Next Article in Journal
Complexity Measures of Heart-Rate Variability in Amyotrophic Lateral Sclerosis with Alternative Pulmonary Capacities
Next Article in Special Issue
Dynamic Robustness of Semantic-Based Collaborative Knowledge Network of Open Source Project
Previous Article in Journal
Weighted Schatten p-Norm Low Rank Error Constraint for Image Denoising
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Influence Cascades: Entropy-Based Characterization of Behavioral Influence Patterns in Social Media

1
Complex Adaptive Systems Lab, Department of Industrial Engineering and Management Systems, University of Central Florida, Orlando, FL 32816, USA
2
Computer Science and Artificial Intelligence Lab, Massachusetts Institute of Technology, Cambridge, MA 02139, USA
3
Poole School of Management, North Carolina State University, Raleigh, NC 27695, USA
*
Author to whom correspondence should be addressed.
Entropy 2021, 23(2), 160; https://doi.org/10.3390/e23020160
Submission received: 11 December 2020 / Revised: 12 January 2021 / Accepted: 20 January 2021 / Published: 28 January 2021
(This article belongs to the Special Issue Analysis and Applications of Complex Social Networks)

Abstract

:
Influence cascades are typically analyzed using a single metric approach, i.e., all influence is measured using one number. However, social influence is not monolithic; different users exercise different influences in different ways, and influence is correlated with the user and content-specific attributes. One such attribute could be whether the action is an initiation of a new post, a contribution to a post, or a sharing of an existing post. In this paper, we present a novel method for tracking these influence relationships over time, which we call influence cascades, and present a visualization technique to better understand these cascades. We investigate these influence patterns within and across online social media platforms using empirical data and comparing to a scale-free network as a null model. Our results show that characteristics of influence cascades and patterns of influence are, in fact, affected by the platform and the community of the users.

1. Introduction

Social influence in online social networks (OSNs) can be defined as the ability of a user’s action to affect the actions of other users. We refer to such occurrences as social influence relationships. However, in most cases these relationships to be asymmetric. A person who influences other users is referred to as an influencer and the person being influenced is referred to as an influencee. Social influence has been widely studied in many fields including marketing [1,2,3,4,5], political science [6], human and animal behavior [7,8,9,10], and communication [11,12].
With the rapid increase of online social media usage, social platforms now represent a large portion of daily communication and play a major role in information diffusion throughout society. In an OSN, we can classify user actions into three types: (1) initiation of a conversation or a post ( I ) , (2) contribution to an existing conversation or a post ( C ) , or (3) sharing of an existing post between conversations without changing the content ( S ) . Since we will use these three actions and this framework throughout this paper, we will refer to it as the ICS classification. Most existing studies on social influence in OSNs assume an implicit monolithic notion of influence, i.e., that a user’s influence is the same across all action types. However, in reality, there are differences in how users influence others through initiation, contribution, and sharing actions. Disregarding these differences in behavioral influence may hinder a comprehensive understanding of the real role of social influence in a wide variety of scenarios including (1) information propagation and influence maximization, (2) knowledge transfer in a community and development of projects, such as in GitHub and Stack Overflow, (3) online influence campaigns, or (4) online brand engagement at different stages of the consumer purchase funnel.
As an example, in online marketing campaigns, some users may create original content, some users may contribute to others’ created content, and still other users may spread the content of others by sharing. If a marketing firm is interested in controlling or interacting with this information spread, it may want to identify different users based upon the role they play and how those users affect other users. Therefore, in this study, rather than modeling the influence as a single entity, we modeled the influence as multiple entities and explore the cascading effects of social influence.
An influence cascade can be defined as the all of the actions in a chain that start from an initial user, who was prompted by an external (outside the social network) stimulus or intrinsic motivation to act, and the actions that the initial user then influences other users to take, and, in turn, the actions those users influence others to take and so forth until a user’s action no longer influence any other users to act. In other words, an influence cascade is all of the users and events that were socially motivated and can be tracked back to an initial user that was not motivated socially, but due to an influence outside the social network. The presence of influence cascades indicates an underlying organizational structure. In the case of a highly distributed community, such as those that exist on OSNs, such organizational structure is not explicitly expressed, but are implicit in the actions of the users. Analyzing influence cascades allows us to infer these underlying organizational structures. In this paper, we extract influence cascades in a variety of scenarios over multiple platforms and visualize the underlying organizational structures.
Though our introduction of influence cascades is novel, previous work has examined information cascades. However, information cascades differ in that the focus of the analysis is on the transmission of a particular piece of information, and not the users influencing each other to transmit the information. Typically, information cascades are extracted by tracing a piece of information such as content, URL, or an image through the explicit link structures such as parent-child relationships [1,9,13,14,15]. However, such explicit link structures are not available in many data sets or may be incomplete [13,16]. These studies focus on analyzing characteristics such as size, depth, degree distributions, or the growth of such information cascades, as opposed to understanding how one user directly influences another user [1,14,15,17].
As we are interested in behavioral influence, with the premise that any I , C , or S action that a user can take can influence other users to do any I , C , or S actions, we defined nine types of influence relationships that can exist between any pair of users. We use transfer entropy to quantify these nine types of influence relationships [18] as it gives us the ability to model social influence as multidimensional while capturing the direction and causality of the influence relationships.
Because of the action classification used, our model is abstracted from platform event types and, as a result, we can compare influence cascades on different platforms using the same ICS classification. Different social media platforms enable different affordances for interaction. Though the actions on these platforms can still be characterized under the ICS classification, the algorithms and exact implementations may alter how users utilize these different actions. Hence, this gives us the ability to study human behavior on different platforms and determine if the affordances of the platform affect influence cascades. To the best of our knowledge, this is the first study to compare influence cascades between platforms. We consider cryptocurrency (crypto), common vulnerable exposure (CVE), interest communities on GitHub (GH) and Twitter (TW) to explore the characteristics of influence cascades, and contrast the extracted OSN influence cascades against those from on scale-free networks as well. The results of our study show that the depth and the structure of influence cascades depend on the platform and community of users. As a result of these observations, we can characterize the underlying organizational structures of these online communities.
The rest of the article is organized as follows: Section 2 covers background information and related work. Section 3 presents the proposed methodology, description of empirical data, and the experimental setup. Section 4 present the experimental results on empirical data and a generic scale-free network. Finally, Section 5 discuss the results and Section 6 concludes the paper.

2. Background and Related Work

Social influence has long been studied in many areas such as information diffusion and influence maximization [8,11], viral marketing [1,2], influential blogger finding [9], health applications [19], spread of opinions and news [7,12,20], and so on. In these studies, social influence is measured in many different ways. Among these methods, most of the work has focused on the notion of centrality, or structural influence. Centrality measurements such as degree, closeness, betweenness, eigenvector, Katz, and their variations are used widely in studies of social influence [21,22,23,24]. However, in most of these measurements except eigenvector centrality, there is no distinction of the contribution of individual nodes to the measurement [25], and even in the case of eigenvector centrality, the only difference is a structural difference, not behavior-based. The number of followers, which is related to degree centrality, is used by [2,26] to measure influence in microblogs. However, in [2,27,28], the authors show that there is a weak correlation between behavioral influence and the number of followers. Hence, these measurements are not fully able to capture behavioral influence and state-of-art methods related to these measurements cannot comprehensibly address the scenarios where an organization is interested in different types of influence, as discussed in the Introduction.
In addition, some recent studies use deep learning models to capture social influence. The DeepInf developed by Qiu et al. [29] is able to predict the binary status (active/inactive) of a user, given the user’s underlying local network structure and the status of the near neighbors of the user. Leung et al. [30] proposed the HPPNP model by integrating a feature from a page rank domain to the DeepInf model and improved the performance of the DeepInf model. These models use historical interactions to predict social influence. However, the accuracy of the prediction depends on the underlying social network that the model uses because of the assumption that only near neighbors influence users’ actions. In [29,30], the authors use underlying user networks such as follower/followee or friendship networks for their study. Hence, these studies fail to address users’ actions that may occur when they identified posts using hashtags or keywords [31].
Another way to measure influence is based on entropy and information theory. Peng et al. [32] use node entropy based upon the degree of a user and interaction frequency entropy to evaluate social influence in mobile social networks. Sun and Ng [33] use graph entropy based upon the centrality of users to measure the influence of connectors on social networks. Chen et al. [34] consider network topology and proposed a method to rank the influential nodes by considering the Tsallis entropy of the users and their neighbors. Transfer entropy is another entropy-based measurement that is used to quantify influence. Transfer entropy is introduced by Schreiber [18] to capture the cause and effect in an interaction between two coupled systems effectively. It is an information-theoretic approach based on Shannon entropy [35] and it measures the uncertainty reduced by the prediction of the future of a system from the past of the system by knowing the past of another system. If two random processes are X = { X t } t N and Y = { Y t } t N then the transfer entropy can be defined as
T E X Y = x , y Ω P ( Y t + 1 = y , Y t = y , X t = x ) log P ( Y t + 1 = y | Y t = y , X t = x ) P ( Y t + 1 = y | Y t = y ) ,
where Ω is the sample space that includes all realizations.
VerSteeg and Galstyan [36] use this approach to quantify the influence of content on users in social media and show that transfer entropy is able to capture some of the relationships that cannot be captured by the follower network or mention network successfully. Moreover, He et al. [37] use the same approach to reconstruct the underlying network structure of online social media and use transfer entropy to measure peer influence in OSNs.
Information cascades have provided us with insight into how these social networks operate. For example, Adar and Zhang [13] study the sharing of URLs in the blog-space by inferring their explicit link structure and implicit link structure. Explicit link structure is constructed by tracing the provided information on the data. Implicit link structure is constructed by using a classifier that depends on the blog similarity measures. Gruhl et al. [38] propose a model to study the propagation of information in the form of topics throughout the blog space using a derived form of the independent cascade model on a network induced by the timeseris of the topics and the blog which posts that topic at that time. Further, Leskovec et al. [14] study the propagation of posts in the blog space to discover the patterns of information propagation. The authors analyze the cascades of blog posts by measuring the overall out-degree, in-degree, and in-degree distribution of nodes at level L of the collection of cascades. Further, they quantify the cascades by the number of nodes in the cascades and analyze the distribution of the cascade size over the collection of cascades they extracted. Their results show that blog posts have weekly periodicity but they do not have a bursty behavior. Moreover, Leskovec et al. [1] trace the diffusion of product recommendations using emails and show that product recommendation cascades do not grow very large. Kumar et al. [15] study the information cascades in yahoo!, Twitter, and Usenet groups by reconstructing the information cascades using the parent-child relationships that exist in the data and explore the distributions of size, depth, and degree of the information cascades. They show that degree distributions of information cascades are close to a power law. Bakshy et al. [9] study the information diffusion by studying the cascades of URL’s sharing on Twitter and show that information mainly spreads through small cascades that are started by ordinary individuals while long cascades are rare. Dow et al. [17] study the cascade of image sharing on Facebook and explore them in terms of evaluation time and the distributions of the depth of the cascades. Further, they quantify the predictability of sub-cascades sizes. Cadena et al. [39] show that activity cascades in Twitter are predictive of civil unrest.
Moreover, with the variety of OSNs today, people engage with multiple social media platforms giving them the opportunity to discuss and share their interests in multiple platforms. Hence, researchers have become interested in studying how human behavior differs on different platforms. Xiong et al. [40] propose a new approach to link GitHub and Stack Overflow accounts using a CART decision tree and explore developer behavior on these two platforms. Waterloo et al. [41] study how users express their emotions in WhatsApp, Facebook, Twitter, and Instagram and find that there are differences in the patterns of emotional expression based on the platform. Furthermore, Kim et al. [42] propose a method to estimate the information transfer across mainstream news, social networking sites, and blogs using transfer entropy. Also, a similar study from Bhattacharjee [43] analyzes information transfer across social media, in particular Twitter, Reddit, and GitHub. Bhattacharjee uses symbolic transfer entropy to measure the influence from one platform to the other. Our work extends this past work into the realm of influence cascades, so we can understand not only how the same user operates on different platforms, but also whether users on one platform influence users on other platforms.

3. Methodology

In this section, we examine the basic concept of influence cascades. In particular, we start by examining users who are not socially influenced themselves but exert influence on others, and how different actions contribute to the accumulation of social influence as it progresses through the network via influencer-influenced relationships. We use the ICS classification in order to replicate our findings across two social media platforms and two different communities. We extract social influence cascades observed in four online user communities: (1) GitHub users working on cryptocurrency, (2) Twitter users discussing cryptocurrency, (3) GitHub users working on cyber-vulnerabilities (CVEs), and (4) Twitter users discussing CVEs. It should be noted that in this study we are not following any retweet chains or reply chains of specific content. Influence cascades are not direct interaction chains, i.e., retweeting chains or reply chains. Instead, influence cascades are observed from looking at the time series of all users in the data set, and observing how likely a user’s particular event causes another event of another user. This means influence cascades do not always begin with an I action because a root user’s I action may not be the action that influences other users but instead a root user’s I, C, or S actions could all create influence chains. Also, there is a possibility to observe a C action influencing an I relationship in the cascade since that means that we observed that when a certain user performs contribution events, another user is likely to initiate a new thread.
We performed this 2 × 2 comparison to give us the ability to analyze both platform and subject community differences. Finally, we compared the extracted social influence cascades against those expected on an artificially generated scale-free network. By using this scale-free model as a null model, we provide a basis of a comparison that is independent of any of the intrinsic properties of underlying networks, to compare and contrast our results. Therefore, we can identify what aspects are related to the particular circumstances of the platform and community and what aspects are present in any network.

3.1. Defining Influence Relationships

In this study, we built our framework based on ICS classification. We let the set of actions a user can perform be denoted as A = { I , C , S } . Once a user, u, performs an action, a, there is a chance that his action influences another user, v, to preform another action, b, which we describe as a social influence relationship of type u a v b , where a , b A and u , v are users in the network W. Hence, we can define nine influence relationships as follows: u I v I , u I v C , u I v S , u C v I , u C v C , u C v S , u S v I , u S v C , and u S v S . As an example, we can use u I v I to symbolize an influence relationship where u’s initiation of a conversation influenced the initiation of another conversation by v. We use transfer entropy to quantify these influences and infer causal relationships [18]. Transfer entropy has been shown to capture influence better than other commonly used measures such as centrality and number of followers [36]. Also, by using transfer entropy, we are not restricted to limitations in the follower network that may occur if a user is influenced by, but does not follow, another user [2,28,31].

3.2. Extraction of Influence Cascades

We first quantify the magnitude of influence for each relationship u a v b by calculating the transfer entropy, from a time series of action type a of user u to the time series of action type b of user v [44]. Next, we extract influence cascades from the pruned influence network and visualize them as follows.

3.2.1. Constructing the Influence Network

Since each directed user pair ( u , v ) can have nine types of influence relationships u a v b , we define the total social influence from user u to v as a vector γ u , v with the corresponding influence measurement values γ u v ( a b ) as its vector components. If at least one influence relationship exists, i.e., at least one non-zero influence vector component exists from u to v, then we can say that u influences v. Accordingly, we define the influence network G ( V , E ) according to Equations (2) and (3).
V = { u , v W | a , b A γ u v ( a b ) > 0 } ,
E = { { u , v } | a , b A γ u v ( a b ) > 0 } .
It must be noted that G is a directed graph. Furthermore, we attribute the influence vector components to edge weights of G. In this manner, W is pruned of edges that have no social influence from one user to another, forming G.

3.2.2. Extracting Influence Cascades

Next, to study the characteristics and reach of the quantified influences, we extract the influence cascades of the users as follows. Externally motivated but not socially influenced users R is defined according to Equation (4).
R = { u V | i n d e g r e e ( u ) = 0 }
In order to extract the influence cascades from any u R , we first extract all the outgoing neighbors of u, N o ( u ) , and their corresponding edges from u. We then extract all the outgoing neighbors of users in N o ( u ) and their corresponding edges and repeat this process until there are no more identifiable outgoing edges. The initial user, at the top of the cascade, is called the root user and their node level is 0. Level 0 users are chosen as those who have no incoming edges, i.e., have no influencing users, but exert influence on other users. The node level of other users in the cascade is labeled based on the hop distance from the level 0 user to them. Figure 1 shows an example influence cascade using this process.

3.2.3. Characterization of Influence Vector Components

As Figure 1 shows, the extracted cascades help analyze basic characteristics, such as the size and length of the cascades. However, this representation does not identify whether the influencing action was a I, C, or S. Hence, we propose a visualization technique that can integrate the information of influence cascades as follows:
Let L i , i + 1 represent the set of influence vectors flow from the ith level to ( i + 1 ) th level, where i { 0 , 1 , , , n 1 } and n is the depth of the cascade. The normalized vector component of the total social influence an action a has on an action b, γ i , i + 1 ( a b ) is calculated as shown in Equation (5).
γ i , i + 1 ( a b ) = l L i , i + 1 l ( a b ) i = 0 i = n 1 l L i , i + 1 l ( a b )
We visualize the influence cascade through a Sankey diagram [45]. In the Sankey diagram, nodes represent the influencing actions ( a A ), while flows represent the total magnitude of influence exerted by this action on users at the next level of the cascade, normalized across the cascade. Figure 2 shows an example of a Sankey diagram produced by the proposed method.

