Advertisement

A hybrid epidemic model for deindividuation and antinormative behavior in online social networks

  • Cong Liao
  • Anna Squicciarini
  • Christopher Griffin
  • Sarah RajtmajerEmail author
Original Article
Part of the following topical collections:
  1. Diffusion of Information and Influence in Social Networks

Abstract

With the increasing popularity of user-contributed sites, the phenomenon of “social pollution”, the presence of abusive posts has become increasingly prevalent. In this paper, we describe a novel approach to investigate negative behavior dynamics in online social networks as epidemic phenomena. We show that using hybrid automata, it is possible to explain the contagion of antinormative behavior in certain online commentaries. We present two variations of a finite-state machine model for time-varying epidemic dynamics, namely triggered state transition and iterative local regression, which differ with respect to accuracy and complexity.We validate the model with experiments over a dataset of 400,000 comments on 800 YouTube videos, classified by genre, and indicate how different epidemic patterns of behavior can be tied to specific interaction patterns among users.

Keywords

Social Networking Site Epidemic Model Online Social Network Sentiment Analysis Abusive Behavior 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgments

Portions of Dr. Griffin’s, Dr. Squicciarini’s and Dr. Rajtmajer’s work were supported by the Army Research Office under Grant W911NF-13-1-0271. Portions of Dr. Squicciarini’s work were additionally supported by the Air Force Office of Scientific Research, Grant Number FA9550-15-1-0149.

