Abstract
This paper develops a methodology to aggregate signals in a network regarding some hidden state of the world. We argue that focusing on edges around hubs will under certain circumstances amplify the faint signals disseminating in a network, allowing for more efficient detection of that hidden state. We apply this method to detecting emergencies in mobile phone data, demonstrating that under a broad range of cases and a constraint in how many edges can be observed at a time, focusing on the egocentric networks around key hubs will be more effective than sampling random edges. We support this conclusion analytically, through simulations, and with analysis of a dataset containing the call log data from a major mobile carrier in a European nation.
1 Introduction
Imagine a scenario where some set of individuals witness an extraordinary event which impels them to communicate regarding that event to other individuals, who in turn will communicate with yet others. In this scenario, it is possible for an external observer to witness the fact of communication, but not the content. How might that observer effectively make the inference that an extraordinary event has occurred?
This is in fact a plausible scenario, with the existence of communication systems (most notably phones) where timing and volume of traffic is observed, but (typically) not content. Mobile phones are particularly notable in this regard, because of how pervasive they are. Here we build on work examining detection of anomalous events in networks [7], but with the focus on how to aggregate those signals in a computationally efficient fashion. That is, if one cannot observe all nodes and edges, how best to sample the network?
Analyzing the spreading of information has long been the central focus in the study of social networks for the last decade [6, 17, 18]. One of the main challenges associated with modeling of behavioral dynamics in social communities with respect to anomalous external events stems from the fact that it often involves stochastic generative processes. A further challenge is the trade off that exists between coverage and prediction accuracy [3, 5, 6]. While simulations on realizations from these models can help explore the properties of networks [16], a theoretical analysis is much more appealing and robust. The results presented in this work are based on a pure theoretical analysis, validated both by extensive simulations as well as by real world data derived from a unique dataset.
Contribution
In this work we present an innovative approach for studying the network dimension of the changes that take place in social communities in the presence of emergencies. We do so using a mechanism we call a “Social Amplifier”—a method for analyzing local subnetworks spanning certain highvolume network nodes. The innovation in our proposed approach is twofold: (a) using a nonuniform sampling of the network (namely, focusing on activity in the social vicinity of network hubs), and (b) projecting the network activity into a multidimensional feature space spanned around a multitude of topological network properties. We show using both simulation and real world data that starting with certain coverage level of the network, our method outperforms the use of either random sampling, as well as single signal analysis.
Validation
We first validate our technique using an analytic model that predicts the efficiency of our method for various network scenarios. Then, we conduct extensive experimental analysis, simulating various networks in which we examine the way information regarding an emergency spread. Using these results we demonstrate an assessment of the efficiency of our method compared to the conventional random network sampling. We further validated our proposed methods using a comprehensive dataset, containing the entire internal calls as well as many of the incoming and outgoing calls within a major mobile carrier in a west European country, for a period of roughly 3 years. During this period that mobile users have made approximately 12 billion phone calls. We used the company’s log files, providing all phone calls (initiator, recipient, duration, and timing) and SMS/MMS messages that the users exchange within and outside the company’s network. All personal details have been anonymized, and we have obtained IRB approval to perform research on it.
Paper organization
The rest of the paper is organized as follows: Sect. 2 discusses related work. Section 3 contains the problem’s definitions. Section 4 presents the methodology used for testing our proposed mechanism. Section 5 discusses the Social Amplifier mechanism. An indepth analysis of the technique using a simulated environment is presented in Sect. 6 whereas its demonstration using with real world cellular data is given in Sect. 7. Section 8 contains discussion and concluding remarks.
2 Related Work
There is an emerging literature on the use of network data to detect extraordinary events, especially around the use of mobile phone data. One important line of research examines the question pertaining to the area where the event has occurred, and its dependence on the nature of the event: a bomb attack is narrowly localized in space, thus likely the anomalous calling activity will be limited to the immediate neighborhood of the event. This was observed in an analysis of mobile data in the vicinity of a bomb attack [7].
Another critical question is: Whom do we call during an emergency? Do we call our closest ties or best friends? Or the acquaintance who we perceive as being physically closest to the event (and thus most likely to be affected)? Or do we call emergency personnel? The call data allow us to distinguish these scenarios—indeed, we can determine from the historical call pattern who are the individuals with whom a user communicates most frequently, as well as behavioral characteristics that might allow us to infer relationship type, as well as their most likely location during the emergency, together with the range of places they normally visit. This allows us to look for trends in the calling patterns during the emergency. An extended analysis of traffic patterns also shows that emergencies tend to induce cascading calling patterns, helping the spread of situation awareness in the population [7].
It has been recently shown that in trying to assess the societal changes and anomalous patterns that emerge in response to emergencies and security related events, it is crucial to understand the underlying social network [24, 25], the role of the link weights [15], as well as the response of the network to node and link removal [2]. Past research [20] had pointed out the existence of powerful patterns in the placement of links, where—as predicted in Granovetter’s seminal work [15]—that clusters of strongly tied together individuals tend to be connected by weak ties. It was also shown that this finding provides insight into the robustness of the network to particular patterns of link and node removal, as well as into the spreading processes that take place in the social network [22, 23]. This latter result plays a key role in the intellectual basis of our understanding of the spread of situational awareness in an emergency.
Analysis of mobile networks traffic demonstrates a clear correlation between anomalies in the network traffic and a distinct security event. Indeed, in the event of a large scale explosion it is likely to assume that the authorities would be notified about it very close to the time of explosion. This, however, is not the case for many other scenarios. For example, the large fire outbreak that had taken place in northern Israel at the beginning of December 2012 [26] was identified and discussed by numerous observers passing through this region hours before it caught the attention of relevant controllers in the fire department. Had an ability to detect anomalies in mobile networks been active during this point, an alert, titled “potential security event”, focused on the specific geographic region, would have been produced, resulting in the dispatching of a local firefighting units, who could have easily extinguished the fire at this point.
One of the first works that examined the timing of people’s communication behavior found that the lengths of the time gaps between two consecutive phone calls is distributed following a power law principle [8]. An extension of this work [10] showed that when an anomalous event is present, various similar statistical properties of the network dynamics gets distorted. Other works had examined the evolution of social groups, aiming for the development of algorithms capable of identifying “new groups”—a certain kind of anomalous network pattern [21].
The broader objective of this paper is to contribute to the ongoing development of more efficient techniques for utilizing mobile phones as a ubiquitous large scale sensors network. These techniques use mobile data to detect social relations [1, 12], mobility patterns [14], socioeconomical properties [13], and security related features [4].
3 Preliminaries
We denote the “global social network” as a graph G=〈V,E〉 where V is the set of all nodes and E is the set of undirected edges over those nodes (an edge (u,v) exists iff there have been reciprocal calls between users u and v).
We assume that occasionally various anomalous events take place in the “real world”, that are being observed directly by some portion of the network’s users, that subsequently may respond by making one of more phone calls to their neighbors in the global social network.
Given a mobile carrier M, we denote its set of covered nodes (derived from its market share) as V _{ M }⊆V, and its set of covered edges as E _{ M }⊆E. An edge is covered by M if at least one of its nodes is covered by M, i.e.:
We assume that the operator M is interested to detect anomalous events such as emergencies, and to do so as fast as possible, with as high accuracy rate as possible, and using as little resources as possible. We measure the amount of resources required by M (or otherwise defined as the complexity of the detection algorithm) as the overall number of edges being analyzed, or monitored. We denote the subset of edges processed by M as the “monitored edges”, S _{ M }⊆E _{ M }.
Given an upper bound, ϵ on the size of \(\frac{S_{M}}{E}\), we are interested in achieving the highest detection performance (defined later on) that can be obtained by monitoring a portion of the edges smaller than ϵ.
Throughout this work we refer to the 1 egonetwork and the 1.5 egonetwork of a node v.
The 1 egonetwork of v is a graph G(V _{1},E _{1}) such that nearestneighbor nodes of v comprise the vertices of V _{1} and the links between v and V _{1} comprise the edges E _{1}. Similarly, the 1.5 egonetwork of v is a graph G(V _{1.5},E _{1.5}), such that V _{1.5} is the same as V _{1} and E _{1.5} consists of E _{1} plus all direct links between the nearestneighbors of v. The definitions of 1 egonetwork and the 1.5 egonetwork are illustrated in Fig. 1.
4 Methodology
In the next three sections we analyze the performance of our proposed method by comparing it to a “baseline” algorithm that uses random sampling of the network (instead of hubssampling) and tracks the edges of the 1 egonetwork (instead of the 1.5 egonetwork used in our method).
In Sect. 5 we construct an analytic model depicting the efficiency of our method and the way it changes as a result of changes in the network’s conditions. In Sect. 6 we compare the detection time of our method to the baseline detection method using extensive simulations. In Sect. 7 we conduct a posteriori analysis of the detection accuracy of our proposed method, as well as the baseline detection method, and compare them for several different kinds of emergencies.
It should be noted that in order to compare our proposed method to the baseline algorithm it has to be normalized. We do so by presenting all performance results as a function of the number of “overall edges under converge”.
Table 1 contains a glossary of the technical annotations used in this paper (defined in detail in the following sections).
5 The Social Amplifier
The proposed method is comprised of three stages: (a) network sampling, by detecting nodes with high incoming and outgoing traffic volume (i.e. hubs), (b) building the social network around the hubs and extracting the topological features of the networks, and (c) analyzing the changes in these features along time, tracking anomalous dynamics that imply the existence of an anomalous event.
5.1 Network Sampling
At the initial step of the analysis process we track the traffic volume in the network’s nodes, looking for hubs—nodes with high traffic (either incoming or outgoing). The rationale behind the use of hubs is that hubs are highly likely to be exposed to new information, due to their high degree.
Given available resources ϵ, we select network nodes, v _{1},…,v _{ n }, from V _{ M }, such that those nodes have the highest degrees in V _{ M } and the set \(S_{M}=\bigcup_{1 \le i \le n} E_{M}^{1.5}(v_{i})\) does not contain more than ϵ portion of the edges, where \(E_{M}^{1.5}(v)\) denote the 1.5 egonetwork around node v, that is—the edges between v and all of v’s neighbors, as well as the edges between v’s neighbors and themselves:
The use of the 1.5 egonetwork is required in order to analyze not only the overall number of calls in the network (sampled by the hubs), as done in works such as [7], but rather to generate the actual networks around the hubs, in order to enable their indepth analysis. More specifically, analyzing only the overall number of calls, can only detect massive global events, but not local ones (unless the local events are known in advance, and the local data is analyzed in retrospective). Figure 2 illustrates the importance of using the 1.5 egonetwork.
5.2 Features Extractions
For each phone social network we extract the following set of 21 topological features for each day during the test period:

In Degree: The number of incoming edges of the hub.

Out Degree: The number of outgoing edges of the hub.

BI Direction Numbers: The amount of numbers that called the hubs, and that the hub called them.

Total Degree: In degree + out degree of the hub.

In Calls: The number of incoming calls to the hub.

Out Calls: The number of outgoing calls from the hub.

Total Calls: In calls + out calls.

Norm In Calls: the number of in calls divided by the number of total calls.

Norm Out Calls: the number of out calls divided by the number of total calls.

Neighborhood Number of Connection: the number of connections in the 1.5 egonetwork of the hub.

Number of Strong Connected Components: the number of strong connected components of the 1.5 egonetwork of the hub.

Number of Weak Connected Components: number of weak connected components of the 1.5 egonetwork of the hub.

Average Number of Strong Connected Components: the average number of nodes in each strong connected components of the 1.5 egonetwork of the hub.

Average Number of Weak Connected Components: the average number of nodes in each weak connected components of the 1.5 egonetwork of the hub.

Subgraph Density: the density of the 1.5 egonetwork of the hub.

Neighborhood Number of Connection: the number of connections in the network received when removing from the 1.5 egonetwork of the hub the hub itself, and all edges directly connected to it.

Number of Strong Connected Components: the number of strong connected components of the 1.5 egonetwork of the hub the hub itself, and all edges directly connected to it.

Number of Weak Connected Components: number of weak connected components of the 1.5 egonetwork of the hub the hub itself, and all edges directly connected to it.

Average Number of Strong Connected Components: the average number of nodes in each strong connected components of the 1.5 egonetwork of the hub the hub itself, and all edges directly connected to it.

Average Number of Weak Connected Components: the average number of nodes in each weak connected components of the 1.5 egonetwork of the hub the hub itself, and all edges directly connected to it.

Subgraph Density: the density of the 1.5 egonetwork of the hub the hub itself, and all edges directly connected to it.
5.3 Anomalies Detection
In order to detect anomalies in the dynamics of the social network around the network’s hubs we use the LocalOutlierFactor (LOF) anomaly detection algorithm [9]. In other words, using the LOF algorithm for each number we detected days which anomaly features occurred and then by using ensemble of all the hubs that we detected which dates have the highest probability for anomaly (using majority voting method).
We do so by ranking each day according to the number of hubs that reported it as anomalous. Then, for each day we look at the 29 days that preceded it, and calculate the final score of the day by its relative position in terms of anomalyscore within those 30 days. Namely, a day would be reported as anomalous (e.g., likely to contain some emergency) if it is “more anomalous” compared to the past month, in terms of the number of hubscentered social networks influenced during it. Each day is given a score between 0 and 1, stating its relative “anomaly location” within its preceding 30 days.
5.4 Analytic Evaluation
Alongside its increased sensing capability, our proposed mechanism has also an additional overhead, in terms of additional edges that should be monitored, compared to the standard approach of “number of calls analysis”. This is the result of the following two reasons:

Hubs: Due to their high degree, whenever the edges associated with an additional hub are added to the monitored edges set they increase its size substantially (unlike the addition of a randomly selected node, that is expected to be of a much lower degree). Although this is often compensated by the hubs’ high “accessibility” to new information, the hubssampling method is expected to achieve poor performance for very low values of k (the number of monitored edges), as this implies very low number of hubs (and hence, low topographical coverage of the network).

1.5 EgoNetwork: For some node v, although the number of nodes in its 1 egonetwork equals exactly the number of nodes in its 1.5 egonetwork, the latter is usually expected to have substantially larger amount of edges. Those edges are used solely for extracting the topological features of the social network, and have little influence on the aggregate number of calls (as the number of calls on the edges directly connected to the hub is significantly larger than the calls on edges connecting two of its neighbors).
We therefore write the utilization of the Social Amplifier mechanism as follows:
whereas E is the “energy” supplied to the system for monitoring some k edges, E _{ INITIAL } is the overhead spent on monitoring the first few hubs until we achieve good topographical coverage of the network, E _{ AMPLIFIER } is the energy spent on maintaining a 1.5 egonetwork closure (that is, the number of edges of the 1.5 egonetwork minus the number of edges at the 1 egonetwork), and E _{ DETECT } denotes the resources spent on the actual detection of the signal.
We note that E _{ INITIAL } decreases with the time it takes the detection process to complete. In other words, as the event to be detected is more explicit and broadly observed, it will be detected using a shorter time, which implicitly increases the relative portion of E _{ INITIAL }. We can therefore write:
for α∈[0,1] the exposure coefficient of the event.
Notice that as the exposure coefficient of an event decreases, it means that additional edges (and nodes) are required in order to detect the event. For extreme low values of the exposure coefficient there is no longer much difference between adding “hubs” and adding random nodes (in terms of their degrees) to the monitored set of nodes. This means that the ratio between the number of edges between hubs’ neighbors and the edges to and from the hubs increases, resulting in an increase in E _{ AMPLIFIER }.
Namely, for high exposure coefficient values the ratio between E _{ AMPLIFIER } and E _{ DETECT } is proportional to the ratio between the average aggregate degrees of hubs’ neighbors and the average degree of the hubs themselves. For low exposure coefficient values this ratio converges to \(\frac{1}{\langle k\rangle}\) (denoting by 〈k〉 the average degree of the network):
denoting by k _{ MAX } the maximal degree, and for λ≥1 being the Social Amplification Constant of the network.
The same effect is obtained when the portion of the edges being monitored ϵ changes, as low values for ϵ cause the ratio \(\frac{E_{\mathit{AMPLIFIER}}}{E_{\mathit{DETECT}}}\) to decrease, and very high values of it cause it to converge to \(\frac{\lambda}{\langle k\rangle}\). We can therefore write:
We shall therefore rewrite Eq. (1) as follows:
Figure 3 illustrates the behavior of E _{ DETECT } as a function of the changes in the exposure coefficient α and in the portion of edges being monitored ϵ. Notice how E _{ DETECT } has a nonmonotonous dependency on α, obtaining a global maximum for intermediate values.
6 Simulation Evaluation
The goal of our experiments was to check how the two different methods for selecting the subset S _{ M } influence the time required by M to detect an event. In order to achieve this goal we simulated the spreading of events in generated scalefree graphs and measured the time taken for the mobile carrier to detect those events when using different coverage percentages and different methods for selecting the subset S _{ M }.
The main steps of our simulation are outlined in Algorithm 1. In Step 1, a scalefree graph, G〈V,E〉 with 100,000 nodes is randomly generated. In Step 2, different coverage percentages, cp, for the mobile operator are tested. In Steps 3–5, the nodes and edges of the mobile carrier M〈V _{ M },E _{ M }〉 are randomly selected, based on the coverage percentage cp. In Step 6, different numbers of initial witnesses to the event, w, are tested. The actual set of w witnesses is randomly selected in Step 7. In Step 8, different confidence levels c are tested. The confidence level is the minimum number of “spreading edges” (i.e. phone calls related to the event) that M has to sense in order to be confident that an event has occurred. In Step 9, different methods, f, for selecting S _{ M } is determined. In Steps 10–11, we iterate over the nodes in V in the order determined by f. In Step 12, the current iterated node is added to S _{ M }. In, Step 13, we simulate the spreading of an event on the configuration (G, M, W, S _{ M }, c). This is done by executing Algorithm 2, which returns the number of time steps required to detect the event on the given configuration. Finally, in Steps 14–15, we store the configuration parameters and the resulting number of time steps.
