, W. and Yuan, Y. (2011). Influence Maximization in Social Networks When Negative Opinions May Emerge and Propagate. In SDM, Fang, X., Hu, P., Li, Z. and Tsai, W. (2013). Predicting adoption probabilities in social networks. Information Systems Research, 24(1), Goyal, A., Bonchi, F. and Lakshmanan, L. V. (2012). A data-based approach to social influence maximization. In Proceedings of the VLDB Endowment, 5 (1), Goyal, S. and Kearns, M. (2012). Competitive contagion in networks. Proceedings of the 44th symposium on Theory of Computing, He, X., Song, G., Chen, W. and Jiang, Q. (2012). Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model. In SDM, Hennig-Thurau, T., Malthouse, E. C., Friege, C., Gensler, S., Lobschat, L., Rangaswamy, A., and Skiera, B. (2010). The Impact of New Media on Customer Relationships. Journal of Service Research, 13(3), Hinz, O., Skiera, B., Barrot, C. and Becker, J. U. (2011). Seeding strategies for viral marketing: An empirical comparison. Journal of Marketing, 75(6), Kempe, D., Kleinberg, J. and Tardos, É. (2003). Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD international conference on Knowledge discovery and data mining, Mochalova, A. and Nanopoulos, A. (2013). On the Role of Centrality in Information Diffusion in Social Networks. In Proceedings of the 21th European Conference on Information Systems (ECIS2013). Newman, M. E. J. (2010). Networks: An Introduction. Oxford, UK: Oxford University Press. Nguyen, N., Yan, G., Thai, M. and Eidenbenz, S. (2012). Containment of misinformation spread in online social networks. Proceedings of the 3rd Annual ACM Web Science Conference, Pang, B. and Lee, L. (2008). Opinion mining and sentiment analysis. Foundations and trends in information retrieval, 2(1-2), Peres, R., Muller, E. and Mahajan, V. (2010). Innovation diffusion and new product growth models: A critical review and research directions. International Journal of Research in Marketing, 27(2), Pfeffer, J., Zorbach, T. and Carley, K. M. (2013). Understanding online firestorms : Negative word-ofmouth dynamics in social media networks. Journal of Marketing Communications, Probst, F., Grosswiele, L. and Pfleger, R. (2013). Who will lead and who will follow: Identifying Influential Users in Online Social Networks. Business & Information Systems Engineering, 5(3), Richins, Marsha L. (1984). Word of Mouth Communication as Negative Information. Advances in Consumer Research, 11, Twenty Second European Conference on Information Systems, Tel Aviv

Reaction Paper Influence Maximization in Social Networks: A Competitive Perspective

Reaction Paper Influence Maximization in Social Networks: A Competitive Perspective Reaction Paper Influence Maximization in Social Networks: A Competitive Perspective Siddhartha Nambiar October 3 rd, 2013 1 Introduction Social Network Analysis has today fast developed into one of the

More information

Influence diffusion dynamics and influence maximization in complex social networks. Wei Chen 陈卫 Microsoft Research Asia

Influence diffusion dynamics and influence maximization in complex social networks. Wei Chen 陈卫 Microsoft Research Asia Influence diffusion dynamics and influence maximization in complex social networks Wei Chen 陈卫 Microsoft Research Asia 1 (Social) networks are natural phenomena 2 Booming of online social networks 3 Opportunities

More information

Time Optimal Profit Maximization in a Social Network

Time Optimal Profit Maximization in a Social Network Time Optimal Profit Maximization in a Social Network Yong Liu, Wei Zhang Hei Long Jiang University China liuyong001@hlju.edu.cn 149275442@qq.com ABSTRACT: Influence maximization aims to seek k nodes from

More information

AN APPROACH TO APPROXIMATE DIFFUSION PROCESSES IN SOCIAL NETWORKS

AN APPROACH TO APPROXIMATE DIFFUSION PROCESSES IN SOCIAL NETWORKS Association for Information Systems AIS Electronic Library (AISeL) UK Academy for Information Systems Conference Proceedings 2010 UK Academy for Information Systems Spring 3-23-2010 AN APPROACH TO APPROXIMATE

More information

Efficient Influence Maximization in Social Networks

Efficient Influence Maximization in Social Networks Efficient Influence Maximization in Social Networks Presented by WAN, Pengfei Dept. ECE, HKUST Wei Chen, et al, Efficient Influence Maximization in Social Networks, KDD09 OUTLINE Problem Previous Work

More information

Influence Maximization on Social Graphs. Yu-Ting Wen

Influence Maximization on Social Graphs. Yu-Ting Wen Influence Maximization on Social Graphs Yu-Ting Wen 05-25-2018 Outline Background Models of influence Linear Threshold Independent Cascade Influence maximization problem Proof of performance bound Compute

More information

Homophily and Influence in Social Networks

Homophily and Influence in Social Networks Homophily and Influence in Social Networks Nicola Barbieri nicolabarbieri1@gmail.com References: Maximizing the Spread of Influence through a Social Network, Kempe et Al 2003 Influence and Correlation

More information

A Survey on Influence Analysis in Social Networks

A Survey on Influence Analysis in Social Networks A Survey on Influence Analysis in Social Networks Jessie Yin 1 Introduction With growing popularity of Web 2.0, recent years have witnessed wide-spread adoption of rich social media applications such as

More information

SOCIAL MEDIA MINING. Behavior Analytics

SOCIAL MEDIA MINING. Behavior Analytics SOCIAL MEDIA MINING Behavior Analytics Dear instructors/users of these slides: Please feel free to include these slides in your own material, or modify them as you see fit. If you decide to incorporate

More information

Targeting Individuals to Catalyze Collective Action in Social Networks

Targeting Individuals to Catalyze Collective Action in Social Networks Targeting Individuals to Catalyze Collective Action in Social Networks Marco A. Janssen 1 1 Center for the Study of Institutional Diversity School of Human Evolution and Social Change Arizona State University

More information

Models and Algorithms for Social Influence Analysis Jimeng Sun and Jie Tang

Models and Algorithms for Social Influence Analysis Jimeng Sun and Jie Tang Models and Algorithms for Social Influence Analysis Jimeng Sun and Jie Tang IBM TJ Watson Research Center Tsinghua University 1 Social Networks Facebook has over 900 million users the 3 rd largest Country

More information

Group #2 Project Final Report: Information Flows on Twitter

Group #2 Project Final Report: Information Flows on Twitter Group #2 Project Final Report: Information Flows on Twitter Huang-Wei Chang, Te-Yuan Huang 1 Introduction Twitter has become a very popular microblog website and had attracted millions of users up to 2009.

More information

ECS 253 / MAE 253, Lecture 13 May 10, I. Games on networks II. Diffusion, Cascades and Influence

ECS 253 / MAE 253, Lecture 13 May 10, I. Games on networks II. Diffusion, Cascades and Influence ECS 253 / MAE 253, Lecture 13 May 10, 2016 I. Games on networks II. Diffusion, Cascades and Influence Summary of spatial flows and games Optimal location of facilities to maximize access for all. Designing

More information

The effect of Product Ratings on Viral Marketing CS224W Project proposal

The effect of Product Ratings on Viral Marketing CS224W Project proposal The effect of Product Ratings on Viral Marketing CS224W Project proposal Stefan P. Hau-Riege, stefanhr@stanford.edu In network-based marketing, social influence is considered in order to optimize marketing

More information

Predicting ratings of peer-generated content with personalized metrics

Predicting ratings of peer-generated content with personalized metrics Predicting ratings of peer-generated content with personalized metrics Project report Tyler Casey tyler.casey09@gmail.com Marius Lazer mlazer@stanford.edu [Group #40] Ashish Mathew amathew9@stanford.edu

More information

Cascading Behavior in Networks. Anand Swaminathan, Liangzhe Chen CS /23/2013

Cascading Behavior in Networks. Anand Swaminathan, Liangzhe Chen CS /23/2013 Cascading Behavior in Networks Anand Swaminathan, Liangzhe Chen CS 6604 10/23/2013 Outline l Diffusion in networks l Modeling diffusion through a network l Diffusion, Thresholds and role of Weak Ties l

More information

Influence Maximization across Partially Aligned Heterogenous Social Networks

Influence Maximization across Partially Aligned Heterogenous Social Networks Influence Maximization across Partially Aligned Heterogenous Social Networks Qianyi Zhan 1, Jiawei Zhang 2, Senzhang Wang 3, Philip S. Yu 2,4, and Junyuan Xie 1 1 National Laboratory for Novel Software

More information

ENERGY SAVING INFORMATION CASCADES IN ONLINE SOCIAL NETWORKS: AN AGENT-BASED SIMULATION STUDY. Qi Wang John E. Taylor

ENERGY SAVING INFORMATION CASCADES IN ONLINE SOCIAL NETWORKS: AN AGENT-BASED SIMULATION STUDY. Qi Wang John E. Taylor Proceedings of the 2013 Winter Simulation Conference R. Pasupathy, S.-H. Kim, A. Tolk, R. Hill, and M. E. Kuhl, ed ENERGY SAVING INFORMATION CASCADES IN ONLINE SOCIAL NETWORKS: AN AGENT-BASED SIMULATION

More information

Identifying Peer Influence in Massive Online Social Networks: A Platform for Randomized Experimentation on Facebook

Identifying Peer Influence in Massive Online Social Networks: A Platform for Randomized Experimentation on Facebook Identifying Peer Influence in Massive Online Social Networks: Sinan Aral NYU Stern School of Business and MIT, 44 West 4 th Street Room: 8-81, New York, NY 10012 sinan@stern.nyu.edu Dylan Walker NYU Stern

More information

From Individual Behavior to Influence Networks: A Case Study on Twitter

From Individual Behavior to Influence Networks: A Case Study on Twitter From Individual Behavior to Influence Networks: A Case Study on Twitter Arlei Silva, Hérico Valiati, Sara Guimarães, Wagner Meira Jr. Universidade Federal de Minas Gerais Computer Science Department Belo

More information

Influence Maximization-based Event Organization on Social Networks

Influence Maximization-based Event Organization on Social Networks Influence Maximization-based Event Organization on Social Networks Cheng-Te Li National Cheng Kung University, Taiwan chengte@mail.ncku.edu.tw 2017/9/18 2 Social Event Organization You may want to plan

More information

Identifying Influencers from Sampled Social Networks

Identifying Influencers from Sampled Social Networks Identifying Influencers from Sampled Social Networks Sho Tsugawa a,, Kazuma Kimura a a Graduate School of Systems and Information Engineering, University of Tsukuba, 1 1 1 Tennodai, Tsukuba, Ibaraki 35

More information

PREDICTING VIRAL MARKETING PROPAGATING EFFICIENCY WITHIN GIVEN DEADLINE

PREDICTING VIRAL MARKETING PROPAGATING EFFICIENCY WITHIN GIVEN DEADLINE PREDICTING VIRAL MARKETING PROPAGATING EFFICIENCY WITHIN GIVEN DEADLINE Li Yu, School of Information, Renmin University of China, Beijing, P.R.China, buaayuli@ruc.edu.cn (corresponding author) Nan Wang,

More information

Centrality Measures, Upper Bound, and Influence Maximization in Large Scale Directed Social Networks

Centrality Measures, Upper Bound, and Influence Maximization in Large Scale Directed Social Networks Fundamenta Informaticae 130 (2014) 317 342 317 DOI 10.3233/FI-2014-994 IOS Press Centrality Measures, Upper Bound, and Influence Maximization in Large Scale Directed Social Networks Sankar K. Pal, Suman

More information

Identifying influencers in a social network: the value of real referral data

Identifying influencers in a social network: the value of real referral data Identifying influencers in a social network: the value of real referral data I. Roelens a,b,1, P. Baecke b, D.F. Benoit a a Ghent University, Faculty of Economics and Business Administration, Tweekerkenstraat

More information

Do Ads Compete or Collaborate? Designing Click Models with Full Relationship Incorporated

Do Ads Compete or Collaborate? Designing Click Models with Full Relationship Incorporated Do s Compete or Collaborate? Designing Click Models with Full Relationship Incorporated Xin Xin School of Computer Science Beijing Institute of Technology xxin@bit.edu.cn Michael R. Lyu The Chinese University

More information

Towards Effective and Efficient Behavior-based Trust Models. Klemens Böhm Universität Karlsruhe (TH)

Towards Effective and Efficient Behavior-based Trust Models. Klemens Böhm Universität Karlsruhe (TH) Towards Effective and Efficient Behavior-based Trust Models Universität Karlsruhe (TH) Motivation: Grid Computing in Particle Physics Physicists have designed and implemented services specific to particle

More information

Estimating the Impact of User Personality Traits on electronic Word-of-Mouth Text-mining Social Media Platforms

Estimating the Impact of User Personality Traits on electronic Word-of-Mouth Text-mining Social Media Platforms Estimating the Impact of User Personality Traits on electronic Word-of-Mouth Text-mining Social Media Platforms Panos Adamopoulos Goizueta Business School Emory University padamop@emory.edu Anindya Ghose

More information

The use of infection models in accounting and crediting

The use of infection models in accounting and crediting Challenges for Analysis of the Economy, the Businesses, and Social Progress Péter Kovács, Katalin Szép, Tamás Katona (editors) - Reviewed Articles The use of infection models in accounting and crediting

More information

Organization Strategy and Products Based on Technical Standards

Organization Strategy and Products Based on Technical Standards Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004 Organization Strategy and Products Based on Technical

More information

Final Report Evaluating Social Networks as a Medium of Propagation for Real-Time/Location-Based News

Final Report Evaluating Social Networks as a Medium of Propagation for Real-Time/Location-Based News Final Report Evaluating Social Networks as a Medium of Propagation for Real-Time/Location-Based News Mehmet Ozan Kabak, Group Number: 45 December 10, 2012 Abstract This work is concerned with modeling

More information

Can Cascades be Predicted?

Can Cascades be Predicted? Can Cascades be Predicted? Rediet Abebe and Thibaut Horel September 22, 2014 1 Introduction In this presentation, we discuss the paper Can Cascades be Predicted? by Cheng, Adamic, Dow, Kleinberg, and Leskovec,

More information

Behavioral Data Mining. Lecture 22: Network Algorithms II Diffusion and Meme Tracking

Behavioral Data Mining. Lecture 22: Network Algorithms II Diffusion and Meme Tracking Behavioral Data Mining Lecture 22: Network Algorithms II Diffusion and Meme Tracking Once upon a time Once upon a time Approx 1 MB Travels ~ 1 hour, B/W = 3k b/s News Today, the total news available from

More information

Hierarchical Influence Maximization for Advertising in Multi-agent Markets

Hierarchical Influence Maximization for Advertising in Multi-agent Markets Hierarchical Influence Maximization for Advertising in Multi-agent Markets Mahsa Maghami Department of EECS University of Central Florida Orlando, Florida USA Email: mmaghami@cs.ucf.edu Gita Sukthankar

More information

Measuring User Influence on Twitter Using Modified K-Shell Decomposition

Measuring User Influence on Twitter Using Modified K-Shell Decomposition Measuring User Influence on Twitter Using Modified K-Shell Decomposition Philip E. Brown Junlan Feng AT&T Labs - Research, United States philbrown@att.com junlan@research.att.com Abstract Social influence

More information

Influence Diffusion and Optimization in Online Social Networks. De-Nian Yang Academia Sinica

Influence Diffusion and Optimization in Online Social Networks. De-Nian Yang Academia Sinica Influence Diffusion and Optimization in Online Social Networks De-Nian Yang Academia Sinica Facebook 890 million daily active users on average in December 2014 (Facebook) 1.19 billion monthly active users

More information

Influence of First Steps in a Community on Ego-Network: Growth, Diversity, and Engagement

Influence of First Steps in a Community on Ego-Network: Growth, Diversity, and Engagement Influence of First Steps in a Community on Ego-Network: Growth, Diversity, and Engagement Atef Chaudhury University of Waterloo Waterloo, ON N2L 3G1, Canada a29chaud@uwaterloo.ca Myunghwan Kim LinkedIn

More information

Predictive Modeling of Opinion and Connectivity Dynamics in. Social Networks

Predictive Modeling of Opinion and Connectivity Dynamics in. Social Networks Predictive Modeling of Opinion and Connectivity Dynamics in Social Networks Ajay Saini Abstract Social networks have been extensively studied in recent years with the aim of understanding how the connectivity

More information

Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks

Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks Feng Wang, Haiyan Wang, Kuai Xu Arizona State University Email: {fwang5, haiyan.wang, kuai.xu}@asu.edu Abstract

More information

Inferring Social Ties across Heterogeneous Networks

Inferring Social Ties across Heterogeneous Networks Inferring Social Ties across Heterogeneous Networks CS 6001 Complex Network Structures HARISH ANANDAN Introduction Social Ties Information carrying connections between people It can be: Strong, weak or

More information

DIFFUSION OF THE INTERNET HOSTS

DIFFUSION OF THE INTERNET HOSTS Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2002 Proceedings Americas Conference on Information Systems (AMCIS) December 2002 DIFFUSION OF THE INTERNET HOSTS Yi-Cheng Ku Fortune

More information

MADVERTISER: A SYSTEM FOR MOBILE ADVERTISING IN MOBILE PEER-TO-PEER ENVIRONMENTS

MADVERTISER: A SYSTEM FOR MOBILE ADVERTISING IN MOBILE PEER-TO-PEER ENVIRONMENTS Association for Information Systems AIS Electronic Library (AISeL) PACIS 2014 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2014 MADVERTISER: A SYSTEM FOR MOBILE ADVERTISING IN MOBILE

More information

But, there is a difference in the diffusion of Innovations/Information Infections People

But, there is a difference in the diffusion of Innovations/Information Infections People Diffusion of Innovations Diffusion is the process by which an Innovation is Communicated through certain Channels over Time among the members of a Social System. Source: The Diffusion of Innovations Model

More information

Value-Focused Assessment of Information System Security in Organizations

Value-Focused Assessment of Information System Security in Organizations Association for Information Systems AIS Electronic Library (AISeL) ICIS 2001 Proceedings International Conference on Information Systems (ICIS) 12-31-2001 Value-Focused Assessment of Information System

More information

Final Report: Local Structure and Evolution for Cascade Prediction

Final Report: Local Structure and Evolution for Cascade Prediction Final Report: Local Structure and Evolution for Cascade Prediction Jake Lussier (lussier1@stanford.edu), Jacob Bank (jbank@stanford.edu) December 10, 2011 Abstract Information cascades in large social

More information

Final Report: Local Structure and Evolution for Cascade Prediction

Final Report: Local Structure and Evolution for Cascade Prediction Final Report: Local Structure and Evolution for Cascade Prediction Jake Lussier (lussier1@stanford.edu), Jacob Bank (jbank@stanford.edu) ABSTRACT Information cascades in large social networks are complex