3.3. Experiments

We studied the consistency of characteristics of influence cascades such as depth of the cascades and the structure of the cascades within and across OSNs. In addition, we compared them against those expected from the scale-free network, which serves as a null model.

3.3.1. Data

We considered two OSNs, Twitter and GitHub for our experiments. Twitter is a popular social networking site that allows users to post and interact with comments. Though GitHub may not appear to be an OSN on its surface, it provides powerful tools for interaction and commenting, allowing users to socially interact in a fashion similar to other OSNs [46].
The empirical data consisted of temporal user activity related to discussions and project development of selected cryptocurrencies (Crypto) and cyber-vulnerabilities (CVE) on both Twitter (TW) and GitHub (GH). The data is gathered as follows:
  • GH-Crypto data was collected by extracting events related to more than 20 target coins’ official repositories, repositories labeled with target coin names, and repositories that mentioned the target coin names in their descriptions.
  • TW-Crypto data was collected by extracting all tweets from official websites related to more than 20 target coins and by matching the target coin names, code, hashtags, etc. with the full Twitter firehose. Extraction was limited to English language tweets and users from either unknown countries or the UK, India, Canada, Russia, and The Netherlands.
  • GH-CVE data was collected by extracting events related to any repositories that were related to CVE at a certain point in their life cycle, found by matching CVE textual patterns against repository descriptions and texts related to events.
  • TW-CVE data was collected by matching the CVE textual patterns against the collection of tweets extracted through the public Twitter API.
The TW-Crypto data was extracted from the 1st of August 2018 to the 30th of November 2018 while GH-Crypto, GH-CVE, and TW-CVE data were extracted from the 1st of January 2017 to the 31st of March 2017. The raw data sets contained 111821, 19166, 11875, and 3278 unique users respectively. As low activity users have less impact on influencing others over time we only considered active users who had an average monthly activity greater than five events within these time periods. The filtered data sets contained 4170, 1784, 1989, and 92 unique users respectively. Table 1 shows the categorizations of 14 different GitHub events and 4 different Twitter events into initiation, contribution, and sharing action classes.
The extracted influence networks of GH-Crypto, TW-Crypto, GH-CVE, and TW-CVE had 1406, 3365, 151, and 80 nodes (users), respectively. Each of these influence networks consisted of 568, 2385, 111, and 45 users who were not socially influenced but influenced others (root nodes).

3.3.2. Experimental Setup

We began our experiment by exploring the influence cascades in our empirical networks. For comparison, we constructed generic scale-free networks that were similar in size as null models. As an example, we constructed a scale-free network with 1406 nodes as a null model of GH-Crypto network which has 1406 users in its influence network. Python 3 and the NetworkX scale_free_graph library [47] were used to generate directed scale-free networks. Except for the number of nodes, the other parameter values were kept constant while producing the scale-free networks. Any loops and multi-edges that resulted were removed. Next, for each resultant edge, nine random values from U [ 0 , 1 ] were assigned as the magnitude of the influence of the nine influence relationships. Given this network, we extracted the influence cascades from root nodes by identifying those nodes that had zero in-degree, i.e., no influencing nodes. For each network, we aligned all the influence cascades by level and aggregated the normalized total influence vector components (Equation 5) by their median. For some examples of these cascades see Figure 3.
We explored the user distribution of influenced cascades by comparing the mean number of users as well as the cumulative mean number of users per cascade level by platform and community. The Jensen–Shannon (JS) Divergence test was performed to measure the similarity of user distributions between influence cascades extracted from empirical networks and their null models as well as between the platforms/communities.
In order to study the similarities of the structure of influence cascades in terms of the distribution of influence from different extracted networks, we explored the residual differences between the median normalized total influence values extracted from influence cascades and those from influence cascades generated by the corresponding null model, both within and across platforms, by influence relationship. A Spearman’s correlation test was performed on these residuals by influence relationship, grouping by platform and community, in order to infer the statistical significance of the observations. The null hypothesis H 0 tested, was that there is no correlation between the residuals in the magnitude of influence of two platform-communities. In other words, if the comparison was significant that means that two platforms or communities are significantly similar in terms of the distribution of the magnitude of influence. As we have multiple comparisons, we applied a Bonferroni correction to minimize the error rate. Therefore, we used a significance level of 0.05 / 9 = 0.0055 in order to consider an individual test as significant.
The computer code for extracting influence cascades, visualizations, and experiments was developed in a Jupyter notebook which is publicly available. The influence data extracted from the OSNs and code is available at https://github.com/Csenevirathna/InfluenceCascades. The versions of the software and packages which are used are as follows: Python 3.6.3, pandas 1.0.1, NumPy 1.19.1, NetworkX 2.4, seaborn 0.9.0, Plotly 3.6.0 and, statsmodels 0.12.0.

4. Results

Comparisons of the mean number of users per influence cascade level by platform and community are shown in Figure 4. Similarly, comparisons of the cumulative mean number of users per cascade level by platforms and community are shown in Figure 5. For both of these sets of measurements, the measurement of the corresponding scale-free null-model, matched by network size, has been included as a control. We observed that the user distributions for the CVE community closely followed that of their corresponding scale-free null-model, in contrast to that of the cryptocurrency community, where a larger deviation from the scale-free null-model was observed. This result is confirmed in Table 2, where the JS-divergences for each platform-community from their corresponding scale-free networks are shown. The JS Divergences for the CVE community networks is a magnitude smaller than that of the cryptocurrency community networks, regardless of platform.
Instead, we found that the distributions of users across levels were similar for the cryptocurrency community, regardless of platform. In particular, we observed that on average the user distributions culminate at level 4 for both cryptocurrency networks, producing influence cascades that are much shorter than are expected based on their comparison against the corresponding scale-free null-models. In other words, the mean user distributions over influence cascades for the cryptocurrency community were robust across platforms, while those for the CVE community were more platform-sensitive. This result is further confirmed in Table 3, where the Jensen–Shannon divergence between each platform-community is displayed. According to this comparison, the JS divergence is lowest within communities rather than within platforms. Furthermore, the JS divergence is lower when comparing across platforms within the cryptocurrency community, rather than the JS divergence when comparing across platforms within the CVE community. Also, we see that the JS divergence between the cryptocurrency and CVE communities on Twitter is much lower than that on GitHub. In other words, the influence structures within the cryptocurrency community are more robust across platforms than the CVE community, and the influence structures on Twitter are more robust across communities in comparison to those on GitHub.
We then compare the distributions of influence over cascade level by action for the empirical networks against their corresponding scale-free null models matched by network size. Figure 6 displays the median normalized total influence exerted from lower to higher levels by action ( I , C , and S) for the four empirical networks. The same measurements for their corresponding scale-free null models are shown in Figure 7. Figure 6 shows a clear distinction between how different influence relationships are distributed along the cascades within platforms and across platforms. Despite the closeness of user distributions of the CVE networks to their corresponding scale-free null models, we observe that how influence is distributed among this community differs from that expected through the scale-free null models. We observe a similar difference in influence distribution from the scale-free null models for the cryptocurrency community. We observed that GH-Crypto, TW-Crypto, and TW-CVE have a common shape to their influence cascade, with the highest fraction of influence flow for most relationships in these platform-communities happening towards the middle of the cascade. However, for GH-CVE this happens at the head of the cascade. Interestingly, the distribution of influence seen in GH-CVE, which has a smaller influence network size (151 users), is similar to that seen in the larger networks of GH-Crypto and TW-Crypto scale-free null models (1406 and 3365 users respectively).
These results indicate that root nodes in GH-CVE are more influential compared to all of the other users in the cascade, whereas root nodes in the cryptocurrency community and the TW-CVE community are not very different from the other users in the cascades in terms of the amount of influence they exert on others. This can be explained by the popularity of and interest towards cryptocurrencies among all the users regardless of platform and difference in the interest of users on CVE’s in different platforms. Moreover, these results indicate that influence cascades of empirical networks have less similarity with the scale-free null models by further confirming the effect of communities and platforms on influence cascades.
Furthermore, it was observed that not all nine influence relationships existed between every consecutive level of the influence cascades for any of the social networks, unlike that observed in the scale-free null models. This means that influence exerted by users is not uniform and depends on the type of action they are more inclined to perform given their platform and community, and also that the preference for certain actions is heterogeneous among users of a particular platform and community. Specifically, we observed that influence cascades of Twitter have a more equal distribution of influence through all three actions. Instead, we observe that contribution actions have more influence throughout the cascades observed on GitHub. This result can be explained by the differences in the nature of GitHub and Twitter. That is, GitHub is a platform for developers that are intensively involved in open source software development, but Twitter serves as a platform to share and post short discussions.
The residuals between the median normalized total influence values by relationship, over cascade level, of the empirical networks when compared to those of their corresponding scale-free null models across both platforms and communities are shown in Figure 8. Again we observe that the distribution of influence on GH-CVE is very different compared to that of the other three networks for almost all relationship types, except for C S . Furthermore, we see that the differences between cryptocurrency community influence cascades on GitHub and Twitter occur through S C and C S relationships.
In the case of Spearman’s correlation tests, the null hypothesis for our experiments is that there is no correlation between the residuals in the magnitude of influence of two platform-communities when examined by the nine action-action relationships. The results of this test at original significance = 0.05 (Bonferroni-corrected significance = 0.0055) are shown in Table 4. The only significant correlations were observed between GitHub and Twitter within the cryptocurrency community for most influence relationship types, with the exception of C S and S C . In other words, how influence was propagating within the cryptocurrency community over both Twitter and GitHub were similar with the exception of contribution and sharing events. This result can be explained by the higher importance that contribution events (such as commits, and commit comments) have within GitHub, compared against the popularity that sharing (or retweeting) has on Twitter. In contrast, we can state that how influence is propagated within the CVE community differs based on the platform, Twitter or GitHub, upon which the users interact. We can also state that there are no similarities in how influence is propagated when comparing between the two communities on either platform. Appendix A.1 provides further visual validation via scatter graphs for each test above. It must be noted that an ANOVA could not be applied in place of the above correlation test as the residuals of the influence relationships failed to satisfy the normality assumption (Further information in Appendix A.2).

5. Discussion

We examine social networks through the perspective of influence propagation based on user actions, and compare four social networks, the cryptocurrency and CVE communities of Twitter and GitHub. In order to facilitate cross-platform comparison, we categorized actions into three abstract types that existed on multiple social media platforms: initiation, contribution, and sharing. The influence of these actions by users on further actions by other users was measured for all nine resulting relationships. We propose a novel method to measure and visualize the social influence exerted by users through these actions over time. We illustrate how transfer entropy can be used as the measurement of influence to estimate the degree to which causal relationships existed between user actions. User pairs that had at least one influence relationship of non-zero magnitude formed the basis of a network of influence. Users of this network that were not influenced by others, but did exert influence on others were selected as the roots of influence cascades. The users influenced by these root influencers were identified recursively, extracting cascades of influence, propagated via all nine relationships. The extracted empirical influence cascades were compared against uniform influence cascades on scale-free networks of equal node count, as null models.
Our results indicate that the manner in which influence cascades through online social media is affected by the social media platform and the online community. In particular, we find that the cryptocurrency community exhibits influence structures that are similar across both GitHub and Twitter, while this is not true for the CVE interest community. More specifically, within the cryptocurrency community, we notice that the only significant difference in influence cascades exist between relationships where contribution actions influence sharing actions, and vice versa. In other words, the influence relationships that exist between users engaged in cryptocurrency related development on GitHub and the influence relationships that exist between users engaged in cryptocurrency discussions are similar, with the exception of contribution actions influencing sharing actions (or sharing influencing contribution). The fact that code-development on GitHub is driven primarily through contribution actions, such as commits and pull-requests, while Twitter is driven by sharing actions, specifically retweets, offers an explanation for this exception. This technique and visualization enable the automatic identification and analysis of these differences.
In contrast, there is no similarity between the influence relationships on GitHub and Twitter within the CVE community. Additionally, we see that the influence cascades of the CVE developers on GitHub are longer than those of the CVE discussions on Twitter. This leads us to conclude that CVE developers on GitHub are generally more responsive to social influence than users discussing CVE related topics on Twitter. Further, we observe generally longer cascades of contribution actions influencing contributions actions within the CVE community on GitHub. In other words, individuals of the CVE community are more likely to engage in contributions to GitHub projects in the CVE domain than engage in CVE related discussions on Twitter.
Finally, we find evidence that the influence structures of Twitter show higher similarity across communities, compared to those of GitHub. However, we do not find any individual influence relationships across the two communities on Twitter that show significantly similar progressions of the magnitude of influence over cascade level.
Some of these differences in platforms versus communities may have to do with the nature of the communities themselves. Cryptocurrencies have been a growing topic since Bitcoin was introduced to the financial market as a medium of exchange. Hence, we could explain the similar organizational structure in the Crypto community as a fact of the popularity of the cryptocurrencies in both Twitter and GitHub. However, the structural differences in the relationships where contribution actions influence sharing actions and sharing actions influence contribution actions can be explained as a result of the different nature of the contribution and sharing actions in GitHub and Twitter.
However, unlike cryptocurrencies, discussions of cyber-vulnerabilities maybe very different on Twitter and GitHub. On Twitter, CVE discussions may be interesting to one group of users who are interested in the news around CVEs, while on Github, the most active users may be individuals who are actively trying to develop solutions to CVEs. This disparity between the types of users engaged on Twitter versus Github is greater for the CVE community than the Cryptocurrency community.

6. Conclusions and Future Work

We present one of the first general methods of tracking influence cascades, as opposed to information cascades, on social media, by using a platform-independent action classification and measuring the transfer entropy between timeseries of these actions. We extend the existing literature by discarding the traditional monolithic notion of influence, and by providing new insights into the differences and similarities of how social influence propagates within and across different communities and platforms. Overall, our study contributes to the literature and science by (1) presenting a novel method to track influence relationships caused by actions of OSNs, (2) providing new insights to improve state-of-art methods that assume a monolithic notion of influence and homogeneous populations, (3) characterizing influence cascades caused by actions of social network media across platforms and communities and, (4) presenting the evidence to show that depth and structure of influence cascades are determined by the platform and community.
Although in this study we have analyzed networks within the confines of a specific platform and community, this technique does not limit us from analyzing cross-platform influence cascades. For example, this could happen if a user on GitHub reads a Tweet critical of a CVE, but decides to respond to it not by tweeting, but by modifying or commenting on code pertaining to the respective vulnerability on GitHub instead. Accordingly, future work will extend the current analysis by exploring the characteristics of such cross-platform influence cascades. Moreover, it is also exciting to explore the influence cascades of other communities and platforms in future work.

Author Contributions

Conceptualization, C.S., C.G., W.R. and I.G.; methodology, C.S.,C.G. and W.R.; software, C.S., C.G., and C.J.; validation, C.S. and C.J.; formal analysis, C.S., C.G. and W.R.; investigation, C.S., C.G. and W.R.; resources, I.G.; data curation, C.S.; writing—original draft preparation, C.S. and C.G.; writing—review and editing, C.S., C.G., W.R. and I.G.; visualization, C.S.; supervision, C.G. and W.R.; project administration, C.G. and W.R.; funding acquisition, I.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the DARPA program grant number HR001117S0018.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data generated and analyzed during this study are openly available in the GitHub repository, https://github.com/Csenevirathna/InfluenceCascades.

Acknowledgments

We would like to thank our research group member, Nisha Baral, for her help in code development and useful discussions. We would like to thank Leidos to collect the data as a part of the SocialSim project.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
OSNOnline social network
IInitiation of a conversation or a post
CContribution to an existing conversation or a post
SSharing of an existing post between conversations without changing the content
CryptoCryptocurrencies
CVECyber-vulnerabilities
GHGitHub
TWTwitter
JSJensen–Shannon

Appendix A. Statistical Tests

Appendix A.1. Spearman’S Correlation Test

We present here scatter plots corresponding to each Spearman’s correlation test which we performed. We observe that except for the Crypto community (Figure A1) neither CVE community (Figure A2) nor GitHub (Figure A3), Twitter (Figure A4) platforms have a clear monotonic relation. Further, we observe that contribution to sharing and sharing to contribution influence relationships in the Crypto community do not show a clear monotonic relation.
Figure A1. The scatter plot of residuals of median total influence values of GitHub and Twitter platforms in the Crypto community.
Figure A1. The scatter plot of residuals of median total influence values of GitHub and Twitter platforms in the Crypto community.
Entropy 23 00160 g0a1
Figure A2. The scatter plot of residuals of median total influence values of GitHub and Twitter platforms in the CVE community.
Figure A2. The scatter plot of residuals of median total influence values of GitHub and Twitter platforms in the CVE community.
Entropy 23 00160 g0a2
Figure A3. The scatter plot of residuals of median total influence values of the Crypto and CVE community on GitHub.
Figure A3. The scatter plot of residuals of median total influence values of the Crypto and CVE community on GitHub.
Entropy 23 00160 g0a3
Figure A4. The scatter plot of residuals of median total influence values of the Crypto and CVE community on Twitter.
Figure A4. The scatter plot of residuals of median total influence values of the Crypto and CVE community on Twitter.
Entropy 23 00160 g0a4

