a quantitative model and analysis for information
play

A Quantitative Model and Analysis for Information Confusion in Social - PowerPoint PPT Presentation

A Quantitative Model and Analysis for Information Confusion in Social Networks Anand Santhanakrishnan Research Associate WINLAB Rutgers Outline Motivation Problem Formulation System Model Analysis Results Conclusion


  1. A Quantitative Model and Analysis for Information Confusion in Social Networks Anand Santhanakrishnan Research Associate WINLAB Rutgers

  2. Outline • Motivation • Problem Formulation • System Model • Analysis • Results • Conclusion

  3. Confusion in Social Networks • Users seek information from a primary source • Users receive auxiliary information from several other sources – Information from some of the other sources could contradict the one from the primary source – Causes confusion for the receiving user

  4. Some examples of Confusion • Are social networks a more trusted by people than google? – http://www.google.com/hostednews/afp/article/ALeqM5iiH9iSZwSVn nc3g6ybW2N3CzrC6g suggests they are – http://news.slashdot.org/story/10/06/24/0116240/Study ‐ Finds ‐ Google ‐ Is ‐ More ‐ Trusted ‐ Than ‐ Traditional ‐ Media?from=rss suggests Google is more popular Are cell phone radiations harmful? • – C. Johansen, J. D. B. Jr., , J. K. Mclaughlin, J. H. Olsen, Cellular telephones and cancer ‐ A nation ‐ wide cohort study in Denmark, Jl. of National Cancer Institute 93 (3) (2001) 203–207 suggests that they are now – S. Kovach, The hidden dangers of cell ‐ phone radiation, Life Extension Magazine suggests they are

  5. Twitter Data on Full Body Scan in Airports User likes to obtain opinion from his/her friends on full body scan • Friends from North America are likely to support full body scan – Friends from Asia are likely to oppose –

  6. Modeling Confusion • Is it possible to model confusion? • What are the parameters that affect confusion? – The power or intensity with which a source transmits information • Represented by the authenticity, aggression level of the source, confidence, propaganda, etc – The trust between the sources and the receiving user – The level of contradiction in the information obtained from different sources – The natural dilemma or instability or cognitive reflexivity of the user in processing information – Amount of auxiliary/training resources expended by the source to educate the user • Define a term called “Information ‐ to ‐ Confusion ‐ Noise ‐ Ratio (ICNR)” to model confusion

  7. Description of Parameters P. Adams, “Social networking,” The Noisy Channel, Jul. 2010. • http://thenoisychannel.com/2010/07/08/pauladamsspresentation ‐ on ‐ social ‐ networking The power or intensity of information transmission • – You must eat in this restaurant. It is delicious !! – Never eat here. The service is awful !! The auxiliary resource or intensity of information transmission • – Paul eats in this restaurant three times a week The relevance of information • – If someone is first of all interested in dining in the restaurant or has dined before in the restaurant The natural dilemma or cognitive reflexivity of information • transmission – People who have a natural affinity towards or natural resistance to dine in the restaurant

  8. Measurement of Intensity R1= Restaurant 1, R2= Restaurant 2, R3= Restaurant 3 NI=Normalized Intensity Normalized Intensity for R1=0.2 φ 1 ++0.33 φ 2 +0.5 φ 3 +0.33 φ 4 ; φ 1 + φ 2 + φ 3 + φ 4=1 • Normalized Intensity for R2=0.5 φ 1 ++0.25 φ 2 +0.33 φ 3 +0.42 φ 4 ; φ 1 + φ 2 + φ 3 + φ 4=1 •

  9. Measurement of Contradiction Percentage of tweets supporting full body scan in USA= 967/(967+753)=56.22% • Percentage of tweets supporting full body scan in Canada=14/(14+19)=42.42% • Contradiction between USA and Canada= 0.5622(1 ‐ 0.4242)+0.4242(1 ‐ 0.5622)=0.5094 • Neglect neutral tweets •

  10. Measurement of Auxiliary Resources L. Corteville and M. Sun, “An interorganizational social network analysis of Michigan diabetic outreach • networks,” White Paper, MichiganState Univ., Sep. 2009. http://www.techrepublic.com/research ‐ library/michigan+state+university Ratings by patients on a scale of 1 ‐ 7. •

  11. ICNR Trust between the i th user and j th source ICNR Auxiliary resources expended by j th source Power or intensity of the i th source Cognitive reflexivity of i th user Contradiction between i th and j th sources Relevance of the i th source

  12. Problem Definition Utility ; • – π i is an increasing concave function – Obtained from Bernoullian utility theory of human behavior Net utility • λ is the pricing parameter, f i (x i ) is the pricing function • – Represents the penalty incurred due to aggressive presentation of information Loss of relationship/reputation • – f i (x i ) is an increasing convex function – Can be linear or non ‐ linear Determine the optimal P i ’s so that the net utility, , is maximized • for all the users A non ‐ cooperative game with pricing •

  13. Preliminary Results (1/3) • Theorem 1: Let . Let aaand . Then the Nash equilibrium . Then the non ‐ cooperative game with pricing is feasible only if – Indicates that there is an upper cut off on the pricing parameter above which sources are averse to giving any information • Theorem 2: such that , the non ‐ cooperative game with pricing has a unique feasible Nash equilibrium – Indicates that there is a lower cut off on the pricing parameter below which sources tend to be highly aggressive in presenting information.

  14. Preliminary Results (2/3) • A network is said to be ε‐ aggressive if the average power or intensity with which information is transmitted is . A network is said to be aggressive if it is ε‐ aggressive for ε =1 – Represents how aggressive sources can be • A network is said to be δ‐ passive if the average power or intensity with which information is transmitted is A network is said to be passive if it is δ‐ passive for δ =0. – Represents how passive the sources can become • Can we make a network as aggressive or as passive as desired?

  15. Preliminary Results (3/3) • Theorem 3: For all 0 ≤ε≤ 1 there exists λ min ( ε ) such that the network is ε‐ aggressive for λ < λ min ( ε ). – Indicates that it is possible to make a network as aggressive as desired by keeping the pricing parameter sufficiently low, i.e., not penalizing sources for being aggressive • Theorem 4: For all 0 ≤δ≤ 1 there exists λ max ( δ ) such that the network is δ ‐ aggressive for λ > λ max ( δ ). – Indicates that it is possible to make a network as passive as desired by making the pricing parameter sufficiently high, i.e., penalizing sources heavily for being aggressive

  16. Numerical Results • A network with 10 sources and 10 users • 3 scenarios – Distributed trust • users place almost equal trust on all sources – Moderately concentrated trust • users place high trust on few sources and low trust on others – Highly concentrated trust • Users place high trust on one or two sources and low trust on others

  17. Price Variation • Higher price to obtain same net utility when users place distributed trust

  18. Aggression Levels Network switches from highly aggressive to highly passive very • quickly (i.e., is unstable) when users place distributed trust.

  19. Conclusion • A quantitative model for information confusion • Networks can be made as aggressive or as passive as desired • Networks in which users trust all sources equally are susceptible to be unstable – Switch from being aggressive to being passive very quickly • When users place highly concentrated trust, networks are more stable

  20. Additional Applications • Task prioritization – A user is assigned a set of n tasks by a set of m people – The productivity us analogous to relevance – The influence is analogous to trust – The intensity is analogous to priority assigned to the tasks – Determine the optimal priorities to maximize productivity • Admission control – A set of users are discussing on a topic – Each user is looking for a level of clarity (ICNR) from the discussion – The information providers need to control their intensity to meet the desired ICNR for all users – Admit a new user only if ICNR requirements are met

  21. Questions?

  22. Thank You !!!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend