Skip to main content
Log in

A hybrid epidemic model for deindividuation and antinormative behavior in online social networks

  • Original Article
  • Published:
Social Network Analysis and Mining Aims and scope Submit manuscript

Abstract

With the increasing popularity of user-contributed sites, the phenomenon of “social pollution”, the presence of abusive posts has become increasingly prevalent. In this paper, we describe a novel approach to investigate negative behavior dynamics in online social networks as epidemic phenomena. We show that using hybrid automata, it is possible to explain the contagion of antinormative behavior in certain online commentaries. We present two variations of a finite-state machine model for time-varying epidemic dynamics, namely triggered state transition and iterative local regression, which differ with respect to accuracy and complexity.We validate the model with experiments over a dataset of 400,000 comments on 800 YouTube videos, classified by genre, and indicate how different epidemic patterns of behavior can be tied to specific interaction patterns among users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. For simplicity, we assume that comment ratings are not the product of up-voting by trolls or spammers.

References

  • Alchemyapi (2016). http://www.alchemyapi.com. Accessed Mar 2016

  • Agichtein E, Castillo C, Donato D, Gionis A, Mishne G (2008) Finding high-quality content in social media. In: Proceedings of the international conference on Web search and web data mining. ACM, pp 183–194

  • Antonio KES, Pinol CMN, Banzon RS (2010) An ising model approach to malware epidemiology. arXiv:1007.4938 (arXiv preprint)

  • Barbier G, Liu H (2011) Information provenance in social media. In: Social computing, behavioral-cultural modeling and prediction. Springer, New York, pp 276–283

  • Carty SL (2016). Social networking abuse. http://socialnetworking.lovetoknow.com/Social_Networking_Abuse. Accessed Mar 2016

  • Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th International Conference on World wide web. ACM, pp 675–684

  • Diener E, Lusk R, DeFour D, Flax R (1980) Deindividuation: effects of group size, density, number of observers, and group member similarity on self-consciousness and disinhibited behavior. J Personal Soc Psychol 39(3):449. http://search.proquest.com/docview/1295903854?accountid=13158. Accessed on 23 Feb 2013

  • Fan J, Gijbels I (1996) Local polynomial modelling and its applications: monographs on statistics and applied probability, 1 edn., vol 66. Chapman & Hall/CRC Monographs on Statistics & Applied Probability, Chapman & Hall

  • Festinger L, Pepitone A, Newcomb T (1952) Some consequences of de-individuation in a group. J Abnorm Soc Psychol 47:382. http://search.proquest.com/docview/1290390091?accountid=13158. Accessed on 21 Feb 2013

  • Garetto M, Gong W, Towsley D (2003) Modeling malware spreading dynamics. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol 3, pp 1869–1879. IEEE

  • Gino F, Ayal S, Ariely D (2009) Contagion and differentiation in unethical behavior. Psychol Sci 20(3):393–398. doi:10.1111/j.1467-9280.2009.02306.x

    Article  Google Scholar 

  • Gino F, Gu J, Zhong C (2009) Contagion or restitution? When bad apples can motivate ethical behavior. J Exp Soc Psychol 45(6):1299–1302

    Article  Google Scholar 

  • Griffin C, Brooks RR, Schwier J (2011) A hybrid statistical technique for modeling non-linear recurrent tracks in a compact set. IEEE Trans Autom Control 56(8):1926–1931

    Article  MathSciNet  Google Scholar 

  • Griffin C, Brooks RR, Schwier JM (2011) A hybrid statistical technique for modeling recurrent tracks in a compact set. IEEE Trans Autom Control 56(8):1926–1931. http://dblp.uni-trier.de/db/journals/tac/tac56.html (#GriffinBS11)

  • Gronlund A, Holme P (2005) A network-based threshold model for the spreading of fads in society and markets. arXiv:0505050

  • Hu X, Tang J, Zhang Y, Liu H (2013) Social spammer detection in microblogging. In: Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence, IJCAI’13, pp 2633–2639. AAAI Press. http://dl.acm.org/citation.cfm?id=2540128.2540508

  • Hui P, Buchegger S (2009) Groupthink and peer pressure: social influence in online social network groups. In: International Conference on Advances in Social Network Analysis and Mining (ASONAM). IEEE, Los Alamitos, pp 53–59. doi:10.1109/asonam.2009.17

  • lsqnonlin-mathworks. http://www.mathworks.com/help/optim/ug/lsqnonlin.html

  • Java A, Kolari P, Finin T, Oates T (2006) Modeling the spread of influence on the blogosphere. In: Proceedings of the 15th international world wide web conference, pp 22–26

  • Kantchelian A, Ma J, Huang L, Afroz S, Joseph A, Tygar JD (2012) Robust detection of comment spam using entropy rate. In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence., AISec ’12. ACM, New York, pp 59–70

  • Kiesler S, Sproull L (1992) Group decision making and communication technology. Organ Behav Hum Decis Process 52(1):96–123

    Article  Google Scholar 

  • Kwak H, Lee C, Park H, Moon S (2010) What is twitter, a social network or a news media? In: Proceedings of the 19th international conference on World wide web. ACM, pp 591–600

  • List of swear words and curse words (2016). http://www.noswearing.com/dictionary. Accessed Mar 2016

  • Lee K, Caverlee J, Webb S (2010) Uncovering social spammers: Social honeypots + machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’10, pp 435–442

  • Lerman K, Ghosh R (2010) Information contagion: an empirical study of the spread of news on digg and twitter social networks. ICWSM 10:90–97

    Google Scholar 

  • Lewis K, Gonzalez M, Kaufman J (2012) Social selection and peer influence in an online social network. Proc Nat Acad Sci 109(1):68–72. doi:10.1073/pnas.1109739109

    Article  Google Scholar 

  • Livingstone S (2008) Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media Soc 10(3):393–411

    Article  Google Scholar 

  • Ozonoff A, Sukpraprut S, Sebastiani P (2006) Modeling seasonality of influenza with hidden markov models. In: Proceedings of the American Statistical Association

  • Postmes T, Spears R (1998) Deindividuation and antinormative behavior: a meta-analysis. Psychol Bull 123(3):238–259. http://search.proquest.com/docview/614333709?accountid=13158

  • Rodkin PC (2004) Peer ecologies of aggression and bullying. Bull Am Schools:87–106

  • Siersdorfer S, Chelaru S, Nejdl W, San Pedro J (2010) How useful are your comments?: analyzing and predicting youtube comments and comment ratings. In: Proceedings of the 19th international conference on World wide web. ACM, pp 891–900

  • Squicciarini A, Griffin C (2012) An informed model of personal information release in social networking sites. In: Proceedings of the Fourth IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT). arXiv:1206.0981

  • Sridharan V, Shankar V, Gupta M (2012) Twitter games: How successful spammers pick targets. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC ’12. ACM, New York, pp 389–398. doi:10.1145/2420950.2421007

  • Sternberg J (2012) Misbehavior in cyber places: The regulation of online conduct invirtual communities on the Internet. Rowman & Littlefield

  • Strat YL, Carrat F (1999) Monitoring epidemiologic surveillance data using hidden Markov models. Stat Med 18(24):3463–3478

    Article  Google Scholar 

  • Thomas K, Grier C, Song D, Paxson V (2011) Suspended accounts in retrospect: An analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC ’11. ACM, New York, pp 243–258. doi:10.1145/2068816.2068840

  • Thommes RW, Coates M (2006) Epidemiological modelling of peer-to-peer viruses and pollution. INFOCOM 6:1–12

    Google Scholar 

  • Yang J, Leskovec J (2010) Modeling information diffusion in implicit networks. In: Data Mining (ICDM), IEEE 10th International Conference on. IEEE, Los Alamitos, pp 599–608. doi:10.1109/icdm.2010.22

Download references

Acknowledgments

Portions of Dr. Griffin’s, Dr. Squicciarini’s and Dr. Rajtmajer’s work were supported by the Army Research Office under Grant W911NF-13-1-0271. Portions of Dr. Squicciarini’s work were additionally supported by the Air Force Office of Scientific Research, Grant Number FA9550-15-1-0149.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sarah Rajtmajer.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liao, C., Squicciarini, A., Griffin, C. et al. A hybrid epidemic model for deindividuation and antinormative behavior in online social networks. Soc. Netw. Anal. Min. 6, 13 (2016). https://doi.org/10.1007/s13278-016-0321-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13278-016-0321-5

Keywords

Navigation