Appendix A.2. Factorial ANOVA Test

We examine the use of the factorial ANOVA test as a statistical significance test to infer the similarities of the structure of the influence cascades across platforms and communities. Forty influence cascades are chosen randomly from the set of influence cascades extracted from each empirical influence networks. The residual values between total normalized influence vector components and the median total normalized influence vector components of the influence cascades from the corresponding scale-free network are calculated. Data is grouped by platform-community, influence relationships, and level, and the normality of each data set was examined using the Shapiro-Wilk test. The p-values are compared with 0.05. Not all the data sets were able to satisfy the normality assumption as shown in Table A1, Table A2, Table A3 and Table A4. Also, the normality of the residual of the factorial ANOVA model is examined using the Shapiro-Wilk test. However, the test is failed with a p-value of less than 0.05. and the Figure A5 shows the nonlinear relationship between theoretical quantities and sample quantities, which support the non-normality of the residuals.
Table A1. Test statistics of factorial ANOVA (Part I).
Table A1. Test statistics of factorial ANOVA (Part I).
Platform-CommunityInfluence RelationshipLevelStatisticsp-Value H 0
GitHub-CVEcontributionTocontribution10.782.72 × 10 6 rejected
GitHub-CVEcontributionTocontribution20.91.79 × 10 3 rejected
GitHub-CVEcontributionTocontribution30.931.53 × 10 2 rejected
GitHub-CVEcontributionTocontribution40.88.28 × 10 6 rejected
GitHub-CVEcontributionToinitiation10.391.04 × 10 11 rejected
GitHub-CVEcontributionToinitiation211.00 × 10 0 not rejected
GitHub-CVEcontributionToinitiation311.00 × 10 0 not rejected
GitHub-CVEcontributionToinitiation411.00 × 10 0 not rejected
GitHub-CVEcontributionTosharing10.233.25 × 10 13 rejected
GitHub-CVEcontributionTosharing20.641.05 × 10 8 rejected
GitHub-CVEcontributionTosharing30.614.91 × 10 9 rejected
GitHub-CVEcontributionTosharing411.00 × 10 0 not rejected
GitHub-CVEinitiationTocontribution10.391.04 × 10 11 rejected
GitHub-CVEinitiationTocontribution211.00 × 10 0 not rejected
GitHub-CVEinitiationTocontribution311.00 × 10 0 not rejected
GitHub-CVEinitiationTocontribution411.00 × 10 0 not rejected
GitHub-CVEinitiationToinitiation111.00 × 10 0 not rejected
GitHub-CVEinitiationToinitiation211.00 × 10 0 not rejected
GitHub-CVEinitiationToinitiation311.00 × 10 0 not rejected
GitHub-CVEinitiationToinitiation411.00 × 10 0 not rejected
GitHub-CVEinitiationTosharing111.00 × 10 0 not rejected
GitHub-CVEinitiationTosharing211.00 × 10 0 not rejected
GitHub-CVEinitiationTosharing311.00 × 10 0 not rejected
GitHub-CVEinitiationTosharing411.00 × 10 0 not rejected
GitHub-CVEsharingTocontribution10.233.25 × 10 13 rejected
GitHub-CVEsharingTocontribution211.00 × 10 0 not rejected
GitHub-CVEsharingTocontribution311.00 × 10 0 not rejected
GitHub-CVEsharingTocontribution411.00 × 10 0 not rejected
GitHub-CVEsharingToinitiation111.00 × 10 0 not rejected
GitHub-CVEsharingToinitiation211.00 × 10 0 not rejected
GitHub-CVEsharingToinitiation311.00 × 10 0 not rejected
GitHub-CVEsharingToinitiation411.00 × 10 0 not rejected
GitHub-CVEsharingTosharing111.00 × 10 0 not rejected
GitHub-CVEsharingTosharing211.00 × 10 0 not rejected
GitHub-CVEsharingTosharing311.00 × 10 0 not rejected
GitHub-CVEsharingTosharing411.00 × 10 0 not rejected
Table A2. Test statistics of factorial ANOVA (Part II).
Table A2. Test statistics of factorial ANOVA (Part II).
Platform-CommunityInfluence RelationshipLevelStatisticsp-Value H 0
GitHub-CryptocontributionTocontribution10.733.02 × 10 7 rejected
GitHub-CryptocontributionTocontribution20.891.32 × 10 3 rejected
GitHub-CryptocontributionTocontribution30.913.21 × 10 3 rejected
GitHub-CryptocontributionTocontribution40.31.36 × 10 12 rejected
GitHub-CryptocontributionToinitiation10.422.43 × 10 11 rejected
GitHub-CryptocontributionToinitiation20.772.07 × 10 6 rejected
GitHub-CryptocontributionToinitiation30.772.11 × 10 6 rejected
GitHub-CryptocontributionToinitiation411.00 × 10 0 not rejected
GitHub-CryptocontributionTosharing111.00 × 10 0 not rejected
GitHub-CryptocontributionTosharing20.955.75 × 10 2 not rejected
GitHub-CryptocontributionTosharing30.955.75 × 10 2 not rejected
GitHub-CryptocontributionTosharing411.00 × 10 0 not rejected
GitHub-CryptoinitiationTocontribution10.156.64 × 10 14 rejected
GitHub-CryptoinitiationTocontribution20.63.49 × 10 9 rejected
GitHub-CryptoinitiationTocontribution30.571.13 × 10 9 rejected
GitHub-CryptoinitiationTocontribution411.00 × 10 0 not rejected
GitHub-CryptoinitiationToinitiation111.00 × 10 0 not rejected
GitHub-CryptoinitiationToinitiation20.637.16 × 10 9 rejected
GitHub-CryptoinitiationToinitiation30.233.25 × 10 13 rejected
GitHub-CryptoinitiationToinitiation411.00 × 10 0 not rejected
GitHub-CryptoinitiationTosharing111.00 × 10 0 not rejected
GitHub-CryptoinitiationTosharing20.63.26 × 10 9 rejected
GitHub-CryptoinitiationTosharing30.156.64 × 10 14 rejected
GitHub-CryptoinitiationTosharing411.00 × 10 0 not rejected
GitHub-CryptosharingTocontribution10.651.72 × 10 8 rejected
GitHub-CryptosharingTocontribution20.651.68 × 10 8 rejected
GitHub-CryptosharingTocontribution30.771.70 × 10 6 rejected
GitHub-CryptosharingTocontribution411.00 × 10 0 not rejected
