Abstract
With the increasing popularity of user-contributed sites, the phenomenon of “social pollution”, the presence of abusive posts has become increasingly prevalent. In this paper, we describe a novel approach to investigate negative behavior dynamics in online social networks as epidemic phenomena. We show that using hybrid automata, it is possible to explain the contagion of antinormative behavior in certain online commentaries. We present two variations of a finite-state machine model for time-varying epidemic dynamics, namely triggered state transition and iterative local regression, which differ with respect to accuracy and complexity.We validate the model with experiments over a dataset of 400,000 comments on 800 YouTube videos, classified by genre, and indicate how different epidemic patterns of behavior can be tied to specific interaction patterns among users.
Similar content being viewed by others
Notes
For simplicity, we assume that comment ratings are not the product of up-voting by trolls or spammers.
References
Alchemyapi (2016). http://www.alchemyapi.com. Accessed Mar 2016
Agichtein E, Castillo C, Donato D, Gionis A, Mishne G (2008) Finding high-quality content in social media. In: Proceedings of the international conference on Web search and web data mining. ACM, pp 183–194
Antonio KES, Pinol CMN, Banzon RS (2010) An ising model approach to malware epidemiology. arXiv:1007.4938 (arXiv preprint)
Barbier G, Liu H (2011) Information provenance in social media. In: Social computing, behavioral-cultural modeling and prediction. Springer, New York, pp 276–283
Carty SL (2016). Social networking abuse. http://socialnetworking.lovetoknow.com/Social_Networking_Abuse. Accessed Mar 2016
Castillo C, Mendoza M, Poblete B (2011) Information credibility on twitter. In: Proceedings of the 20th International Conference on World wide web. ACM, pp 675–684
Diener E, Lusk R, DeFour D, Flax R (1980) Deindividuation: effects of group size, density, number of observers, and group member similarity on self-consciousness and disinhibited behavior. J Personal Soc Psychol 39(3):449. http://search.proquest.com/docview/1295903854?accountid=13158. Accessed on 23 Feb 2013
Fan J, Gijbels I (1996) Local polynomial modelling and its applications: monographs on statistics and applied probability, 1 edn., vol 66. Chapman & Hall/CRC Monographs on Statistics & Applied Probability, Chapman & Hall
Festinger L, Pepitone A, Newcomb T (1952) Some consequences of de-individuation in a group. J Abnorm Soc Psychol 47:382. http://search.proquest.com/docview/1290390091?accountid=13158. Accessed on 21 Feb 2013
Garetto M, Gong W, Towsley D (2003) Modeling malware spreading dynamics. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol 3, pp 1869–1879. IEEE
Gino F, Ayal S, Ariely D (2009) Contagion and differentiation in unethical behavior. Psychol Sci 20(3):393–398. doi:10.1111/j.1467-9280.2009.02306.x
Gino F, Gu J, Zhong C (2009) Contagion or restitution? When bad apples can motivate ethical behavior. J Exp Soc Psychol 45(6):1299–1302
Griffin C, Brooks RR, Schwier J (2011) A hybrid statistical technique for modeling non-linear recurrent tracks in a compact set. IEEE Trans Autom Control 56(8):1926–1931
Griffin C, Brooks RR, Schwier JM (2011) A hybrid statistical technique for modeling recurrent tracks in a compact set. IEEE Trans Autom Control 56(8):1926–1931. http://dblp.uni-trier.de/db/journals/tac/tac56.html (#GriffinBS11)
Gronlund A, Holme P (2005) A network-based threshold model for the spreading of fads in society and markets. arXiv:0505050
Hu X, Tang J, Zhang Y, Liu H (2013) Social spammer detection in microblogging. In: Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence, IJCAI’13, pp 2633–2639. AAAI Press. http://dl.acm.org/citation.cfm?id=2540128.2540508
Hui P, Buchegger S (2009) Groupthink and peer pressure: social influence in online social network groups. In: International Conference on Advances in Social Network Analysis and Mining (ASONAM). IEEE, Los Alamitos, pp 53–59. doi:10.1109/asonam.2009.17