Next, we describe Algorithm 2. At each time step (Steps 3–12), we iterate over the set W of nodes who “know” about the event (Steps 4–10). At first, the set W consists only of the nodes who witnessed the event. Each node v in W calls one of its friend nodes, u∈E(v), to which it didn’t call before, and reports the event to it. If the edge (v, u) is being covered by M, then M has managed to detect a “spreading edge”, and the edge is added to D (Steps 6–8). Since u knows about the event, it is added to W (Step 9). The main loop ends when the set of detected “spreading edges”, D, is large enough, as required by c (Step 3). Finally, the number of time steps passed, t, is returned.
In order to reduce noise, we surrounded Steps 13, 3–19 and 1–20 of Algorithm 1 with three outer loops, each one executing 10 iterations.
The simulation results were analyzed as follows. First, for each coverage percentage cp, number of witnesses w, confidence c, and method f we plotted the required time steps t as a function of the monitoring percentage sp. Figure 4 shows the resulting plot for cp=0.1, w=5, c=4 and f=Hubs.
For each such plot, we calculated the value \(\hat{t}=\int_{0}^{1} \! t \, \mathrm{d} {sp}\). Intuitively, \(\hat{t}\) is the averaged required time steps over the different monitoring percentages. (Note that \(\hat{t}\) was calculated over the original data points and not over the smoothed ones.) Then, for each w, c, cp and f, we calculated \(\tilde{t}(w,c,cp,f)\), which is the average of \(\hat{t}\) values for all configurations with the same w, c, cp and f values (recall that Steps 13, 3–19 and 1–20 of Algorithm 1 were repeated 10 times each and therefore there are exactly 10^{3} such configurations).
As an illustrating example, Fig. 5 shows the influence of cp on \(\tilde{t}(w,c,cp,f)\) for the two different methods f when fixing w=5 and c=4.
Next, for each set of w, c and cp values, we calculated the delta in detection times, denoted as Δ(w,c,cp) and defined as follows:
Figures 6, 7, 8 and 9 show Δ(w,c,cp) for w=5, w=10, w=50 and w=100 respectively. Each of these figures includes 9 subfigures which correspond to the 9 different c values. Each subfigure illustrates the influence of cp on Δ(w,c,cp) for fixed w and c values.
Figures 6–9 demonstrate that none of the methods is absolutely superior to the other. More precisely, we observe that for very small and very large confidence values, the Random method outperforms the Hubs method. However, for some range of medium confidence values, the Hubs method becomes superior. We also see that this range depends greatly on the initial number of witnessing nodes w. In other words, for larger values of w, the range of medium confidence values slides to larger confidence values. This makes sense as larger w values require less time steps in order to achieve the same confidence level.
The above observations led us to adopt the definition of the exposure coefficient α (defined in Sect. 5.4), combines w and c into a single variable: α=log_{2}(c)/w. Figure 10 illustrates the influence of α and cp on Δ(α,cp) where Δ(α,cp) is the average of all Δ(w,c,cp) such that w⋅cp=α. (Note that the original results were smoothened with R=0.804 and R ^{2}=0.646.) As expected, the Hubs method outperforms the Random method for medium α values. In addition, the advantage of the Hubs method further increases with larger cp values.
Note that the efficiency of our proposed method as illustrated in Fig. 10 closely resembles the prediction of our analytic model, as discussed in Sect. 5.4, and specifically in Eq. (2) and Fig. 3.
7 Emergencies Detection Using Real World Data
For evaluating our proposed Social Amplification technique as an enhanced method for anomalies detection we have used a series of anomalous events that took place in the mobile network country, during the time where the call logs data was recorded. Figure 11 presents the events, including their “magnitude”, in terms of the timespan and size of population they influenced.
We have divided the anomalies into the following three groups:
 Concerts and Festivals:

Events that are anomalous, but whose existence is known in advance to a large enough group of people. Those include events number 9–16, as appears in Fig. 11.
 “Small exposure events”:

Anomalous events whose existence is unforeseen, and that were limited in their effect. Those include events numbers 1, 2, 5, 6.
 “Large exposure events”:

Anomalous events whose existence is unforeseen, that affected a large population. Those include events numbers 3, 4, 7, 8.
For each of the events we used the method described in Sect. 5 in order to rank each day between 0 and 1, according to its “anomalousness”. This was done for increasingly growing number of monitored edges, in order to track the evolution of the detection accuracy. The result of this process was a series a numeric vectors pairs: \((\mathcal{V}_{\mathit{BASE}} , \mathcal{V}_{\mathit{AMPLIFIED}})_{E}\), corresponding to the two networks used (e.g. the random network sampling for \(\mathcal{V}_{\mathit{BASE}}\) and the socialamplified hubssampling for \(\mathcal{V}_{\mathit{AMPLIFIED}}\)), for E edges which were monitored. In addition, we created a binary vector \(\hat{\mathcal{V}}\) having ‘1’ for anomalous days and ‘0’ otherwise.
For E edges which were monitored we denote by δ _{E} the difference between the correlation coefficient of \(\mathcal{V}_{\mathit{AMPLIFIED}}\) and \(\hat{\mathcal{V}}\), and the correlation coefficient of \(\mathcal{V}_{\mathit{BASE}}\) and \(\hat{\mathcal{V}}\), namely:
for \((\mathcal{V}_{\mathit{BASE}} , \mathcal{V}_{\mathit{AMPLIFIED}})_{E}\), and for CORR(x,y) the correlation coefficient function.
Notice that whereas δ _{E} measures the delta in detection accuracy, it has somewhat similar meaning to Δ(α,cp), which measures delta in detection speed.
Figure 12 presents the values of δ _{E} for number of monitored edges ranging between 300 and 800. It can be seen how the hubssampling based social amplifier technique outperforms the basic randomsampling method. Furthermore, it can be seen that the positive delta increases with the increase in the amount of available resources (namely, number of monitored edges). This coincides with the analytic model that appears in Sect. 5 (and specifically, Fig. 3), as well as with the simulative analysis as illustrated in Fig. 10.
Figure 13 presents the values of δ _{E} for number of monitored edges between 300 and 800, for the three types of events. Notice how the results strongly coincide with the analytic model as is illustrated in Fig. 3, as concerts and events have the highest exposure value a, and the small exposure events have the lowest value.
8 Conclusions
This paper has demonstrated that under specified, and fairly broad, conditions, focusing on the neighborhood around a hub (the connections among the alters) enables efficient detection of events external to the network that provoke spreading communication within the network. Hubs act as collectors (and as a result, amplifiers) of social information, through facilitating the spread of communication in their immediate neighborhood. Traces of small scale information diffusion processes are more likely to be revealed when tracking hubs’ activities compared to randomly selected nodes. In this work we show that this effect is so intense that in many cases it outperforms the analysis of significantly larger amount of random nodes (in order to compensate of the fact that the analysis of a single hub requires coverage of much more edges than required for an arbitrary node). We dub this effect “Social Amplification” and demonstrate it both analytically and experimentally.
We anticipate, however, that this methodology could be substantially extended and refined. For example, because hubs can sometimes be major bottlenecks, it is plausible that other neighborhoods within a large scale network would more efficiently act as social amplifiers. For example, it is possible that generally densely connected communities within a network would more efficiently disseminate observable changes in communication behavior, virtually acting as a kind of “distributed hub” (the dramatic effect of the network topology on the dynamics of information diffusion in communities was demonstrated in works such as [11, 19]). It is also possible that the incorporation of other kinds of information about the properties of nodes would greatly improve the model.
References
Aharony, N., Pan, W., Ip, C., Khayal, I., Pentland, A.: Social fMRI: Investigating and shaping social mechanisms in the real world. Pervasive Mob. Comput. 7(6), 643–659 (2011).
Albert, R., Jeong, H., Barabási, A.: Error and attack tolerance of complex networks. Nature 406(6794), 378–382 (2000)
Altshuler, Y., Aharony, N., Fire, M., Elovici, Y., Pentland, A.: Incremental learning with accuracy prediction of social and individual properties from mobilephone data. CoRR (2011)
Altshuler, Y., Aharony, N., Pentland, A., Elovici, Y., Cebrian, M.: Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell. Syst. 26(6), 22–30 (2011). doi:10.1109/MIS.2011.78
Altshuler, Y., Fire, M., Aharony, N., Elovici, Y., Pentland, A.: How many makes a crowd? On the correlation between groups’ size and the accuracy of modeling. In: Intl. Conf. on Social Computing, BehavioralCultural Modeling and Prediction, pp. 43–52. Springer, Berlin (2012)
Altshuler, Y., Fire, M., Aharony, N., Volkovich, Z., Elovici, Y., Pentland, A.S.: Tradeoffs in social and behavioral modeling in mobile networks. In: Social Computing, BehavioralCultural Modeling and Prediction, pp. 412–423. Springer, Berlin (2013)
Bagrow, J., Wang, D., Barabási, A.: Collective response of human populations to largescale emergencies. PLoS ONE 6(3), e17680 (2011)
Barabasi, A.: The origin of bursts and heavy tails in human dynamics. Nature 435(7039), 207–211 (2005)
Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: Lof: identifying densitybased local outliers. In: ACM Sigmod Record, vol. 29, pp. 93–104. ACM, New York (2000)
Candia, J., González, M., Wang, P., Schoenharl, T., Madey, G., Barabási, A.: Uncovering individual and collective human dynamics from mobile phone records. J. Phys. A, Math. Theor. 41, 224015 (2008)
Choi, H., Kim, S., Lee, J.: Role of network structure and network effects in diffusion of innovations. Ind. Mark. Manage. 39(1), 170–177 (2010)
Eagle, N., Pentland, A., Lazer, D.: Inferring social network structure using mobile phone data. Proc. Natl. Acad. Sci. USA 106, 15274–15278 (2009)
Eagle, N., Macy, M., Claxton, R.: Network diversity and economic development. Science 328(5981), 1029–1031 (2010)
Gonzalez, M.C., Hidalgo, C.A., Barabasi, A.L.: Understanding individual human mobility patterns. Nature 453(7196), 779–782 (2008). http://dx.doi.org/10.1038/nature06958
Granovetter, M.: The strength of weak ties. Am. J. Sociol. 78(6), 1360–1380 (1973)
Herrero, C.: Ising model in scalefree networks: a Monte Carlo simulation. Phys. Rev. E 69(6), 067109 (2004)
Huberman, B., Romero, D., Wu, F.: Social networks that matter: twitter under the microscope. First Monday 14(1), 8 (2009)
Leskovec, J., Backstrom, L., Kleinberg, J.: Memetracking and the dynamics of the news cycle. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 497–506 (2009). CiteSeer
Nicosia, V., Bagnoli, F., Latora, V.: Impact of network structure on a model of diffusion and competitive interaction. Europhys. Lett. 94, 68009 (2011)
Onnela, J., Saramäki, J., Hyvönen, J., Szabó, G., Lazer, D., Kaski, K., Kertész, J., Barabási, A.: Structure and tie strengths in mobile communication networks. Proc. Natl. Acad. Sci. 104(18), 7332 (2007)
Palla, G., Barabasi, A., Vicsek, T.: Quantifying social group evolution. Nature 446(7136), 664–667 (2007)
PastorSatorras, R., Vespignani, A.: Epidemic spreading in scalefree networks. Phys. Rev. Lett. 86(14), 3200–3203 (2001)
PastorSatorras, R., Vespignani, A.: Evolution and Structure of the Internet: A Statistical Physics Approach. Cambridge University Press, Cambridge (2007)
Waclaw, B.: Statistical mechanics of complex networks. arXiv:0704.3702 (2007)
Wassermann, S., Faust, K.: Social Network Analysis: Methods and Applications, vol. 8. Cambridge University Press, Cambridge (1994)
Ynet: Carmel fire fully extinguished. http://www.ynetnews.com/articles/0,7340,L3994847,00.html (2010)
Author information
Authors and Affiliations
Corresponding author
Additional information
This work was supported in part by the Robert Shillman Fund for Global Security—Technion NorthEastern Partnership and the Defense Threat Reduction Agency.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution License which permits any use, distribution, and reproduction in any medium, provided the original author(s) and the source are credited.
About this article
Cite this article
Altshuler, Y., Fire, M., Shmueli, E. et al. The Social Amplifier—Reaction of Human Communities to Emergencies. J Stat Phys 152, 399–418 (2013). https://doi.org/10.1007/s109550130759z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s109550130759z