GitHub-CryptosharingToinitiation10.156.64 × 10 14 rejected
GitHub-CryptosharingToinitiation20.291.19 × 10 12 rejected
GitHub-CryptosharingToinitiation311.00 × 10 0 not rejected
GitHub-CryptosharingToinitiation411.00 × 10 0 not rejected
GitHub-CryptosharingTosharing111.00 × 10 0 not rejected
GitHub-CryptosharingTosharing20.156.64 × 10 14 rejected
GitHub-CryptosharingTosharing311.00 × 10 0 not rejected
GitHub-CryptosharingTosharing411.00 × 10 0 not rejected
Table A3. Test statistics of factorial ANOVA (Part III).
Table A3. Test statistics of factorial ANOVA (Part III).
Platform-CommunityInfluence RelationshipLevelStatisticsp-Value H 0
Twitter-CVEcontributionTocontribution10.156.64 × 10 14 rejected
Twitter-CVEcontributionTocontribution211.00 × 10 0 not rejected
Twitter-CVEcontributionTocontribution311.00 × 10 0 not rejected
Twitter-CVEcontributionTocontribution411.00 × 10 0 not rejected
Twitter-CVEcontributionToinitiation10.156.64 × 10 14 rejected
Twitter-CVEcontributionToinitiation20.625.59 × 10 9 rejected
Twitter-CVEcontributionToinitiation30.156.64 × 10 14 rejected
Twitter-CVEcontributionToinitiation411.00 × 10 0 not rejected
Twitter-CVEcontributionTosharing10.222.81 × 10 13 rejected
Twitter-CVEcontributionTosharing20.637.17 × 10 9 rejected
Twitter-CVEcontributionTosharing30.614.53 × 10 9 rejected
Twitter-CVEcontributionTosharing411.00 × 10 0 not rejected
Twitter-CVEinitiationTocontribution10.592.07 × 10 9 rejected
Twitter-CVEinitiationTocontribution20.651.67 × 10 8 rejected
Twitter-CVEinitiationTocontribution311.00 × 10 0 not rejected
Twitter-CVEinitiationTocontribution411.00 × 10 0 not rejected
Twitter-CVEinitiationToinitiation10.794.87 × 10 6 rejected
Twitter-CVEinitiationToinitiation20.859.62 × 10 5 rejected
Twitter-CVEinitiationToinitiation30.744.97 × 10 7 rejected
Twitter-CVEinitiationToinitiation411.00 × 10 0 not rejected
Twitter-CVEinitiationTosharing10.626.69 × 10 9 rejected
Twitter-CVEinitiationTosharing20.87.55 × 10 6 rejected
Twitter-CVEinitiationTosharing30.641.21 × 10 8 rejected
Twitter-CVEinitiationTosharing411.00 × 10 0 not rejected
Twitter-CVEsharingTocontribution10.156.64 × 10 14 rejected
Twitter-CVEsharingTocontribution20.545.09 × 10 10 rejected
Twitter-CVEsharingTocontribution30.233.25 × 10 13 rejected
Twitter-CVEsharingTocontribution411.00 × 10 0 not rejected
Twitter-CVEsharingToinitiation10.454.74 × 10 11 rejected
Twitter-CVEsharingToinitiation20.71.17 × 10 7 rejected
Twitter-CVEsharingToinitiation30.443.48 × 10 11 rejected
Twitter-CVEsharingToinitiation411.00 × 10 0 not rejected
Twitter-CVEsharingTosharing10.332.45 × 10 12 rejected
Twitter-CVEsharingTosharing20.711.30 × 10 7 rejected
Twitter-CVEsharingTosharing30.466.44 × 10 11 rejected
Twitter-CVEsharingTosharing411.00 × 10 0 not rejected
Table A4. Test statistics of factorial ANOVA (Part IV).
Table A4. Test statistics of factorial ANOVA (Part IV).
Platform-CommunityInfluence RelationshipLevelStatisticsp-Value H 0
Twitter-CryptocontributionTocontribution10.365.16 × 10 12 rejected
Twitter-CryptocontributionTocontribution20.651.40 × 10 8 rejected
Twitter-CryptocontributionTocontribution30.568.47 × 10 10 rejected
Twitter-CryptocontributionTocontribution411.00 × 10 0 not rejected
Twitter-CryptocontributionToinitiation10.533.80 × 10 10 rejected
Twitter-CryptocontributionToinitiation20.697.75 × 10 8 rejected
Twitter-CryptocontributionToinitiation30.522.98 × 10 10 rejected
Twitter-CryptocontributionToinitiation411.00 × 10 0 not rejected
Twitter-CryptocontributionTosharing10.266.03 × 10 13 rejected
Twitter-CryptocontributionTosharing20.614.73 × 10 9 rejected
Twitter-CryptocontributionTosharing30.556.01 × 10 10 rejected
Twitter-CryptocontributionTosharing411.00 × 10 0 not rejected
Twitter-CryptoinitiationTocontribution10.421.96 × 10 11 rejected
Twitter-CryptoinitiationTocontribution20.365.14 × 10 12 rejected
Twitter-CryptoinitiationTocontribution30.365.42 × 10 12 rejected
Twitter-CryptoinitiationTocontribution40.156.64 × 10 14 rejected
Twitter-CryptoinitiationToinitiation10.454.32 × 10 11 rejected
Twitter-CryptoinitiationToinitiation20.365.45 × 10 12 rejected
Twitter-CryptoinitiationToinitiation30.222.70 × 10 13 rejected
Twitter-CryptoinitiationToinitiation40.156.64 × 10 14 rejected
Twitter-CryptoinitiationTosharing10.311.83 × 10 12 rejected
Twitter-CryptoinitiationTosharing20.255.11 × 10 13 rejected
Twitter-CryptoinitiationTosharing30.243.90 × 10 13 rejected
Twitter-CryptoinitiationTosharing40.156.64 × 10 14 rejected
Twitter-CryptosharingTocontribution10.672.85 × 10 8 rejected
Twitter-CryptosharingTocontribution20.641.25 × 10 8 rejected
Twitter-CryptosharingTocontribution30.581.52 × 10 9 rejected
Twitter-CryptosharingTocontribution40.156.64 × 10 14 rejected
Twitter-CryptosharingToinitiation10.757.77 × 10 7 rejected
Twitter-CryptosharingToinitiation20.794.20 × 10 6 rejected
Twitter-CryptosharingToinitiation30.491.37 × 10 10 rejected
Twitter-CryptosharingToinitiation411.00 × 10 0 not rejected
Twitter-CryptosharingTosharing10.711.30 × 10 7 rejected
Twitter-CryptosharingTosharing20.581.55 × 10 9 rejected
Twitter-CryptosharingTosharing30.481.06 × 10 10 rejected
Twitter-CryptosharingTosharing40.156.64 × 10 14 rejected
Figure A5. The normal probability plot of residuals of the factorial ANOVA model.
Figure A5. The normal probability plot of residuals of the factorial ANOVA model.
Entropy 23 00160 g0a5

References

  1. Leskovec, J.; Adamic, L.A.; Huberman, B.A. The Dynamics of Viral Marketing. ACM Trans. Web 2007, 1, 5-es. [Google Scholar] [CrossRef] [Green Version]
  2. Cha, M.; Haddadi, H.; Benevenuto, F.; Gummadi, K.P. Measuring user influence in twitter: The million follower fallacy. Icwsm 2010, 10, 30. [Google Scholar]
  3. Zhao, H. Information Quality or Entities’ Interactivity? Understanding the Determinants of Social Network-Based Brand Community Participation. Future Internet 2019, 11, 87. [Google Scholar] [CrossRef] [Green Version]
  4. Carta, S.; Podda, A.S.; Recupero, D.R.; Saia, R.; Usai, G. Popularity Prediction of Instagram Posts. Information 2020, 11, 453. [Google Scholar] [CrossRef]
  5. Boratto, L.; Carta, S.; Fenu, G.; Saia, R. Using neural word embeddings to model user behavior and detect user segments. Knowl. Based Syst. 2016, 108, 5–14. [Google Scholar] [CrossRef]
  6. Bond, R.M.; Fariss, C.J.; Jones, J.J.; Kramer, A.D.; Marlow, C.; Settle, J.E.; Fowler, J.H. A 61-million-person experiment in social influence and political mobilization. Nature 2012, 489, 295–298. [Google Scholar] [CrossRef] [Green Version]
  7. Watts, D.J.; Dodds, P.S. Influentials, Networks, and Public Opinion Formation. J. Consum. Res. 2007, 34, 441–458. [Google Scholar] [CrossRef]
  8. Kitsak, M.; Gallos, L.K.; Havlin, S.; Liljeros, F.; Muchnik, L.; Stanley, H.E.; Makse, H.A. Identification of influential spreaders in complex networks. Nat. Phys. 2010, 6, 888–893. [Google Scholar] [CrossRef] [Green Version]
  9. Bakshy, E.; Hofman, J.M.; Mason, W.A.; Watts, D.J. Everyone’s an Influencer: Quantifying Influence on Twitter. In Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, WSDM ’11, Hong Kong, 9–12 February 2011; Association for Computing Machinery: New York, NY, USA, 2011; pp. 65–74. [Google Scholar] [CrossRef]
  10. Wang, S.; Li, X.; Ye, Y.; Feng, S.; Lau, R.; Huang, X.; Du, X. Anchor Link Prediction across Attributed Networks via Network Embedding. Entropy 2019, 21, 254. [Google Scholar] [CrossRef] [Green Version]
  11. Aral, S.; Dhillon, P.S. Social influence maximization under empirical influence models. Nat. Hum. Behav. 2018, 2, 375–382. [Google Scholar] [CrossRef]
  12. Zhang, Z.K.; Liu, C.; Zhan, X.X.; Lu, X.; Zhang, C.X.; Zhang, Y.C. Dynamics of information diffusion and its applications on complex networks. Phys. Rep. 2016, 651, 1–34. [Google Scholar] [CrossRef] [Green Version]
  13. Adar, E.; Zhang, L.; Adamic, L.A.; Lukose, R.M. Implicit+ Structure+ and+ the+ Dynamics+ of+ Blogspace. 2004. Available online: Https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.188.462&rep=rep1&type=pdf (accessed on 23 January 2021).
  14. Leskovec, J.; McGlohon, M.; Faloutsos, C.; Glance, N.; Hurst, M. Patterns of cascading behavior in large blog graphs. In Proceedings of the 2007 SIAM International Conference on Data Mining, SIAM, Minneapolis, MI, USA, 26–28 April 2007; pp. 551–556. [Google Scholar]
  15. Kumar, R.; Mahdian, M.; McGlohon, M. Dynamics of Conversations. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’10, Washington, DC, USA, 25–28 July 2010; Association for Computing Machinery: New York, NY, USA, 2010; pp. 553–562. [Google Scholar] [CrossRef]
  16. Ver Steeg, G.; Galstyan, A. Information Transfer in Social Media. In Proceedings of the 21st International Conference on World Wide Web, WWW ’12, Lyon, France, 16–20 April 2012; Association for Computing Machinery: New York, NY, USA, 2012; pp. 509–518. [Google Scholar] [CrossRef] [Green Version]
  17. Dow, P.A.; Adamic, L.; Friggeri, A. The Anatomy of Large Facebook Cascades. In Proceedings of the International AAAI Conference on Web and Social Media, Cambridge, MA, USA, 8–11 July 2013; Volume 7. [Google Scholar]
  18. Schreiber, T. Measuring Information Transfer. Phys. Rev. Lett. 2000, 85, 461–464. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  19. Phan, N.; Ebrahimi, J.; Kil, D.; Piniewski, B.; Dou, D. Topic-Aware Physical Activity Propagation in a Health Social Network. IEEE Intell. Syst. 2016, 31, 5–14. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  20. Hu, M.; Liu, S.; Wei, F.; Wu, Y.; Stasko, J.; Ma, K.L. Breaking News on Twitter. In Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems—CHI ’12, Austin, TX, USA, 5–10 May 2012; ACM Press: New York, NY, USA, 2012. [Google Scholar]
  21. Otte, E.; Rousseau, R. Social network analysis: A powerful strategy, also for the information sciences. J. Inf. Sci. 2002, 28, 441–453. [Google Scholar] [CrossRef]
  22. Li, P.; Yu, J.X.; Liu, H.; He, J.; Du, X. Ranking Individuals and Groups by Influence Propagation. In Advances in Knowledge Discovery and Data Mining; Huang, J.Z., Cao, L., Srivastava, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 407–419. [Google Scholar] [CrossRef]
  23. Wang, W.; Street, W.N. A novel algorithm for community detection and influence ranking in social networks. In Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), Beijing, China, 17–20 August 2014; pp. 555–560. [Google Scholar] [CrossRef] [Green Version]
  24. Li, X.; Liu, Y.; Jiang, Y.; Liu, X. Identifying social influence in complex networks: A novel conductance eigenvector centrality model. Neurocomputing 2016, 210, 141–154. [Google Scholar] [CrossRef]
  25. Peng, S.; Zhou, Y.; Cao, L.; Yu, S.; Niu, J.; Jia, W. Influence analysis in social networks: A survey. J. Netw. Comput. Appl. 2018, 106, 17–32. [Google Scholar] [CrossRef]
  26. Chen, W.; Cheng, S.; He, X.; Jiang, F. InfluenceRank: An Efficient Social Influence Measurement for Millions of Users in Microblog. In Proceedings of the 2012 Second International Conference on Cloud and Green Computing, Xiangtan, China, 1–3 November 2012; pp. 563–570. [Google Scholar] [CrossRef]
  27. Kwak, H.; Lee, C.; Park, H.; Moon, S. What is Twitter, a Social Network or a News Media? In Proceedings of the 19th International Conference on World Wide Web, WWW ’10, Raleigh, NC, USA, 26–30 April 2010; Association for Computing Machinery: New York, NY, USA, 2010; pp. 591–600. [Google Scholar] [CrossRef] [Green Version]
  28. Romero, D.M.; Galuba, W.; Asur, S.; Huberman, B.A. Influence and Passivity in Social Media. In Machine Learning and Knowledge Discovery in Databases; Gunopulos, D., Hofmann, T., Malerba, D., Vazirgiannis, M., Eds.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 18–33. [Google Scholar] [CrossRef] [Green Version]
  29. Qiu, J.; Tang, J.; Ma, H.; Dong, Y.; Wang, K.; Tang, J. DeepInf: Social Influence Prediction with Deep Learning. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD ’18, London, UK, 19–23 August 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 2110–2119. [Google Scholar] [CrossRef] [Green Version]
  30. Leung, C.K.; Cuzzocrea, A.; Mai, J.J.; Deng, D.; Jiang, F. Personalized DeepInf: Enhanced Social Influence Prediction with Deep Learning and Transfer Learning. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; pp. 2871–2880. [Google Scholar] [CrossRef]
  31. Zhang, X.; Han, D.D.; Yang, R.; Zhang, Z. Users’ participation and social influence during information spreading on Twitter. PLoS ONE 2017, 12, 1–17. [Google Scholar] [CrossRef] [Green Version]
  32. Peng, S.; Li, J.; Yang, A. Entropy-Based Social Influence Evaluation in Mobile Social Networks; Springer: Cham, Switzerland, 2015; pp. 637–647. [Google Scholar] [CrossRef]
  33. Sun, B.; Ng, V.T. Identifying Influential Users by Their Postings in Social Networks; Springer: Berlin/Heidelberg, Germany, 2013; pp. 128–151. [Google Scholar] [CrossRef]
  34. Chen, X.; Zhou, J.; Liao, Z.; Liu, S.; Zhang, Y. A Novel Method to Rank Influential Nodes in Complex Networks Based on Tsallis Entropy. Entropy 2020, 22, 848. [Google Scholar] [CrossRef]
  35. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef] [Green Version]
  36. Ver Steeg, G.; Galstyan, A. Information-Theoretic Measures of Influence Based on Content Dynamics. In Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, WSDM ’13, Rome, Italy, 4–8 February 2013; Association for Computing Machinery: New York, NY, USA, 2013; pp. 3–12. [Google Scholar] [CrossRef] [Green Version]
  37. He, S.; Zheng, X.; Zeng, D.; Cui, K.; Zhang, Z.; Luo, C. Identifying Peer Influence in Online Social Networks Using Transfer Entropy. In Intelligence and Security Informatics; Wang, G.A., Zheng, X., Chau, M., Chen, H., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 47–61. [Google Scholar] [CrossRef]
  38. Gruhl, D.; Guha, R.; Liben-Nowell, D.; Tomkins, A. Information Diffusion through Blogspace. In Proceedings of the 13th International Conference on World Wide Web, WWW ’04, New York, NY, USA, 17–20 May 2004; Association for Computing Machinery: New York, NY, USA, 2004; pp. 491–501. [Google Scholar] [CrossRef]
  39. Cadena, J.; Korkmaz, G.; Kuhlman, C.J.; Marathe, A.; Ramakrishnan, N.; Vullikanti, A. Forecasting Social Unrest Using Activity Cascades. PLoS ONE 2015, 10, 1–27. [Google Scholar] [CrossRef] [Green Version]
  40. Xiong, Y.; Meng, Z.; Shen, B.; Yin, W. Mining Developer Behavior Across GitHub and StackOverflow. In Proceedings of the Twenty-Ninth International Conference on Software Engineering and Knowledge Engineering (SEKE 2017), Pittsburgh, PA, USA, 5–7 July 2017; pp. 578–583. [Google Scholar]
  41. Waterloo, S.F.; Baumgartner, S.E.; Peter, J.; Valkenburg, P.M. Norms of online expressions of emotion: Comparing Facebook, Twitter, Instagram, and WhatsApp. New Media Soc. 2018, 20, 1813–1831. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  42. Kim, M.; Newth, D.; Christen, P. Macro-level information transfer in social media: Reflections of crowd phenomena. Neurocomputing 2016, 172, 84–99. [Google Scholar] [CrossRef]
  43. Bhattacharjee, A. Measuring Influence Across Social Media Platforms: Empirical Analysis Using Symbolic Transfer Entropy. Master’s Thesis, University of South Florida, Tampa, FL, USA, 2019. [Google Scholar]
  44. Gunaratne, C.; Senevirathna, C.; Jayalath, C.; Baral, N.; Rand, W.; Garibay, I. A Multi-Action Cascade Model of Conversation. In Proceedings of the 5th International Conference on Computational Social Science, Amsterdam, The Netherlands, 17–20 July 2019. [Google Scholar]
  45. Lupton, R.; Allwood, J. Hybrid Sankey diagrams: Visual analysis of multidimensional data for understanding resource use. Resour. Conserv. Recycl. 2017, 124, 141–151. [Google Scholar] [CrossRef]
  46. Strzalkowski, T.; Harrison, T.; Sa, N.; Katsios, G.; Khoja, E. GitHub as a Social Network. In Advances in Artificial Intelligence, Software and Systems Engineering; Ahram, T.Z., Ed.; Springer International Publishing: Cham, Switzerland, 2019; pp. 379–390. [Google Scholar]
  47. Bollobás, B.; Borgs, C.; Chayes, J.T.; Riordan, O. Directed scale-free graphs. In Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, Society for Industrial and Applied Mathematics, Baltimore, MD, USA, 12–14 January 2003; Volume 3, pp. 132–139. [Google Scholar]
Figure 1. Example of an Influence Cascade. User u 1 is selected as a root user as it has a zero in-degree, i.e. it is not socially influenced. User u 1 socially influences users u 2 , u 3 at level 1. Users { u 2 , u 3 } influence users { u 4 , u 5 , u 6 , u 7 } at level 2. γ u i , u j ; i , j = 1 , 2 , , 7 represent the total influence vector from user u i to user u j .
Figure 1. Example of an Influence Cascade. User u 1 is selected as a root user as it has a zero in-degree, i.e. it is not socially influenced. User u 1 socially influences users u 2 , u 3 at level 1. Users { u 2 , u 3 } influence users { u 4 , u 5 , u 6 , u 7 } at level 2. γ u i , u j ; i , j = 1 , 2 , , 7 represent the total influence vector from user u i to user u j .
Entropy 23 00160 g001
Figure 2. Example of a Sankey diagram produced by the proposed method. The diagram visualizes the normalized flow of total influence, categorized by influence relationships, along the length of a influence cascade. The nodes represent the different activity types, I: Initiation (yellow), C: Contribution (blue), and S: Sharing (pink), and their heights represent the relative magnitude of influence each level exerts on the next. The thickness of the blue, pink, yellow flow lines are proportionate to the magnitude of the normalized total influence value that C, S, and I events have on corresponding actions at the next level, respectively.
Figure 2. Example of a Sankey diagram produced by the proposed method. The diagram visualizes the normalized flow of total influence, categorized by influence relationships, along the length of a influence cascade. The nodes represent the different activity types, I: Initiation (yellow), C: Contribution (blue), and S: Sharing (pink), and their heights represent the relative magnitude of influence each level exerts on the next. The thickness of the blue, pink, yellow flow lines are proportionate to the magnitude of the normalized total influence value that C, S, and I events have on corresponding actions at the next level, respectively.
Entropy 23 00160 g002
Figure 3. Examples of uniformly distributed influence cascades over scale-free networks of varying network sizes.
Figure 3. Examples of uniformly distributed influence cascades over scale-free networks of varying network sizes.
Entropy 23 00160 g003
Figure 4. The mean total number of users at each level by platforms and communities for empirical networks and their scale-free networks. The user distribution of the common vulnerable exposure (CVE) community follows the scale-free null model closer than the cryptocurrency community.
Figure 4. The mean total number of users at each level by platforms and communities for empirical networks and their scale-free networks. The user distribution of the common vulnerable exposure (CVE) community follows the scale-free null model closer than the cryptocurrency community.
Entropy 23 00160 g004
Figure 5. The cumulative sum of the mean total number of users at each level by platforms and communities for empirical networks and their scale-free networks. The cumulative user distribution of CVE community follows the scale-free null model closer than cryptocurrency community.
Figure 5. The cumulative sum of the mean total number of users at each level by platforms and communities for empirical networks and their scale-free networks. The cumulative user distribution of CVE community follows the scale-free null model closer than cryptocurrency community.
Entropy 23 00160 g005
Figure 6. The median normalized total influence, by activity types I , C and S, along with the levels of the influence cascades of the GitHub (GH)-Crypto, GH-common vulnerable exposure (CVE), Twitter (TW)-Crypto, and TW-CVE empirical networks. The typical influence cascade in GH-CVE is much longer than the other platform-communities and is dominated by contribution actions influenced by contribution actions.
Figure 6. The median normalized total influence, by activity types I , C and S, along with the levels of the influence cascades of the GitHub (GH)-Crypto, GH-common vulnerable exposure (CVE), Twitter (TW)-Crypto, and TW-CVE empirical networks. The typical influence cascade in GH-CVE is much longer than the other platform-communities and is dominated by contribution actions influenced by contribution actions.
Entropy 23 00160 g006
Figure 7. The median normalized total influence, by activity types I , C and S, along with the levels of the uniformly distributed influence cascades over the scale-free null models corresponding to GH-Crypto, GH-CVE, TW-Crypto, and TW-CVE influence networks by equal network size.
Figure 7. The median normalized total influence, by activity types I , C and S, along with the levels of the uniformly distributed influence cascades over the scale-free null models corresponding to GH-Crypto, GH-CVE, TW-Crypto, and TW-CVE influence networks by equal network size.
Entropy 23 00160 g007
Figure 8. The residuals between the median normalized total influence values by relationship, over cascade level, of the empirical networks when compared to those of their corresponding scale-free null models. Most relationships in the cryptocurrency community seem correlated despite the difference in platform.
Figure 8. The residuals between the median normalized total influence values by relationship, over cascade level, of the empirical networks when compared to those of their corresponding scale-free null models. Most relationships in the cryptocurrency community seem correlated despite the difference in platform.
Entropy 23 00160 g008
Table 1. Classification of GitHub and Twitter actions.
Table 1. Classification of GitHub and Twitter actions.
InitiationContributionSharing
GitHubCreateEventCommitCommentEvent,
GollumEvent, IssueCommentEvent,
IssuesEvent, PullRequestEvent,
PullRequestReviewCommentEvent,
PushEvent, DeleteEvent
ForkEvent, WatchEvent,
MemberEvent, PublicEvent,
ReleaseEvent
TwitterTweetReply, QuoteRetweet
Table 2. Jensen–Shannon Divergence test statistics for each empirical network from its corresponding scale-free null model. Jensen–Shannon (JS) divergences are the smallest within the CVE communities and their scale-free null models, in comparison to that of the cryptocurrency communities.
Table 2. Jensen–Shannon Divergence test statistics for each empirical network from its corresponding scale-free null model. Jensen–Shannon (JS) divergences are the smallest within the CVE communities and their scale-free null models, in comparison to that of the cryptocurrency communities.
CommunityPlatformJS-Divergence
CVEGitHub0.0964
CryptoGitHub0.1765
CVETwitter0.0858
CryptoTwitter0.2138
Table 3. Jensen–Shannon Divergence test statistics between each empirical network. JS divergences are the least within communities and across varying platforms, in comparison to within platforms across varying communities.
Table 3. Jensen–Shannon Divergence test statistics between each empirical network. JS divergences are the least within communities and across varying platforms, in comparison to within platforms across varying communities.
Community 1Platform 1Community 2Platform 2JS-Divergence
CryptoGitHubCryptoTwitter0.1634
CVEGitHubCVETwitter0.1944
CryptoTwitterCVETwitter0.1983
CryptoGitHubCVEGitHub0.3414
Table 4. Spearman’s correlation for the H 0 : there is no correlation between the residuals in magnitude of influence of two platform-communities by relationship, at original significance = 0.05 (Bonferroni-corrected significance = 0.0055). For each platform-community, the results for the influence relationships compared are sorted in descending order of correlation coefficient. The only significant correlations are observed between the influence relationships of the cryptocurrency community on Twitter and GitHub, with the exception of C S and S C .
Table 4. Spearman’s correlation for the H 0 : there is no correlation between the residuals in magnitude of influence of two platform-communities by relationship, at original significance = 0.05 (Bonferroni-corrected significance = 0.0055). For each platform-community, the results for the influence relationships compared are sorted in descending order of correlation coefficient. The only significant correlations are observed between the influence relationships of the cryptocurrency community on Twitter and GitHub, with the exception of C S and S C .
Community 1Platform 1Community 2Platform 2Influence Relationship ρ p-Value
CryptoGitHubCryptoTwitter I I 10
I C 10
I S 10
C I 10
C C 10
S I 10
S S 10
C S 0.80.2
S C 0.40.6
CVEGitHubCVETwitter I I 0.40.6
I S 0.40.6
C C 0.40.6
S S 0.40.6
I C 0.20.8
C I 0.20.8
S I 0.20.8
S C 0.20.8
C S −0.20.8
CryptoTwitterCVETwitter I I 0.80.2
I C 0.80.2
I S 0.80.2
C I 0.80.2
S I 0.80.2
S C 0.80.2
S S 0.80.2
C S 0.40.6
C C −0.20.8
CryptoGitHubCVEGitHub C S 0.40.6
I I 01
I S 01
C C 01
S S 01
I C −0.40.6
C I −0.40.6
S I −0.40.6
S C −0.40.6
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Senevirathna, C.; Gunaratne, C.; Rand, W.; Jayalath, C.; Garibay, I. Influence Cascades: Entropy-Based Characterization of Behavioral Influence Patterns in Social Media. Entropy 2021, 23, 160. https://doi.org/10.3390/e23020160

AMA Style

Senevirathna C, Gunaratne C, Rand W, Jayalath C, Garibay I. Influence Cascades: Entropy-Based Characterization of Behavioral Influence Patterns in Social Media. Entropy. 2021; 23(2):160. https://doi.org/10.3390/e23020160

Chicago/Turabian Style

Senevirathna, Chathurani, Chathika Gunaratne, William Rand, Chathura Jayalath, and Ivan Garibay. 2021. "Influence Cascades: Entropy-Based Characterization of Behavioral Influence Patterns in Social Media" Entropy 23, no. 2: 160. https://doi.org/10.3390/e23020160

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop