SlideShare une entreprise Scribd logo
1  sur  15
Spontaneous emergence of social influence in online systems(by Onnela & Reed-Tsochas) Workshop for Network AnalysisT.B. Trostli Araujo Costa
Agenda Research Objectives Key Concepts The Study Fluctuation Scaling Results Points of Discussion
Research Objectives Understand how Social Influence processes work in Online Systems Leverage the new possibilities of data from Online Systems to understand Social Influence Processes
Key Concepts ,[object Object]
The ways in which people affect each other’s beliefs, feelings and behaviours
Exogenous Processes
Processes of influence that are driven externally (outside of the network) – example: advertisement
Endogenous Processes
Processes of influence that are driven from within the network, either by:
Local Signals  influence within the ego network
Global Signals  influence from the aggregate behaviour of the population ,[object Object]
The Study Focused on Facebook Applications Measured for about 2 months in 2007 Collected number of users per application per day during the timeframe (total of 104 million installations for ~2100 apps) Did NOT collect individual data (i.e. who uses each application, or who is friends with whom) Facebook Apps viewed as cultural productsor technological innovations POPULARITY OF APPS follows a fat tail, as usually seen with cultural products
Why study Social Influence on Facebook? Endogenous versus exogenous factors Sampling and popularity ,[object Object]
Assumption: Facebook would only have endogenous processesSocial Networking Site allows to get more comprehensive & detailed  data than offline Examples: Difficult to measure global signals in offline world for non-popular items Impossible to measure all items within a category (say: book sales)
Facebook ApplicationsLocal and Global Signals Local Signals – Friends Apps Global Signals – Popular Apps Status Updates

Contenu connexe

En vedette

Narrtive and repersentation
Narrtive and repersentationNarrtive and repersentation
Narrtive and repersentationChun Kit Yiu
 
Pro JavaScript Design Patterns
Pro JavaScript Design PatternsPro JavaScript Design Patterns
Pro JavaScript Design Patternschenwei
 
BackwardPlanning
BackwardPlanningBackwardPlanning
BackwardPlanningNigelFann
 
Joe Weiss 2008 Presentation
Joe Weiss 2008 PresentationJoe Weiss 2008 Presentation
Joe Weiss 2008 PresentationSeadweller23
 
programy rosyjskie
programy rosyjskieprogramy rosyjskie
programy rosyjskiemoniczkab
 
Ref Work Day Apr09
Ref Work Day Apr09Ref Work Day Apr09
Ref Work Day Apr09s.matt.lee
 
Digital Taxonomy
Digital TaxonomyDigital Taxonomy
Digital Taxonomyfulyaa
 
A Distance Course Empowered By Rich Media
A Distance Course Empowered By Rich MediaA Distance Course Empowered By Rich Media
A Distance Course Empowered By Rich Mediahansbronkhorst
 
Get Rid Of Stress with Amit Chouhan
Get Rid Of Stress with Amit ChouhanGet Rid Of Stress with Amit Chouhan
Get Rid Of Stress with Amit ChouhanAmit Chouhan
 
Design thinking action lab assignment - Define and Empathize
Design thinking action lab assignment - Define and EmpathizeDesign thinking action lab assignment - Define and Empathize
Design thinking action lab assignment - Define and EmpathizeKameswaran Subbaraman
 
MA Project 1 TRENDS
MA Project 1 TRENDSMA Project 1 TRENDS
MA Project 1 TRENDSChun Kit Yiu
 
Eluard Visiting Scholar
Eluard Visiting ScholarEluard Visiting Scholar
Eluard Visiting Scholardjpoptart
 
Group 4 - Digital Trends
Group 4 - Digital TrendsGroup 4 - Digital Trends
Group 4 - Digital TrendsAnthony Roman
 
适合中小学教师开展虚拟教研的网络技术与平台举例
适合中小学教师开展虚拟教研的网络技术与平台举例适合中小学教师开展虚拟教研的网络技术与平台举例
适合中小学教师开展虚拟教研的网络技术与平台举例lms0023
 
Yahoo Pipes, Fast and Fun at MLA '09
Yahoo Pipes, Fast and Fun at MLA '09Yahoo Pipes, Fast and Fun at MLA '09
Yahoo Pipes, Fast and Fun at MLA '09s.matt.lee
 

En vedette (20)

Narrtive and repersentation
Narrtive and repersentationNarrtive and repersentation
Narrtive and repersentation
 
Pro JavaScript Design Patterns
Pro JavaScript Design PatternsPro JavaScript Design Patterns
Pro JavaScript Design Patterns
 
BackwardPlanning
BackwardPlanningBackwardPlanning
BackwardPlanning
 
Joe Weiss 2008 Presentation
Joe Weiss 2008 PresentationJoe Weiss 2008 Presentation
Joe Weiss 2008 Presentation
 
programy rosyjskie
programy rosyjskieprogramy rosyjskie
programy rosyjskie
 
Ref Work Day Apr09
Ref Work Day Apr09Ref Work Day Apr09
Ref Work Day Apr09
 
Va4
Va4Va4
Va4
 
Digital Taxonomy
Digital TaxonomyDigital Taxonomy
Digital Taxonomy
 
A Distance Course Empowered By Rich Media
A Distance Course Empowered By Rich MediaA Distance Course Empowered By Rich Media
A Distance Course Empowered By Rich Media
 
Get Rid Of Stress with Amit Chouhan
Get Rid Of Stress with Amit ChouhanGet Rid Of Stress with Amit Chouhan
Get Rid Of Stress with Amit Chouhan
 
Hashtag Marketing by Amex
Hashtag Marketing by Amex Hashtag Marketing by Amex
Hashtag Marketing by Amex
 
Design thinking action lab assignment - Define and Empathize
Design thinking action lab assignment - Define and EmpathizeDesign thinking action lab assignment - Define and Empathize
Design thinking action lab assignment - Define and Empathize
 
One
OneOne
One
 
Double Vision
Double VisionDouble Vision
Double Vision
 
MA Project 1 TRENDS
MA Project 1 TRENDSMA Project 1 TRENDS
MA Project 1 TRENDS
 
Eluard Visiting Scholar
Eluard Visiting ScholarEluard Visiting Scholar
Eluard Visiting Scholar
 
Group 4 - Digital Trends
Group 4 - Digital TrendsGroup 4 - Digital Trends
Group 4 - Digital Trends
 
Icare class
Icare classIcare class
Icare class
 
适合中小学教师开展虚拟教研的网络技术与平台举例
适合中小学教师开展虚拟教研的网络技术与平台举例适合中小学教师开展虚拟教研的网络技术与平台举例
适合中小学教师开展虚拟教研的网络技术与平台举例
 
Yahoo Pipes, Fast and Fun at MLA '09
Yahoo Pipes, Fast and Fun at MLA '09Yahoo Pipes, Fast and Fun at MLA '09
Yahoo Pipes, Fast and Fun at MLA '09
 

Similaire à Spontaneous emergence of social influence in online systems(by Onnela & Reed-Tsochas

IRJET - Social Network Stress Analysis using Word Embedding Technique
IRJET - Social Network Stress Analysis using Word Embedding TechniqueIRJET - Social Network Stress Analysis using Word Embedding Technique
IRJET - Social Network Stress Analysis using Word Embedding TechniqueIRJET Journal
 
Optimizing Usage Analysis During Implementation Of Social Media Systems
Optimizing Usage Analysis During Implementation Of Social Media SystemsOptimizing Usage Analysis During Implementation Of Social Media Systems
Optimizing Usage Analysis During Implementation Of Social Media SystemsMartin Rückert
 
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkIRJET Journal
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 
The H(app)athon Project - Project Goals
The H(app)athon Project - Project Goals The H(app)athon Project - Project Goals
The H(app)athon Project - Project Goals John C. Havens
 
Published Paper
Published PaperPublished Paper
Published PaperFaeza Noor
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxturveycharlyn
 
AMIA 2013 Social Medica Panel
AMIA 2013 Social Medica PanelAMIA 2013 Social Medica Panel
AMIA 2013 Social Medica PanelGunther Eysenbach
 
Large scale geospatial analysis on mobile application usage
Large scale geospatial analysis on mobile application usageLarge scale geospatial analysis on mobile application usage
Large scale geospatial analysis on mobile application usageEricsson
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
1) Values in Computational Models RevaluedComputational mode.docx
1) Values in Computational Models RevaluedComputational mode.docx1) Values in Computational Models RevaluedComputational mode.docx
1) Values in Computational Models RevaluedComputational mode.docxmonicafrancis71118
 
SocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfSocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfBalasundaramSr
 
Detecting Malicious Facebook Applications
Detecting Malicious Facebook ApplicationsDetecting Malicious Facebook Applications
Detecting Malicious Facebook Applications1crore projects
 

Similaire à Spontaneous emergence of social influence in online systems(by Onnela & Reed-Tsochas (20)

IRJET - Social Network Stress Analysis using Word Embedding Technique
IRJET - Social Network Stress Analysis using Word Embedding TechniqueIRJET - Social Network Stress Analysis using Word Embedding Technique
IRJET - Social Network Stress Analysis using Word Embedding Technique
 
201120 Yunha Han
201120 Yunha Han201120 Yunha Han
201120 Yunha Han
 
Expertise Social Media Research - eng- out 2013
Expertise   Social Media Research - eng- out 2013Expertise   Social Media Research - eng- out 2013
Expertise Social Media Research - eng- out 2013
 
Optimizing Usage Analysis During Implementation Of Social Media Systems
Optimizing Usage Analysis During Implementation Of Social Media SystemsOptimizing Usage Analysis During Implementation Of Social Media Systems
Optimizing Usage Analysis During Implementation Of Social Media Systems
 
Global pulse technology
Global pulse technologyGlobal pulse technology
Global pulse technology
 
Detection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social NetworkDetection and Minimization Influence of Rumor in Social Network
Detection and Minimization Influence of Rumor in Social Network
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
Monitoring opinion on esop through social media and clustering its polarity
Monitoring opinion on esop through social media and clustering its polarityMonitoring opinion on esop through social media and clustering its polarity
Monitoring opinion on esop through social media and clustering its polarity
 
The H(app)athon Project - Project Goals
The H(app)athon Project - Project Goals The H(app)athon Project - Project Goals
The H(app)athon Project - Project Goals
 
Can we predict your sentiments by listening to your peers?
Can we predict your sentiments by listening to your peers?Can we predict your sentiments by listening to your peers?
Can we predict your sentiments by listening to your peers?
 
Published Paper
Published PaperPublished Paper
Published Paper
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docx
 
AMIA 2013 Social Medica Panel
AMIA 2013 Social Medica PanelAMIA 2013 Social Medica Panel
AMIA 2013 Social Medica Panel
 
Large scale geospatial analysis on mobile application usage
Large scale geospatial analysis on mobile application usageLarge scale geospatial analysis on mobile application usage
Large scale geospatial analysis on mobile application usage
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A1060104
A1060104A1060104
A1060104
 
A1060104
A1060104A1060104
A1060104
 
1) Values in Computational Models RevaluedComputational mode.docx
1) Values in Computational Models RevaluedComputational mode.docx1) Values in Computational Models RevaluedComputational mode.docx
1) Values in Computational Models RevaluedComputational mode.docx
 
SocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfSocialCom09-tutorial.pdf
SocialCom09-tutorial.pdf
 
Detecting Malicious Facebook Applications
Detecting Malicious Facebook ApplicationsDetecting Malicious Facebook Applications
Detecting Malicious Facebook Applications
 

Dernier

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Dernier (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Spontaneous emergence of social influence in online systems(by Onnela & Reed-Tsochas

  • 1. Spontaneous emergence of social influence in online systems(by Onnela & Reed-Tsochas) Workshop for Network AnalysisT.B. Trostli Araujo Costa
  • 2. Agenda Research Objectives Key Concepts The Study Fluctuation Scaling Results Points of Discussion
  • 3. Research Objectives Understand how Social Influence processes work in Online Systems Leverage the new possibilities of data from Online Systems to understand Social Influence Processes
  • 4.
  • 5. The ways in which people affect each other’s beliefs, feelings and behaviours
  • 7. Processes of influence that are driven externally (outside of the network) – example: advertisement
  • 9. Processes of influence that are driven from within the network, either by:
  • 10. Local Signals  influence within the ego network
  • 11.
  • 12. The Study Focused on Facebook Applications Measured for about 2 months in 2007 Collected number of users per application per day during the timeframe (total of 104 million installations for ~2100 apps) Did NOT collect individual data (i.e. who uses each application, or who is friends with whom) Facebook Apps viewed as cultural productsor technological innovations POPULARITY OF APPS follows a fat tail, as usually seen with cultural products
  • 13.
  • 14. Assumption: Facebook would only have endogenous processesSocial Networking Site allows to get more comprehensive & detailed data than offline Examples: Difficult to measure global signals in offline world for non-popular items Impossible to measure all items within a category (say: book sales)
  • 15. Facebook ApplicationsLocal and Global Signals Local Signals – Friends Apps Global Signals – Popular Apps Status Updates
  • 16. Method Fluctuation Scaling to understand how the behavior of individual installing an app is related to the behavior of others IMPORTANT: Did NOT download individual data (i.e. who installed which application, or who is friends with whom), therefore cannot distinguish between Global and Local signals
  • 17. Fluctuation Scaling Logic: For an application i, the act of individual j is enclosed in a random variable Si,j(t) Si,j(t) = 1 : individual installs the application Si,j(t) = 0 : individual does nothing Probability of Si,j= 1 depends on various sources of uncertainty: Individual characteristics Application characteristics Also Global and Local Signals of Social Influence
  • 18. Fluctuation Scaling Logic: Study measured the net activity of each application at each point in time (i.e. how many new installations happened from t0 to t1) Data of all applications (net installations, total potential new installers at each given timeframe) were analyzed The temporal average and SD of the net activity are analyzed using FS methods to identify a fluctuation scaling exponent The fluctuation scaling exponent determines the behavior of the social influence processes: 1/2 = user behavior is independent of others 1 = user behavior is fully correlated with others
  • 19. ResultsRegimes for Apps Installation INDIVIDUAL REGIME COLLECTIVE REGIME Exponent alpha = 0.85 Strong correlation between constituent variables Influenced by the behavior of others Exponent alpha = 0.55 Installations are nearly uncorrelated Social influence is negligible
  • 20. Additional Checks Done Could it be that groups (collective/individual) are influenced by the lifetime of the application? Cross-group checking indicated old and new applications appear in all groups Could network externalities inside app influence regime (e.g. poker versus lava lamp app)? Analyzed ~1000 apps and found both types of apps in both regimes Could regime be driven by popularity (i.e. after reaching certain # of users, app move to collective regime)? They cut the time series into pieces, recombined them using a rank-based rule, but could not find either a threshold or the existence of two regimes
  • 21. Questions & Points of Critique Study makes assumption that FB population is uniform. Not clear whether subgroups would have their own regimes Example: An App in Dutch would not have many US users, but would it be less within the collective regime if it is not popular? Unclear how fluctuation scaling would deal with irregular Facebook usage If majority of the users don’t use it daily, how can one estimate whether irregularities in app growth is not simply due to delay (especially dealing with daily data)?
  • 22. Questions & Points of Critique Unclear how Facebook design was dealt with Facebook already had algorithm on Apps Recommended For You. Wouldn’t this influence the Collective/Individual regime? List of popular apps assumed as Global Signal implies that list was being used by users, although no data is shown Assumption that once a user installs an app, they do not uninstall it. Unclear whether this was validated within Facebook (i.e. if the numbers communicated by FB did not remove users that uninstalled) Main Question: is this really Network Analysis, or is fluctuation scaling being used as a proxy for not gathering individual level data? If the study had access to individual level data (one’s behavior in installing applications, and one’s friends behavior), wouldn’t social influence processes be more demonstrated?