skip to main content
10.1145/2425296.2425299acmconferencesArticle/Chapter ViewAbstractPublication PagessiggraphConference Proceedingsconference-collections
research-article

Modeling of bot usage diffusion across social networks in MMORPGs

Published: 26 November 2012 Publication History

Abstract

User interactions in massively multiplayer online role-playing games (MMORPGs) generate social networks and diffuse user behavior throughout the network. We test the diffusion model in the adoption of a game bot among players connected via goal-oriented communities using real data provided by a major MMORPG company. In the model based on a probabilistic diffusion process, we used expectation maximization to infer the diffusion probability of game bot usage. The experimental results showed that the diffusion model can explain the spread of malicious behavior.

References

[1]
A. R. Kang, J. Woo, J. P., and Kim, H. K. 2012. Online game bot detection based on party-play log analysis. Computers & Mathematics with Applications.
[2]
Bass, F. 1969. A new product growth model for consumer durables. Management Science 15, 215--227.
[3]
Centola, D. 2010. The spread of behavior in an online social network experiment. Science 329, 1194--1197.
[4]
D. Gruhl, R. Guha, D. L.-N., and Tomkins, A. 2004. Information diffusion through blogspace. In 13th International Conference on World Wide Web, 491--501.
[5]
D. M. Gorman, J. Mezic, I. M., and Gruenewald, P. J. 2006. Agent-based modeling of drinking behavior: a preliminary model and potential applications to theory and practice. Journal Information 96.
[6]
D. M. Romero, B. M., and Kleinberg, J. 2011. Differences in the mechanics of information diffusion across topics: Idioms, political hashtags, and complex contagion on twitter. In WWW '11 Proceedings of the 20th international conference on World wide web, 695--704.
[7]
D. M. Romero, C. M. Kribs-Zaleta, A. M., and Orbe, C. 2011. An epidemiological approach to the spread of political third parties. Discrete and Continuous Dynamical Systems-Series B (DCDS-B) 15, 707--738.
[8]
E. Bakshy, J. M. Hofman, W. A. M., and Watts, D. J. 2011. Everyone's an influencer: quantifying influence on twitter. In Proceedings of the fourth ACM international conference on Web search and data mining, 65--74.
[9]
F. J. Santonja, A. C. T., and Villanueva, R. J. 2008. A mathematical model of the pressure of an extreme ideology on a society. Mathematical Models in Life Sciences & Engineering 56, 836--846.
[10]
Granovetter, M. S. 1973. The strength of weak ties. American Journal of Sociology 78, 1360--1380.
[11]
Granovetter, M. 1987. Threshold models of collective behavior. American Journal of Sociology 83, 1420--1443.
[12]
Habermas, J. 2006. Political communication in media society: Does democracy still enjoy an epistemic dimension? the impact of normative theory on empirical research1. Communication Theory 16, 411--426.
[13]
Ho, R. 1998. The intention to give up smoking: Disease versus social dimensions. The Journal of social psychology 138, 368--380.
[14]
J. Goldenberg, B. L., and Muller, E. 2001. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing letters 12, 211--223.
[15]
J. Leskovec, L. A. A., and Huberman, B. A. 2007. The dynamics of viral marketing. The dynamics of viral marketing 1, 1--39.
[16]
K. Saito, R. N., and Kimura, M. 2008. Prediction of information diffusion probabilities for independent cascade model. In 12th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, 67--75.
[17]
M. Haggith, Prabhu, R. C. C. R. B. T. A. M. H. 2003. Infectious ideas: Modelling the diffusion of ideas across social networks small-scale forest economics. Management and Policy 2, 225--239.
[18]
McAdam, D. 1986. Recruitment to high-risk activism: The case of freedom summer. American Journal of Sociology 92, 64--90.
[19]
Rowe, D. C., and Rodgers, J. L. 1991. Adolescent smoking and drinking: Are they epidemics? Journal of Studies on Alcohol 52.
[20]
S. Son, A. R. Kang, H. K. T. K. J. P. e. a. 2012. Analysis of context dependence in social interaction networks of a massively multiplayer online role-playing game. PloS one 7, e33918.
[21]
Varvello, M., and Voelker, G. M. 2010. Second life: a social network of humans and bots. In NOSSDAV '10 Proceedings of the 20th international workshop on Network and operating systems support for digital audio and video, 9--14.
[22]
Wu, X., and Liu, Z. 2008. How community structure influences epidemic spread in social networks. Physica A: Statistical Mechanics and its Applications 387, 623--630.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WASA '12: Proceedings of the Workshop at SIGGRAPH Asia
November 2012
178 pages
ISBN:9781450318358
DOI:10.1145/2425296
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 November 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. diffusion model
  2. game bot
  3. online game
  4. social contagion

Qualifiers

  • Research-article

Conference

SA '12
Sponsor:
SA '12: SIGGRAPH Asia 2012
November 26 - 27, 2012
Singapore, Singapore

Acceptance Rates

Overall Acceptance Rate 4 of 5 submissions, 80%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Detecting and Preventing Online Game Bots in MMORPGsEncyclopedia of Computer Graphics and Games10.1007/978-3-031-23161-2_13(577-584)Online publication date: 5-Jan-2024
  • (2020)Finding Automated (Bot, Sensor) or Semi-Automated (Cyborg) Social Media Accounts Using Network Analysis and NodeXL BasicRobotic Systems10.4018/978-1-7998-1754-3.ch060(1250-1289)Online publication date: 2020
  • (2018)Contagion of Cheating Behaviors in Online Social NetworksIEEE Access10.1109/ACCESS.2018.28342206(29098-29108)Online publication date: 2018
  • (2018)The Digits Hidden in the Virtual World: Approximate Estimation Applying Capture and RecaptureInformation Security Applications10.1007/978-3-319-93563-8_26(310-322)Online publication date: 23-Jun-2018
  • (2017)Finding Automated (Bot, Sensor) or Semi-Automated (Cyborg) Social Media Accounts Using Network Analysis and NodeXL BasicSocial Media Listening and Monitoring for Business Applications10.4018/978-1-5225-0846-5.ch014(383-424)Online publication date: 2017
  • (2016)Detecting and Preventing Online Game Bots in MMORPGsEncyclopedia of Computer Graphics and Games10.1007/978-3-319-08234-9_13-1(1-8)Online publication date: 14-Jun-2016
  • (2015)Online Game Bot Detection in FPS GameProceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems - Volume 210.1007/978-3-319-13356-0_38(479-491)Online publication date: 2015
  • (2014)Altruism in gamesProceedings of the 13th Annual Workshop on Network and Systems Support for Games10.5555/2755535.2755557(1-6)Online publication date: 4-Dec-2014
  • (2014)Identifying spreaders of malicious behaviors in online gamesProceedings of the 23rd International Conference on World Wide Web10.1145/2567948.2577335(315-316)Online publication date: 7-Apr-2014
  • (2014)Altruism in games: Helping others help themselves2014 13th Annual Workshop on Network and Systems Support for Games10.1109/NetGames.2014.7008967(1-6)Online publication date: Dec-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media