References

  1. Alchemyapi (2016). http://www.alchemyapi.com. Accessed Mar 2016
  2. Agichtein E, Castillo C, Donato D, Gionis A, Mishne G (2008) Finding high-quality content in social media. In: Proceedings of the international conference on Web search and web data mining. ACM, pp 183–194Google Scholar
  3. Antonio KES, Pinol CMN, Banzon RS (2010) An ising model approach to malware epidemiology. arXiv:1007.4938 (arXiv preprint)
  4. Barbier G, Liu H (2011) Information provenance in social media. In: Social computing, behavioral-cultural modeling and prediction. Springer, New York, pp 276–283Google Scholar
  5. Carty SL (2016). Social networking abuse. http://socialnetworking.lovetoknow.com/Social_Networking_Abuse. Accessed Mar 2016
  6. Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th International Conference on World wide web. ACM, pp 675–684Google Scholar
  7. Diener E, Lusk R, DeFour D, Flax R (1980) Deindividuation: effects of group size, density, number of observers, and group member similarity on self-consciousness and disinhibited behavior. J Personal Soc Psychol 39(3):449. http://search.proquest.com/docview/1295903854?accountid=13158. Accessed on 23 Feb 2013
  8. Fan J, Gijbels I (1996) Local polynomial modelling and its applications: monographs on statistics and applied probability, 1 edn., vol 66. Chapman & Hall/CRC Monographs on Statistics & Applied Probability, Chapman & HallGoogle Scholar
  9. Festinger L, Pepitone A, Newcomb T (1952) Some consequences of de-individuation in a group. J Abnorm Soc Psychol 47:382. http://search.proquest.com/docview/1290390091?accountid=13158. Accessed on 21 Feb 2013
  10. Garetto M, Gong W, Towsley D (2003) Modeling malware spreading dynamics. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol 3, pp 1869–1879. IEEEGoogle Scholar
  11. Gino F, Ayal S, Ariely D (2009) Contagion and differentiation in unethical behavior. Psychol Sci 20(3):393–398. doi: 10.1111/j.1467-9280.2009.02306.x CrossRefGoogle Scholar
  12. Gino F, Gu J, Zhong C (2009) Contagion or restitution? When bad apples can motivate ethical behavior. J Exp Soc Psychol 45(6):1299–1302CrossRefGoogle Scholar
  13. Griffin C, Brooks RR, Schwier J (2011) A hybrid statistical technique for modeling non-linear recurrent tracks in a compact set. IEEE Trans Autom Control 56(8):1926–1931MathSciNetCrossRefGoogle Scholar
  14. Griffin C, Brooks RR, Schwier JM (2011) A hybrid statistical technique for modeling recurrent tracks in a compact set. IEEE Trans Autom Control 56(8):1926–1931. http://dblp.uni-trier.de/db/journals/tac/tac56.html (#GriffinBS11)
  15. Gronlund A, Holme P (2005) A network-based threshold model for the spreading of fads in society and markets. arXiv:0505050
  16. Hu X, Tang J, Zhang Y, Liu H (2013) Social spammer detection in microblogging. In: Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence, IJCAI’13, pp 2633–2639. AAAI Press. http://dl.acm.org/citation.cfm?id=2540128.2540508
  17. Hui P, Buchegger S (2009) Groupthink and peer pressure: social influence in online social network groups. In: International Conference on Advances in Social Network Analysis and Mining (ASONAM). IEEE, Los Alamitos, pp 53–59. doi: 10.1109/asonam.2009.17
  18. Java A, Kolari P, Finin T, Oates T (2006) Modeling the spread of influence on the blogosphere. In: Proceedings of the 15th international world wide web conference, pp 22–26Google Scholar
  19. Kantchelian A, Ma J, Huang L, Afroz S, Joseph A, Tygar JD (2012) Robust detection of comment spam using entropy rate. In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence., AISec ’12. ACM, New York, pp 59–70Google Scholar
  20. Kiesler S, Sproull L (1992) Group decision making and communication technology. Organ Behav Hum Decis Process 52(1):96–123CrossRefGoogle Scholar
  21. Kwak H, Lee C, Park H, Moon S (2010) What is twitter, a social network or a news media? In: Proceedings of the 19th international conference on World wide web. ACM, pp 591–600Google Scholar
  22. List of swear words and curse words (2016). http://www.noswearing.com/dictionary. Accessed Mar 2016
  23. Lee K, Caverlee J, Webb S (2010) Uncovering social spammers: Social honeypots + machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’10, pp 435–442Google Scholar
  24. Lerman K, Ghosh R (2010) Information contagion: an empirical study of the spread of news on digg and twitter social networks. ICWSM 10:90–97Google Scholar
  25. Lewis K, Gonzalez M, Kaufman J (2012) Social selection and peer influence in an online social network. Proc Nat Acad Sci 109(1):68–72. doi: 10.1073/pnas.1109739109 CrossRefGoogle Scholar
  26. Livingstone S (2008) Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media Soc 10(3):393–411CrossRefGoogle Scholar
  27. Ozonoff A, Sukpraprut S, Sebastiani P (2006) Modeling seasonality of influenza with hidden markov models. In: Proceedings of the American Statistical AssociationGoogle Scholar
  28. Postmes T, Spears R (1998) Deindividuation and antinormative behavior: a meta-analysis. Psychol Bull 123(3):238–259. http://search.proquest.com/docview/614333709?accountid=13158
  29. Rodkin PC (2004) Peer ecologies of aggression and bullying. Bull Am Schools:87–106Google Scholar
  30. Siersdorfer S, Chelaru S, Nejdl W, San Pedro J (2010) How useful are your comments?: analyzing and predicting youtube comments and comment ratings. In: Proceedings of the 19th international conference on World wide web. ACM, pp 891–900Google Scholar
  31. Squicciarini A, Griffin C (2012) An informed model of personal information release in social networking sites. In: Proceedings of the Fourth IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT). arXiv:1206.0981
  32. Sridharan V, Shankar V, Gupta M (2012) Twitter games: How successful spammers pick targets. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC ’12. ACM, New York, pp 389–398. doi: 10.1145/2420950.2421007
  33. Sternberg J (2012) Misbehavior in cyber places: The regulation of online conduct invirtual communities on the Internet. Rowman & LittlefieldGoogle Scholar
  34. Strat YL, Carrat F (1999) Monitoring epidemiologic surveillance data using hidden Markov models. Stat Med 18(24):3463–3478CrossRefGoogle Scholar
  35. Thomas K, Grier C, Song D, Paxson V (2011) Suspended accounts in retrospect: An analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC ’11. ACM, New York, pp 243–258. doi: 10.1145/2068816.2068840
  36. Thommes RW, Coates M (2006) Epidemiological modelling of peer-to-peer viruses and pollution. INFOCOM 6:1–12Google Scholar
  37. Yang J, Leskovec J (2010) Modeling information diffusion in implicit networks. In: Data Mining (ICDM), IEEE 10th International Conference on. IEEE, Los Alamitos, pp 599–608. doi: 10.1109/icdm.2010.22

Copyright information

© Springer-Verlag Wien 2016

Authors and Affiliations

  • Cong Liao
    • 1
  • Anna Squicciarini
    • 1
  • Christopher Griffin
    • 2
  • Sarah Rajtmajer
    • 3
    Email author
  1. 1.College of Information Sciences and TechnologyPennsylvania State UniversityState CollegeUSA
  2. 2.Department of MathematicsUnited States Naval AcademyAnnapolisUSA
  3. 3.Department of MathematicsPennsylvania State UniversityState CollegeUSA

Personalised recommendations