More information

Direct Marketing on a Social Network

Direct Marketing on a Social Network Direct Marketing on a Social Network Peter Pal Zubcsek and Miklos Sarvary 1 September 1, 2009 1 Peter Pal Zubcsek is Ph.D. Candidate and Miklos Sarvary is Professor of Marketing at INSEAD, Bd. de Constance,

More information

The Science of Social Media. Kristina Lerman USC Information Sciences Institute

The Science of Social Media. Kristina Lerman USC Information Sciences Institute The Science of Social Media Kristina Lerman USC Information Sciences Institute ML meetup, July 2011 What is a science? Explain observed phenomena Make verifiable predictions Help engineer systems with

More information

Me Too 2.0: An Analysis of Viral Retweets on the Twittersphere

Me Too 2.0: An Analysis of Viral Retweets on the Twittersphere Me Too 2.0: An Analysis of Viral Retweets on the Twittersphere Rio Akasaka Department of Computer Science rio@cs.stanford.edu Patrick Grafe Department of Computer Science pgrafe@stanford.edu Makoto Kondo

More information

Personalized Shopping App with Customer Feedback Mining and Secure Transaction

Personalized Shopping App with Customer Feedback Mining and Secure Transaction Personalized Shopping App with Customer Feedback Mining and Secure Transaction Swati H. Kalmegh, Nutan Dhande Mtech Student, Department of CSE, swatihkalmegh@gmail.com Contact No. 9404725175 Abstract Reputation-based

More information

Lecture 18: Toy models of human interaction: use and abuse

Lecture 18: Toy models of human interaction: use and abuse Lecture 18: Toy models of human interaction: use and abuse David Aldous November 2, 2017 Network can refer to many different things. In ordinary language social network refers to Facebook-like activities,

More information

IT S NOT ROCKET SCIENCE: Digital Marketing for Today s Hearing Healthcare Practice

IT S NOT ROCKET SCIENCE: Digital Marketing for Today s Hearing Healthcare Practice IT S NOT ROCKET SCIENCE: Digital Marketing for Today s Hearing Healthcare Practice In the business world, space is no longer the final frontier. For now, that title belongs to the Internet. As beneficial

More information

New Models for Competitive Contagion

New Models for Competitive Contagion New Models for Competitive Contagion Moez Draief Electrical and Electronic Engineering Imperial College m.draief@imperial.ac.uk Hoda Heidari Computer and Information Science University of Pennsylvania

More information

EMPIRICAL STUDY OF FACTORS AFFECTING VIRAL MARKETING

EMPIRICAL STUDY OF FACTORS AFFECTING VIRAL MARKETING EMPIRICAL STUDY OF FACTORS AFFECTING VIRAL MARKETING Dr. Arvinder Kour Humanities Department, YCCE, Wanadongri, Nagpur Abstract The present study has strived to trace the factors responsible for facilitating

More information

Co-evolution of Social and Affiliation Networks

Co-evolution of Social and Affiliation Networks Co-evolution of Social and Affiliation Networks Elena Zheleva Dept. of Computer Science University of Maryland College Park, MD 20742, USA elena@cs.umd.edu Hossam Sharara Dept. of Computer Science University

More information

Final Project - Social and Information Network Analysis

Final Project - Social and Information Network Analysis Final Project - Social and Information Network Analysis Factors and Variables Affecting Social Media Reviews I. Introduction Humberto Moreira Rajesh Balwani Subramanyan V Dronamraju Dec 11, 2011 Problem

More information

arxiv: v2 [cs.gt] 7 Feb 2011

arxiv: v2 [cs.gt] 7 Feb 2011 Incentive Compatible Influence Maximization in Social Networks and Application to Viral Marketing Mayur Mohite and Y. Narahari July 27, 208 arxiv:02.098v2 [cs.gt] 7 Feb 20 Abstract Information diffusion

More information

CONTEMPORARY MARKETING

CONTEMPORARY MARKETING CONTEMPORARY MARKETING REFLECTIVE ACCOUNT The Big Debate Motion: The Problems Caused by Social Media Outweigh the Benefits to Marketers K1118972 1 P a g e I am Against the motion that The Problems Caused

More information

Containment of Misinformation Spread in Online Social Networks

Containment of Misinformation Spread in Online Social Networks Containment of Misinformation Spread in Online Social Networks Nam P. Nguyen 1,2, Guanhua Yan 2, My T. Thai 1, Stephan Eidenbenz 2 1 Department of Computer and Information Science and Engineering, University

More information

Impact of Social Media on Purchasing Decision of Consumerwith Special Reference to Lahore, Pakistan

Impact of Social Media on Purchasing Decision of Consumerwith Special Reference to Lahore, Pakistan Research & Reviews: Journal of Social Sciences www.rroij.com Impact of Social Media on Purchasing Decision of Consumerwith Special Reference to Lahore, Pakistan Muhammad Yasir Rafiq 1 and Abdullah Malik

More information

A Query Mechanism for Influence Maximization on Specific Users in Social Networks

A Query Mechanism for Influence Maximization on Specific Users in Social Networks A Query Mechanism for Influence Maximization on Specific Users in Social Networks Sneha Chandrakant More 1, Pramod Patil 2 M.E Student, Department of Computer Engineering, Nutan Maharashtra Institute of,

More information

Research on We Chat Matrix Marketing Process of E-commerce Enterprises Based on AISAS Model

Research on We Chat Matrix Marketing Process of E-commerce Enterprises Based on AISAS Model 2017 International Conference on Arts and Design, Education and Social Sciences (ADESS 2017) ISBN: 978-1-60595-511-7 Research on We Chat Matrix Marketing Process of E-commerce Enterprises Based on AISAS

More information

MIB605- Lecture 4 Technology and Online Community How technologies change information flow and social interactions?

MIB605- Lecture 4 Technology and Online Community How technologies change information flow and social interactions? MIB605- Lecture 4 Technology and Online Community How technologies change information flow and social interactions? Prof. Cui Internet Communication Technology 1 What you learned from other classes need

More information

The Interaction-Interaction Model for Disease Protein Discovery

The Interaction-Interaction Model for Disease Protein Discovery The Interaction-Interaction Model for Disease Protein Discovery Ken Cheng December 10, 2017 Abstract Network medicine, the field of using biological networks to develop insight into disease and medicine,

More information

UTILIZING THE POSITIVE IMPACTS OF SOFTWARE PIRACY IN MONOPOLY INDUSTRIES

UTILIZING THE POSITIVE IMPACTS OF SOFTWARE PIRACY IN MONOPOLY INDUSTRIES UTILIZING THE POSITIVE IMPACTS OF SOFTWARE PIRACY IN MONOPOLY INDUSTRIES Jue Wang Department of Information Technology George Mason University 4400 University Drive Fairfax, VA, USA jwangi@masonlive.gmu.edu

More information

Jure Leskovec, Computer Science, Stanford University

Jure Leskovec, Computer Science, Stanford University Jure Leskovec, Computer Science, Stanford University Includes joint work with Jaewon Yang, Manuel Gomez- Rodriguez, Andreas Krause, Lars Backstrom and Jon Kleinberg. Information reaches us by personal

More information

HybridRank: Ranking in the Twitter Hybrid Networks

HybridRank: Ranking in the Twitter Hybrid Networks HybridRank: Ranking in the Twitter Hybrid Networks Jianyu Li Department of Computer Science University of Maryland, College Park jli@cs.umd.edu ABSTRACT User influence in social media may depend on multiple

More information

Eyal Carmi. Google, 76 Ninth Avenue, New York, NY U.S.A. Gal Oestreicher-Singer and Uriel Stettner

Eyal Carmi. Google, 76 Ninth Avenue, New York, NY U.S.A. Gal Oestreicher-Singer and Uriel Stettner RESEARCH NOTE IS OPRAH CONTAGIOUS? THE DEPTH OF DIFFUSION OF DEMAND SHOCKS IN A PRODUCT NETWORK Eyal Carmi Google, 76 Ninth Avenue, New York, NY 10011 U.S.A. {eyal.carmi@gmail.com} Gal Oestreicher-Singer

More information

InfluenceTracker: Rating the impact of a Twitter account

InfluenceTracker: Rating the impact of a Twitter account InfluenceTracker: Rating the impact of a Twitter account Gerasimos Razis, Ioannis Anagnostopoulos Computer Science and Biomedical Informatics Dpt., University of Thessaly {razis, janag}@dib.uth.gr Abstract.

More information

A Theoretical Framework for Assessing Effects of User Generated Content on a Company s Marketing Outcomes

A Theoretical Framework for Assessing Effects of User Generated Content on a Company s Marketing Outcomes Association for Information Systems AIS Electronic Library (AISeL) CONF-IRM 2012 Proceedings International Conference on Information Resources Management (CONF-IRM) 5-2012 A Theoretical Framework for Assessing

More information

Social and Behavioural Techniques to Boost Awareness

Social and Behavioural Techniques to Boost Awareness Social and Behavioural Techniques to Boost Awareness Carlos Orozco Corona and John Austen argue that security awareness programmes work better when everyone is involved in the process. They outline a plan

More information

Sawtooth Software. Sample Size Issues for Conjoint Analysis Studies RESEARCH PAPER SERIES. Bryan Orme, Sawtooth Software, Inc.

Sawtooth Software. Sample Size Issues for Conjoint Analysis Studies RESEARCH PAPER SERIES. Bryan Orme, Sawtooth Software, Inc. Sawtooth Software RESEARCH PAPER SERIES Sample Size Issues for Conjoint Analysis Studies Bryan Orme, Sawtooth Software, Inc. 1998 Copyright 1998-2001, Sawtooth Software, Inc. 530 W. Fir St. Sequim, WA

More information

Pricing Strategies for Maximizing Viral Advertising in Social Networks

Pricing Strategies for Maximizing Viral Advertising in Social Networks Pricing Strategies for Maximizing Viral Advertising in Social Networks Bolei Zhang, Zhuzhong Qian, Wenzhong Li, and Sanglu Lu State Key Laboratory for Novel Software Technology Nanjing University zhangbolei@dislab.nju.edu.cn,

More information

computational social media lecture 03: tweeting

computational social media lecture 03: tweeting computational social media lecture 03: tweeting part 2 daniel gatica-perez 20.04.2018 this lecture a human-centric view of twitter 1. introduction 2. twitter users & uses 3. twitter-specific phenomena

More information

Public Advertisement Broker Markets.

Public Advertisement Broker Markets. Public Advertisement Broker Markets. Atish Das Sarma, Deeparnab Chakrabarty, and Sreenivas Gollapudi 1 College of Computing, Georgia Institute of Technology, Atlanta, GA 30332 0280. atish;deepc@cc.gatech.edu

More information

Jure Leskovec, Includes joint work with Jaewon Yang, Manuel Gomez Rodriguez, Andreas Krause, Lars Backstrom and Jon Kleinberg.

Jure Leskovec, Includes joint work with Jaewon Yang, Manuel Gomez Rodriguez, Andreas Krause, Lars Backstrom and Jon Kleinberg. Jure Leskovec, Stanford University Includes joint work with Jaewon Yang, Manuel Gomez Rodriguez, Andreas Krause, Lars Backstrom and Jon Kleinberg. Information reaches us by personal influence in our social

More information

Influencer Communities. Influencer Communities. Influencers are having many different conversations

Influencer Communities. Influencer Communities. Influencers are having many different conversations Influencer Communities Influencers are having many different conversations 1 1.0 Background A unique feature of social networks is that people with common interests are following (or friend-ing) similar

More information

Extensive Experimental Validation of a Personalized Approach for Coping with Unfair Ratings in Reputation Systems

Extensive Experimental Validation of a Personalized Approach for Coping with Unfair Ratings in Reputation Systems Extensive Experimental Validation of a Personalized Approach for Coping with Unfair Ratings in Reputation Systems Nanyang Technological University, School of Computer Engineering, zhangj@ntu.edu.sg Received

More information

Finding Compensatory Pathways in Yeast Genome

Finding Compensatory Pathways in Yeast Genome Finding Compensatory Pathways in Yeast Genome Olga Ohrimenko Abstract Pathways of genes found in protein interaction networks are used to establish a functional linkage between genes. A challenging problem

More information

Optimize Marketing Budget with Marketing Mix Model

Optimize Marketing Budget with Marketing Mix Model Optimize Marketing Budget with Marketing Mix Model Data Analytics Spreadsheet Modeling New York Boston San Francisco Hyderabad Perceptive-Analytics.com (646) 583 0001 cs@perceptive-analytics.com Executive

More information

Getting Started with Risk in ISO 9001:2015

Getting Started with Risk in ISO 9001:2015 Getting Started with Risk in ISO 9001:2015 Executive Summary The ISO 9001:2015 standard places a great deal of emphasis on using risk to drive processes and make decisions. The old mindset of using corrective

More information

Engagement Marketing. Take care of your company's brand by engaging potential clients

Engagement Marketing. Take care of your company's brand by engaging potential clients Engagement Marketing Take care of your company's brand by engaging potential clients TABLE OF CONTENTS 3 4 5 6 7 8 9 10 11 12 13 14 BUSINESS GOALS WOW EXPERIENCE - THE FIRST IMPRESSION NEWSLETTER EFFECTIVENESS

More information

Information vs Interaction: An Alternative User Ranking Model for Social Networks

Information vs Interaction: An Alternative User Ranking Model for Social Networks Information vs Interaction: An Alternative User Ranking Model for Social Networks Wei Xie, Emmy Hoang Ai Phuong, Feida Zhu and Ee-Peng Lim Singappre Management University, Singapore {wei.xie.202,aphoang.202,fdzhu,eplim}@smu.edu.sg

More information

Modeling the Opinion Dynamics of a Social Network

Modeling the Opinion Dynamics of a Social Network Modeling the Opinion Dynamics of a Social Network Third Annual PRIMES Conference Mentor: Dr. Natasha Markuzon May 19, 2013 Social Networks Consist of people, their opinions, and friendships People change

More information

Recent Development Trend of Electronic Commerce Research: 2000 to 2016

Recent Development Trend of Electronic Commerce Research: 2000 to 2016 Contemporary Management Research Pages 131-142, Vol. 13, No. 2, June 2017 doi:10.7903/cmr.17824 Recent Development Trend of Electronic Commerce Research: 2000 to 2016 Yann-Jy Yang Chihlee University of

More information

Application of an Improved Neural Network Algorithm in E- commerce Customer Satisfaction Evaluation

Application of an Improved Neural Network Algorithm in E- commerce Customer Satisfaction Evaluation Application of an Improved Neural Network Algorithm in E- commerce Customer Satisfaction Evaluation Lei Yang 1,2 *, Ying Ma 3 1 Science and Technology Key Laboratory of Hebei Province, Baoding 071051,

More information

Data-driven modelling of police route choice

Data-driven modelling of police route choice Data-driven modelling of police route choice Kira Kowalska *1, John Shawe-Taylor 2 and Paul Longley 3 1 Department of Security and Crime Science, University College London 2 Department of Computer Science,

More information

Word of Mouth Marketing through Online Social Networks

Word of Mouth Marketing through Online Social Networks Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2009 Proceedings Americas Conference on Information Systems (AMCIS) 2009 Word of Mouth Marketing through Online Social Networks

More information

SI Networks: Theory and Application, Fall 2008

SI Networks: Theory and Application, Fall 2008 University of Michigan Deep Blue deepblue.lib.umich.edu 2008-09 SI 508 - Networks: Theory and Application, Fall 2008 Adamic, Lada Adamic, L. (2008, November 12). Networks: Theory and Application. Retrieved

More information

Using Decision Tree to predict repeat customers

Using Decision Tree to predict repeat customers Using Decision Tree to predict repeat customers Jia En Nicholette Li Jing Rong Lim Abstract We focus on using feature engineering and decision trees to perform classification and feature selection on the

More information

Data Mining in CRM THE CRM STRATEGY

Data Mining in CRM THE CRM STRATEGY CHAPTER ONE Data Mining in CRM THE CRM STRATEGY Customers are the most important asset of an organization. There cannot be any business prospects without satisfied customers who remain loyal and develop

More information

Information Search Patterns on Product Comparison Services in ecommerce Websites

Information Search Patterns on Product Comparison Services in ecommerce Websites Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2005 Proceedings Americas Conference on Information Systems (AMCIS) 2005 Information Search Patterns on Product Comparison Services

More information

The Paradoxes of Social Data:

The Paradoxes of Social Data: The Paradoxes of Social Data: How Heterogeneity Distorts Information in Networks Kristina Lerman USC Information Sciences Institute http://www.isi.edu/~lerman Local vs Global The local and global views

More information

Chapter 2 Identifying Users and Their Tasks

Chapter 2 Identifying Users and Their Tasks Chapter 2 Identifying Users and Their Tasks 2.1 Defining the Scope and Objectives 2.1.1 Scope and Objectives The first step towards the introduction of a new social network is the definition of its scope

More information

Reaction Paper Regarding the Flow of Influence and Social Meaning Across Social Media Networks

Reaction Paper Regarding the Flow of Influence and Social Meaning Across Social Media Networks Reaction Paper Regarding the Flow of Influence and Social Meaning Across Social Media Networks Mahalia Miller Daniel Wiesenthal October 6, 2010 1 Introduction One topic of current interest is how language

More information

Building Strong Social Connections Increases Innovation Capability

Building Strong Social Connections Increases Innovation Capability Cornell University ILR School DigitalCommons@ILR Center for Advanced Human Resource Studies () 7-2012 Building Strong Social Connections Increases Innovation Capability Center for Advanced Human Resource

More information

Application of Decision Trees in Mining High-Value Credit Card Customers

Application of Decision Trees in Mining High-Value Credit Card Customers Application of Decision Trees in Mining High-Value Credit Card Customers Jian Wang Bo Yuan Wenhuang Liu Graduate School at Shenzhen, Tsinghua University, Shenzhen 8, P.R. China E-mail: gregret24@gmail.com,

More information

International Journal of Advance Engineering and Research Development. A Query Approach For Influence Maximization On Specific User In Social Network.

International Journal of Advance Engineering and Research Development. A Query Approach For Influence Maximization On Specific User In Social Network. Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 2, February -2017 e-issn (O): 2348-4470 p-issn (P): 2348-6406 A Query

More information

A Semi-automated Peer-review System Bradly Alicea Orthogonal Research

A Semi-automated Peer-review System Bradly Alicea Orthogonal Research A Semi-automated Peer-review System Bradly Alicea bradly.alicea@ieee.org Orthogonal Research Abstract A semi-supervised model of peer review is introduced that is intended to overcome the bias and incompleteness

More information

Quaero s Guide to Analytics

Quaero s Guide to Analytics About the Guide Data Scientists and Analysts eat, sleep, and breathe advanced analytics. For the rest of us, it can be a struggle to grasp. Quaero s Guide to Analytics features a collection of articles

More information