lsqnonlin-mathworks. http://www.mathworks.com/help/optim/ug/lsqnonlin.html
Java A, Kolari P, Finin T, Oates T (2006) Modeling the spread of influence on the blogosphere. In: Proceedings of the 15th international world wide web conference, pp 22–26
Kantchelian A, Ma J, Huang L, Afroz S, Joseph A, Tygar JD (2012) Robust detection of comment spam using entropy rate. In: Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence., AISec ’12. ACM, New York, pp 59–70
Kiesler S, Sproull L (1992) Group decision making and communication technology. Organ Behav Hum Decis Process 52(1):96–123
Kwak H, Lee C, Park H, Moon S (2010) What is twitter, a social network or a news media? In: Proceedings of the 19th international conference on World wide web. ACM, pp 591–600
List of swear words and curse words (2016). http://www.noswearing.com/dictionary. Accessed Mar 2016
Lee K, Caverlee J, Webb S (2010) Uncovering social spammers: Social honeypots + machine learning. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR ’10, pp 435–442
Lerman K, Ghosh R (2010) Information contagion: an empirical study of the spread of news on digg and twitter social networks. ICWSM 10:90–97
Lewis K, Gonzalez M, Kaufman J (2012) Social selection and peer influence in an online social network. Proc Nat Acad Sci 109(1):68–72. doi:10.1073/pnas.1109739109
Livingstone S (2008) Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media Soc 10(3):393–411
Ozonoff A, Sukpraprut S, Sebastiani P (2006) Modeling seasonality of influenza with hidden markov models. In: Proceedings of the American Statistical Association
Postmes T, Spears R (1998) Deindividuation and antinormative behavior: a meta-analysis. Psychol Bull 123(3):238–259. http://search.proquest.com/docview/614333709?accountid=13158
Rodkin PC (2004) Peer ecologies of aggression and bullying. Bull Am Schools:87–106
Siersdorfer S, Chelaru S, Nejdl W, San Pedro J (2010) How useful are your comments?: analyzing and predicting youtube comments and comment ratings. In: Proceedings of the 19th international conference on World wide web. ACM, pp 891–900
Squicciarini A, Griffin C (2012) An informed model of personal information release in social networking sites. In: Proceedings of the Fourth IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT). arXiv:1206.0981
Sridharan V, Shankar V, Gupta M (2012) Twitter games: How successful spammers pick targets. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC ’12. ACM, New York, pp 389–398. doi:10.1145/2420950.2421007
Sternberg J (2012) Misbehavior in cyber places: The regulation of online conduct invirtual communities on the Internet. Rowman & Littlefield
Strat YL, Carrat F (1999) Monitoring epidemiologic surveillance data using hidden Markov models. Stat Med 18(24):3463–3478
Thomas K, Grier C, Song D, Paxson V (2011) Suspended accounts in retrospect: An analysis of twitter spam. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC ’11. ACM, New York, pp 243–258. doi:10.1145/2068816.2068840
Thommes RW, Coates M (2006) Epidemiological modelling of peer-to-peer viruses and pollution. INFOCOM 6:1–12
Yang J, Leskovec J (2010) Modeling information diffusion in implicit networks. In: Data Mining (ICDM), IEEE 10th International Conference on. IEEE, Los Alamitos, pp 599–608. doi:10.1109/icdm.2010.22
Acknowledgments
Portions of Dr. Griffin’s, Dr. Squicciarini’s and Dr. Rajtmajer’s work were supported by the Army Research Office under Grant W911NF-13-1-0271. Portions of Dr. Squicciarini’s work were additionally supported by the Air Force Office of Scientific Research, Grant Number FA9550-15-1-0149.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Liao, C., Squicciarini, A., Griffin, C. et al. A hybrid epidemic model for deindividuation and antinormative behavior in online social networks. Soc. Netw. Anal. Min. 6, 13 (2016). https://doi.org/10.1007/s13278-016-0321-5
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13278-016-0321-5