Skip to main content
Log in

Network topology and mean infection times

  • Original Article
  • Published:
Social Network Analysis and Mining Aims and scope Submit manuscript

Abstract

A fundamental concept of social network analysis is centrality. Many analyses represent the network topology in terms of concept transmission/variation, e.g., influence, social structure, community or other aggregations. Even when the temporal nature of the network is considered, analysis is conducted at discrete points along a continuous temporal scale. Unfortunately, well-studied metrics of centrality do not take varying probabilities into account. The assumption that social and other networks that may be physically stationary, e.g., hard wired, are conceptually static in terms of information diffusion or conceptual aggregation (communities, etc.) can lead to incorrect conclusions. Our findings illustrate, both mathematically and experimentally, that if the notion of network topology is not stationary or fixed in terms of the concept, e.g., groups, belonging, community or other aggregations, centrality should be viewed probabilistically. We show through some surprising examples that study of transmission behavior based solely on a graph’s topological and degree properties is lacking when it comes to modeling network propagation or conceptual (vs. physical) structure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. In the number of links sense, since in point set topology the network is either connected, or it is not. Of course, homological considerations can consider the extra link structures.

  2. Please note though that even though the heuristic has its strengths and is, on the whole, a good model of virus spread, it also has its weaknesses (e.g., Lewis 2009).

  3. We will use similar notation in the rest of the paper. If we do not specify a node it is understood it is \(n_{\mathrm{src}}\) that is under consideration.

References

  • Aditya Prakash B (2012) Understanding and managing propagation on large networks—theory, algorithms, and models, Ph.D. thesis. Computer Science Department, Carnegie Mellon University

  • Aditya Prakash B, Chakrabarti D, Faloutsos M, Valler N, Faloutsos C (2011) Threshold conditions for arbitrary cascade models on arbitrary networks. In: Proceedings of the 2011 IEEE 11th international conference on data mining, ICDM ’11. IEEE Computer Society, pp 537–546

  • Bakshy E, Rosenn I, Marlow C, Adamic L (2012) The role of social networks in information diffusion. In: Proceedings of the 21st international conference on World Wide Web. ACM, pp 519–528

  • Bonacich P (1987) Power and centrality: a family of measures. Am J Sociol 92(5):1170–1182

    Article  Google Scholar 

  • Borgatti SP (2005) Centrality and network flow. Soc Netw 27(1):55–71

    Article  Google Scholar 

  • Burt RS (1982) Toward a structural theory of action: network models of stratification, perception and action. Academic Press, New York

    Book  Google Scholar 

  • Chakrabarti D, Wang Y, Wang C, Leskovec J, Faloutsos C (2008) Epidemic thresholds in real networks. ACM Trans Inf Syst Secur 10(4):1:1–1:26

    Article  Google Scholar 

  • Correa CD, Crnovrsanin T, Ma K-L (2012) Visual reasoning about social networks using centrality sensitivity. IEEE Trans Vis Comput Graph 18(1):106–120

    Article  Google Scholar 

  • Freeman LC (1979) Centrality in social networks conceptual clarification. Soc Netw 1(3):215–239

    Article  Google Scholar 

  • Friedkin NE (1991) Theoretical foundations for centrality measures. Am J Sociol 96(6):1478–1504

    Article  Google Scholar 

  • Gould PR (1967) On the geographical interpretation of eigenvalues. Trans Inst Br Geogr 42:53–86

    Article  Google Scholar 

  • Guille A, Hacid H, Favre C, Zighed DA (2013) Information diffusion in online social networks: a survey. ACM SIGMOD Rec 42(2):17–28

    Article  Google Scholar 

  • Howard RA (1971) Dynamic probabilistic systems, vol 1: Markov models. [Reprint: Howard RA (2007) Dynamic probabilistic systems, vol 2: Semi-Markov and decision processes]. Dover, Mineola, NY

  • Hyden P, Moskowitz IS, Russell S (2016) Using network topology to supplement high assurance systems. In: Proceedings of the HASE 2016. IEEE Press

  • Jamakovic A, Kooij RE, Van Mieghem P, van Dam ER (2006) Robustness of networks against viruses: the role of the spectral radius. In: Proceedings of the 2011 IEEE 11th international conference on data mining, symposium on communications and vehicular technology. IEEE, pp 35–38

  • Lancaster P, Tismenetsky M (1985) The theory of matrices, 2nd edn. Academic Press, New York

    MATH  Google Scholar 

  • Lang S (1971) Algebra. Addison-Wesley, Reading

    MATH  Google Scholar 

  • Lewis T (2009) Network science. Wiley, New York

    Book  MATH  Google Scholar 

  • Li K, Tan Y, Zhang W, Wei W (2015) The research of e-mail virus spread based on complex network. Int J Comput Sci Math 6(2):188–200

    Article  MathSciNet  Google Scholar 

  • Louni A, Subbalakshmi KP (2014) Diffusion of information in social networks. In: Social networking. Springer, Berlin, pp 1–22

  • Malinick TE, Tindall DB, Diani M (2013) Network centrality and social movement media coverage: a two-mode network analytic approach. Soc Netw 35(2):148–158

    Article  Google Scholar 

  • McKendrick AG (1925) Applications of mathematics to medical problems. Proc Edinb Math Soci 44(6):1–34

    Google Scholar 

  • McRoberts B (2010, 9 June) Internet plays integral role in decision-making: study. China Daily, p. 16

  • Minc H (1988) Nonnegative matrices. Wiley, New York

    MATH  Google Scholar 

  • Moore EF, Shannon CE (1956) Reliable circuits using less reliable relays: part I. J Frankl Inst 262:191–208

    Article  MathSciNet  MATH  Google Scholar 

  • Moore EF, Shannon CE (1956) Reliable circuits using less reliable relays: part II. J Frankl Inst 262:281–297

    Article  MathSciNet  MATH  Google Scholar 

  • Newman MEJ (2010) Networks an introduction. Oxford University Press, Oxford

    Book  MATH  Google Scholar 

  • Nowzari C, Preciado VM, Pappas GJ (2015) Analysis and control of epidemics: a survey of spreading processes on complex networks. arXiv preprint arXiv:1505.00768

  • Ross S (1976) A first course in probability. Macmillan, New York

    MATH  Google Scholar 

  • Saito K, Kimura M, Ohara K, Motoda H (2016) Super mediator—a new centrality measure of node importance for information diffusion over social network. Inf Sci 329:985–1000

    Article  Google Scholar 

  • Scott J (2012) Social network analysis. Sage, Beverley Hills

    Google Scholar 

  • Serrano E, Iglesias CA, Garijo M (2015) A survey of Twitter rumor spreading simulations. In: Computational collective intelligence. Springer, Berlin, pp 113–122

  • Shneur Zalman of Liadi (1797) Tanya—Likutei Amarim. Kehot. http://store.kehotonline.com/prodinfo.asp?number=EAR-TANY.L

  • Snell JL (1988) Introduction to probability. Random House, New York

    MATH  Google Scholar 

  • Susarla A, Oh J-H, Tan Y (2012) Social networks and the diffusion of user-generated content: evidence from Youtube. Inf Syst Res 23(1):23–41

    Article  Google Scholar 

  • Tang X, Quan Y, Miao Q, Hou R, Deng K (2015) Information propagation with retweet probability on online social network. In: Intelligent computation in big data era. Springer, Berlin, pp 326–333

  • Van Mieghem P (2006) Performance analysis of communications networks and systems. Cambridge University Press, Cambridge

    Book  MATH  Google Scholar 

  • Van Mieghem P (2011a) Graph spectra for complex networks. Cambridge University Press, Cambridge

    MATH  Google Scholar 

  • Van Mieghem P (2011b) The n-intertwined SIS epidemic network model. Computing 93:147–169

    Article  MathSciNet  MATH  Google Scholar 

  • Van Mieghem P, Omic J, Kooij R (2009) Virus spread in networks. IEEE/ACM Trans Netw 17(1):1–14

    Article  Google Scholar 

  • Wang Y, Chakrabarti D, Wang C, Faloutsos C (2003) Epidemic spreading in real networks: an eigenvalue viewpoint. In: SRDS, pp 25–34

  • Wasserman S, Faust K (1994) Social network analysis: methods and applications, vol 8. Cambridge University Press, Cambridge

    Book  MATH  Google Scholar 

  • Whittle P (1970) Probability. Penguin Books, Baltimore

    MATH  Google Scholar 

  • Zang W, Zhang P, Zhou C, Guo L (2015) Locating multiple sources in social networks under the sir model: a divide-and-conquer approach. J Comput Sci 10:278–287

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

We acknowledge our students I. Ray, R. Kang and G. Whelan and our colleagues P. Cotae, P. Safier and M. Kang. Special thanks go to Swmbo Heilizer and Andre Harrison and to the reviewers for their very helpful suggestions and corrections.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ira S. Moskowitz.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Moskowitz, I.S., Hyden, P. & Russell, S. Network topology and mean infection times. Soc. Netw. Anal. Min. 6, 34 (2016). https://doi.org/10.1007/s13278-016-0338-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13278-016-0338-9

Keywords

Navigation