skip to main content
10.1145/2488388.2488402acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

Strategyproof mechanisms for competitive influence in networks

Published:13 May 2013Publication History

ABSTRACT

Motivated by applications to word-of-mouth advertising, we consider a game-theoretic scenario in which competing advertisers want to target initial adopters in a social network. Each advertiser wishes to maximize the resulting cascade of influence, modeled by a general network diffusion process. However, competition between products may adversely impact the rate of adoption for any given firm. The resulting framework gives rise to complex preferences that depend on the specifics of the stochastic diffusion model and the network topology.

We study this model from the perspective of a central mechanism, such as a social networking platform, that can optimize seed placement as a service for the advertisers. We ask: given the reported demands of the competing firms, how should a mechanism choose seeds to maximize overall efficiency? Beyond the algorithmic problem, competition raises issues of strategic behaviour: rational agents should not be incentivized to underreport their budget demands.

We show that when there are two players, the social welfare can be 2-approximated by a polynomial-time strategyproof mechanism. Our mechanism is defined recursively, randomizing the order in which advertisers are allocated seeds according to a particular greedy method. For three or more players, we demonstrate that under additional assumptions (satisfied by many existing models of influence spread) there exists a simpler strategyproof (e/e-1)-approximation mechanism; notably, this second mechanism is not necessarily strategyproof when there are only two players.

References

  1. K. Apt and E. Markakis. Diffusion in social networks with competing products. In G. Persiano, editor, Algorithmic Game Theory, volume 6982 of Lecture Notes in Computer Science, pages 212--223. Springer Berlin / Heidelberg, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Bharathi, D. Kempe, and M. Salek. Competitive influence maximization in social networks. In X. Deng and F. Graham, editors, Internet and Network Economics, volume 4858 of Lecture Notes in Computer Science, pages 306--311. Springer Berlin / Heidelberg, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Borodin, M. Braverman, B. Lucier, and J. Oren. Truthful mechanisms for competing submodular processes. CoRR, abs/1202.2097, 2012.Google ScholarGoogle Scholar
  4. A. Borodin, Y. Filmus, and J. Oren. Threshold models for competitive influence in social networks. In A. Saberi, editor, Internet and Network Economics, volume 6484 of Lecture Notes in Computer Science, pages 539--550. Springer Berlin / Heidelberg, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. J. Brown and P. H. Reingen. Social ties and word of mouth referral behavior. Journal of Consumer Research, 14(3):350--362, 1987.Google ScholarGoogle ScholarCross RefCross Ref
  6. T. Carnes, C. Nagarajan, S. M. Wild, and A. van Zuylen. Maximizing influence in a competitive social network: a follower's perspective. In Proceedings of the ninth international conference on Electronic commerce, ICEC '07, pages 351--360, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Centola and M. Macy. Complex contagions and the weakness of long ties. American Journal of Sociology, 113(3):702--734, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  8. P. Dubey, R. Garg, and B. De Meyer. Competing for customers in a social network: The quasi-linear case. In P. Spirakis, M. Mavronicolas, and S. Kontogiannis, editors, Internet and Network Economics, volume 4286 of Lecture Notes in Computer Science, pages 162--173. Springer Berlin / Heidelberg, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Feldman, M. Henzinger, N. Korula, V. S. Mirrokni, and C. Stein. Online stochastic packing applied to display ad allocation. In Proceedings of the 18th annual European conference on Algorithms: Part I, ESA'10, pages 182--194, Berlin, Heidelberg, 2010. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Feldman, A. Mehta, V. Mirrokni, and S. Muthukrishnan. Online stochastic matching: Beating 1-1/e. FOCS, 0:117?126, 2009.Google ScholarGoogle Scholar
  11. J. Goldenberg, B. Libai, and E. Mulle. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters, pages 221--223, 2001.Google ScholarGoogle Scholar
  12. P. Goundan and A. Schulz. Revisiting the greedy approach to submodular set function maximization. Optimization online, (1984):1--25, 2007.Google ScholarGoogle Scholar
  13. S. Goyal and M. Kearns. Competitive contagion in networks. In STOC, pages 759--774, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Granovetter. Threshold models of collective behavior. American Journal of Sociology, (83):1420--1443, 1978.Google ScholarGoogle Scholar
  15. D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In KDD '03: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 137--146, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Kempe, J. Kleinberg, and E. Tardos. Influential nodes in a diffusion model for social networks. In L. Caires, G. Italiano, L. Monteiro, C. Palamidessi, and M. Yung, editors, Automata, Languages and Programming, volume 3580 of Lecture Notes in Computer Science, pages 1127--1138. Springer Berlin / Heidelberg, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Kostka, Y. A. Oswald, and R. Wattenhofer. Word of mouth: Rumor dissemination in social networks. In Proceedings of the 15th international colloquium on Structural Information and Communication Complexity, SIROCCO '08, pages 185--196, Berlin, Heidelberg, 2008. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Kulik, H. Shachnai, and T. Tamir. Maximizing submodular set functions subject to multiple linear constraints. In Proceedings of the twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '09, pages 545--554, Philadelphia, PA, USA, 2009. Society for Industrial and Applied Mathematics. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. E. Mossel and S. Roch. Submodularity of influence in social networks: From local to global. SIAM J. Comput., 39(6):2176--2188, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of approximations for maximizing submodular set functions?II. Mathematical Programming, 14(1):265--294, Dec. 1978.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of approximations for maximizing submodular set functions?i. Mathematical Programming, 14:265--294, 1978. 10.1007/BF01588971.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. R. T. Rockafellar. Convex Analysis (Princeton Landmarks in Mathematics and Physics). Princeton University Press, December 1996.Google ScholarGoogle Scholar
  23. T. Schelling. Micromotives and macrobehavior. Norton, 1978.Google ScholarGoogle Scholar
  24. Y. Singer. How to win friends and influence people, truthfully: influence maximization mechanisms for social networks. In WSDM, pages 733--742, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. Sviridenko. A note on maximizing a submodular set function subject to a knapsack constraint. Operations Research Letters, 32(1):41 -- 43, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Strategyproof mechanisms for competitive influence in networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        WWW '13: Proceedings of the 22nd international conference on World Wide Web
        May 2013
        1628 pages
        ISBN:9781450320351
        DOI:10.1145/2488388

        Copyright © 2013 Copyright is held by the International World Wide Web Conference Committee (IW3C2).

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 May 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        WWW '13 Paper Acceptance Rate125of831submissions,15%Overall Acceptance Rate1,899of8,196submissions,23%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader