cascades and contagion
play

Cascades and Contagion Prof. Srijan Kumar - PowerPoint PPT Presentation

CSE 6240: Web Search and Text Mining. Spring 2020 Cascades and Contagion Prof. Srijan Kumar http://cc.gatech.edu/~srijan 1 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining Administrivia Proposal grades are out


  1. CSE 6240: Web Search and Text Mining. Spring 2020 Cascades and Contagion Prof. Srijan Kumar http://cc.gatech.edu/~srijan 1 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  2. Administrivia • Proposal grades are out • HW2 is due tonight • Project milestone rubrik will be released this week to help you plan in advance 2 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  3. Today’s Lecture • Introduction • Decision based models of diffusion • Probabilistic models of diffusion These lecture slides are borrowed from Prof Jure Leskovec’s CS224W slides. 3 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  4. Spreading Through Networks • Networks help spread things fast: “Cascading behavior” – Behaviors that cascade from node to node like an epidemic • Examples: – Biological: Diseases via contagion – Technological: Cascading failures, Spread of information – Social: Rumors, news, new technology; Viral marketing 4 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  5. Example: News Diffusion Obscure tech story Small tech blog Engadget HackerNews Wired BBC NYT CNN 5 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  6. Example: Social Media Sharing 6 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  7. Example: Viral Marketing • Product adoption: Senders and followers of recommendations 7 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  8. Example: Disease Contagion (Corona) Example: Corona, Ebola 8 2/24/20 Jure Leskovec, Stanford CS224W: Machine Learning with Graphs, Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining http://cs224w.stanford.edu

  9. Network Cascades • Contagion that spreads over the edges of the network • It creates a propagation tree, i.e., cascade • Terminology: – “Infection” event: Adoption, infection, activation – Main players: Infected/active nodes, adopters Cascade Network (propagation tree) 9 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  10. How Do We Model Diffusion? 1. Decision based models: – Models of product adoption, decision making • A node observes decisions of its neighbors and makes its own decision – Example: You join demonstrations if k of your friends do so too 2. Probabilistic models: – Models of influence or disease spreading • An infected node tries to “push” the contagion to an uninfected node – Example: • You “catch” a disease with some prob. from each active neighbor in the network 10 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  11. Today’s Lecture • Introduction • Decision based models of diffusion – Single Adoption – Multiple Adoption • Probabilistic models of diffusion 11 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  12. [Morris 2000] Game Theoretic Model of Cascades • Based on 2 player coordination game – 2 players – each chooses technology A or B – Each player can only adopt one “behavior”, A or B – Intuition: you (node 𝑤 ) gain more payoff if your friends have adopted the same behavior as you – Each node has a local view (can only see their neighbors) 12 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  13. Example: Social Media • You and your friend benefit if you have account on the same social media platform 13 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  14. The Model for Two Nodes • Payoff matrix: – If both v and w adopt behavior A , they each get payoff a > 0 – If v and w adopt behavior B , they each get payoff b > 0 – If v and w adopt the opposite behaviors, they each get 0 • In some large network: – Each node v is playing a copy of the game with each of its neighbors – Payoff : sum of node payoffs over all games 14 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  15. Calculation of Node v b > = p q • Threshold: v chooses A if + a b • p = fraction of v’s neighbors with A • q = payoff threshold 15 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  16. Calculation of Node v b > = p q + a b • Let v have d neighbors • Assume fraction p of v ’s neighbors adopt A – Payoff v = a∙p∙d if v chooses A = b∙(1-p)∙d if v chooses B • Thus: v chooses A if: p > q 16 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  17. Example Scenario Scenario: • Graph where everyone starts with all B • Small set S of early adopters of A – Hard-wire S – they keep using A no matter what payoffs tell them to do • Assume payoffs are set in such a way that nodes say: – If more than q=50% of my friends take A, then I will also take A. – This means: a = b- ε ( ε >0, small positive constant) and then q=1/2 17 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  18. Example Scenario S = { u , v } If more than q= 50% of my friends are red I’ll also be red 18 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  19. Example Scenario S = { v u , } u v If more than q= 50% of my friends are red I’ll also be red 19 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  20. Example Scenario S = { v u , } u v If more than q= 50% of my friends are red I’ll also be red 20 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  21. Example Scenario S = { v u , } u v If more than q= 50% of my friends are red I’ll also be red 21 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  22. Example Scenario S = { v u , } u v If more than q= 50% of my friends are red I’ll also be red 22 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  23. Example Scenario S = { v u , } u v If more than q= 50% of my friends are red I’ll also be red 23 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  24. Application Paper: Modeling Protest Recruitment on Social Networks The Dynamics of Protest Recruitment through an Online Network Bailon et al. Nature Scientific Reports, 2011 24 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  25. The Spanish ‘Indignados’ Movement • Anti-austerity protests in Spain May 15-22, 2011 as a response to the financial crisis • Twitter was used to organize and mobilize users to participate in the protest 25 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  26. Data Collected Using Hashtags • Researchers identified 70 hashtags that were used by the protesters 26 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  27. Dataset • 70 hashtags were crawled for 1 month period – Number of tweets: 581,750 • Relevant users: Any user who tweeted any relevant hashtag and their followers + followees – Number of users: 87,569 • Created two undirected follower networks: 1. Full network: with all Twitter follow links 2. Symmetric network with only the reciprocal follow links ( i ➞ j and j ➞ i ) • This network represents “strong” connections only. 27 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  28. Definitions • User activation time: Moment when user starts tweeting protest messages • k in = The total number of neighbors when a user became active • k a = Number of active neighbors when a user became active • Activation threshold = k a /k in – The fraction of active neighbors at the time when a user becomes active 28 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  29. Recruitment & Activation Threshold • If k a /k in ≈ 0 , then the user joins the movement when very few neighbors are active ⇒ no social pressure • If k a /k in ≈ 1 , then the user joins the movement after most of its neighbors are active ⇒ high social pressure Already active node 0/4 = 0.0 No social pressure for middle node Non-zero social pressure for to join middle node to join 29 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  30. Distribution of Activation Thresholds • Mostly uniform distribution of activation threshold in both networks, except for two local peaks 0.5 activation 0 threshold activation users: Many threshold users who users: join after half Many self- their active neighbors users. do. 30 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

  31. Effect of Neighbor Activation Time • Hypothesis: If several neighbors become active in a short time period, then a user is more likely to become active • Method: Calculate the burstiness of active neighbors as High threshold users join after sudden Low threshold bursts in users are neighborhood insensitive to activation recruitment bursts. Low threshold High threshold users users 31 Srijan Kumar, Georgia Tech, CSE6240 Spring 2020: Web Search and Text Mining

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend