Skip to main content
Top
Published in:

01-12-2016 | Original Article

A hybrid epidemic model for deindividuation and antinormative behavior in online social networks

Authors: Cong Liao, Anna Squicciarini, Christopher Griffin, Sarah Rajtmajer

Published in: Social Network Analysis and Mining | Issue 1/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the increasing popularity of user-contributed sites, the phenomenon of “social pollution”, the presence of abusive posts has become increasingly prevalent. In this paper, we describe a novel approach to investigate negative behavior dynamics in online social networks as epidemic phenomena. We show that using hybrid automata, it is possible to explain the contagion of antinormative behavior in certain online commentaries. We present two variations of a finite-state machine model for time-varying epidemic dynamics, namely triggered state transition and iterative local regression, which differ with respect to accuracy and complexity.We validate the model with experiments over a dataset of 400,000 comments on 800 YouTube videos, classified by genre, and indicate how different epidemic patterns of behavior can be tied to specific interaction patterns among users.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Footnotes
1
For simplicity, we assume that comment ratings are not the product of up-voting by trolls or spammers.
 
Literature
go back to reference Agichtein E, Castillo C, Donato D, Gionis A, Mishne G (2008) Finding high-quality content in social media. In: Proceedings of the international conference on Web search and web data mining. ACM, pp 183–194 Agichtein E, Castillo C, Donato D, Gionis A, Mishne G (2008) Finding high-quality content in social media. In: Proceedings of the international conference on Web search and web data mining. ACM, pp 183–194
go back to reference Barbier G, Liu H (2011) Information provenance in social media. In: Social computing, behavioral-cultural modeling and prediction. Springer, New York, pp 276–283 Barbier G, Liu H (2011) Information provenance in social media. In: Social computing, behavioral-cultural modeling and prediction. Springer, New York, pp 276–283
go back to reference Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th International Conference on World wide web. ACM, pp 675–684 Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th International Conference on World wide web. ACM, pp 675–684
go back to reference Fan J, Gijbels I (1996) Local polynomial modelling and its applications: monographs on statistics and applied probability, 1 edn., vol 66. Chapman & Hall/CRC Monographs on Statistics & Applied Probability, Chapman & Hall Fan J, Gijbels I (1996) Local polynomial modelling and its applications: monographs on statistics and applied probability, 1 edn., vol 66. Chapman & Hall/CRC Monographs on Statistics & Applied Probability, Chapman & Hall
go back to reference Garetto M, Gong W, Towsley D (2003) Modeling malware spreading dynamics. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol 3, pp 1869–1879. IEEE Garetto M, Gong W, Towsley D (2003) Modeling malware spreading dynamics. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol 3, pp 1869–1879. IEEE
go back to reference Gino F, Gu J, Zhong C (2009) Contagion or restitution? When bad apples can motivate ethical behavior. J Exp Soc Psychol 45(6):1299–1302CrossRef Gino F, Gu J, Zhong C (2009) Contagion or restitution? When bad apples can motivate ethical behavior. J Exp Soc Psychol 45(6):1299–1302CrossRef
go back to reference Griffin C, Brooks RR, Schwier J (2011) A hybrid statistical technique for modeling non-linear recurrent tracks in a compact set. IEEE Trans Autom Control 56(8):1926–1931MathSciNetCrossRef Griffin C, Brooks RR, Schwier J (2011) A hybrid statistical technique for modeling non-linear recurrent tracks in a compact set. IEEE Trans Autom Control 56(8):1926–1931MathSciNetCrossRef
go back to reference Gronlund A, Holme P (2005) A network-based threshold model for the spreading of fads in society and markets. arXiv:0505050 Gronlund A, Holme P (2005) A network-based threshold model for the spreading of fads in society and markets. arXiv:​0505050
go back to reference Hui P, Buchegger S (2009) Groupthink and peer pressure: social influence in online social network groups. In: International Conference on Advances in Social Network Analysis and Mining (ASONAM). IEEE, Los Alamitos, pp 53–59. doi:10.1109/asonam.2009.17 Hui P, Buchegger S (2009) Groupthink and peer pressure: social influence in online social network groups. In: International Conference on Advances in Social Network Analysis and Mining (ASONAM). IEEE, Los Alamitos, pp 53–59. doi:10.​1109/​asonam.​2009.​17
go back to reference Java A, Kolari P, Finin T, Oates T (2006) Modeling the spread of influence on the blogosphere. In: Proceedings of the 15th international world wide web conference, pp 22–26 Java A, Kolari P, Finin T, Oates T (2006) Modeling the spread of influence on the blogosphere. In: Proceedings of the 15th international world wide web conference, pp 22–26
go back to reference Kantchelian A, Ma J, Huang L, Afroz S, Joseph A, Tygar JD (2012) Robust detection of comment spam using entropy rate. In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence., AISec ’12. ACM, New York, pp 59–70 Kantchelian A, Ma J, Huang L, Afroz S, Joseph A, Tygar JD (2012) Robust detection of comment spam using entropy rate. In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence., AISec ’12. ACM, New York, pp 59–70
go back to reference Kiesler S, Sproull L (1992) Group decision making and communication technology. Organ Behav Hum Decis Process 52(1):96–123CrossRef Kiesler S, Sproull L (1992) Group decision making and communication technology. Organ Behav Hum Decis Process 52(1):96–123CrossRef
go back to reference Kwak H, Lee C, Park H, Moon S (2010) What is twitter, a social network or a news media? In: Proceedings of the 19th international conference on World wide web. ACM, pp 591–600 Kwak H, Lee C, Park H, Moon S (2010) What is twitter, a social network or a news media? In: Proceedings of the 19th international conference on World wide web. ACM, pp 591–600
go back to reference Lee K, Caverlee J, Webb S (2010) Uncovering social spammers: Social honeypots + machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’10, pp 435–442 Lee K, Caverlee J, Webb S (2010) Uncovering social spammers: Social honeypots + machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’10, pp 435–442
go back to reference Lerman K, Ghosh R (2010) Information contagion: an empirical study of the spread of news on digg and twitter social networks. ICWSM 10:90–97 Lerman K, Ghosh R (2010) Information contagion: an empirical study of the spread of news on digg and twitter social networks. ICWSM 10:90–97
go back to reference Livingstone S (2008) Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media Soc 10(3):393–411CrossRef Livingstone S (2008) Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media Soc 10(3):393–411CrossRef
go back to reference Ozonoff A, Sukpraprut S, Sebastiani P (2006) Modeling seasonality of influenza with hidden markov models. In: Proceedings of the American Statistical Association Ozonoff A, Sukpraprut S, Sebastiani P (2006) Modeling seasonality of influenza with hidden markov models. In: Proceedings of the American Statistical Association
go back to reference Rodkin PC (2004) Peer ecologies of aggression and bullying. Bull Am Schools:87–106 Rodkin PC (2004) Peer ecologies of aggression and bullying. Bull Am Schools:87–106
go back to reference Siersdorfer S, Chelaru S, Nejdl W, San Pedro J (2010) How useful are your comments?: analyzing and predicting youtube comments and comment ratings. In: Proceedings of the 19th international conference on World wide web. ACM, pp 891–900 Siersdorfer S, Chelaru S, Nejdl W, San Pedro J (2010) How useful are your comments?: analyzing and predicting youtube comments and comment ratings. In: Proceedings of the 19th international conference on World wide web. ACM, pp 891–900
go back to reference Squicciarini A, Griffin C (2012) An informed model of personal information release in social networking sites. In: Proceedings of the Fourth IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT). arXiv:1206.0981 Squicciarini A, Griffin C (2012) An informed model of personal information release in social networking sites. In: Proceedings of the Fourth IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT). arXiv:​1206.​0981
go back to reference Sridharan V, Shankar V, Gupta M (2012) Twitter games: How successful spammers pick targets. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC ’12. ACM, New York, pp 389–398. doi:10.1145/2420950.2421007 Sridharan V, Shankar V, Gupta M (2012) Twitter games: How successful spammers pick targets. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC ’12. ACM, New York, pp 389–398. doi:10.​1145/​2420950.​2421007
go back to reference Sternberg J (2012) Misbehavior in cyber places: The regulation of online conduct invirtual communities on the Internet. Rowman & Littlefield Sternberg J (2012) Misbehavior in cyber places: The regulation of online conduct invirtual communities on the Internet. Rowman & Littlefield
go back to reference Strat YL, Carrat F (1999) Monitoring epidemiologic surveillance data using hidden Markov models. Stat Med 18(24):3463–3478CrossRef Strat YL, Carrat F (1999) Monitoring epidemiologic surveillance data using hidden Markov models. Stat Med 18(24):3463–3478CrossRef
go back to reference Thomas K, Grier C, Song D, Paxson V (2011) Suspended accounts in retrospect: An analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC ’11. ACM, New York, pp 243–258. doi:10.1145/2068816.2068840 Thomas K, Grier C, Song D, Paxson V (2011) Suspended accounts in retrospect: An analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC ’11. ACM, New York, pp 243–258. doi:10.​1145/​2068816.​2068840
go back to reference Thommes RW, Coates M (2006) Epidemiological modelling of peer-to-peer viruses and pollution. INFOCOM 6:1–12 Thommes RW, Coates M (2006) Epidemiological modelling of peer-to-peer viruses and pollution. INFOCOM 6:1–12
go back to reference Yang J, Leskovec J (2010) Modeling information diffusion in implicit networks. In: Data Mining (ICDM), IEEE 10th International Conference on. IEEE, Los Alamitos, pp 599–608. doi:10.1109/icdm.2010.22 Yang J, Leskovec J (2010) Modeling information diffusion in implicit networks. In: Data Mining (ICDM), IEEE 10th International Conference on. IEEE, Los Alamitos, pp 599–608. doi:10.​1109/​icdm.​2010.​22
Metadata
Title
A hybrid epidemic model for deindividuation and antinormative behavior in online social networks
Authors
Cong Liao
Anna Squicciarini
Christopher Griffin
Sarah Rajtmajer
Publication date
01-12-2016
Publisher
Springer Vienna
Published in
Social Network Analysis and Mining / Issue 1/2016
Print ISSN: 1869-5450
Electronic ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-016-0321-5

Premium Partner