The message does not matter: the influence of the network on information diffusion

نویسندگان

  • Fabrício Olivetti de França
  • Denise H. Goya
  • Claudio Luis de Camargo Penteado
چکیده

How an information spreads throughout a social network is a valuable knowledge sought by many groups such as marketing enterprises and political parties. If they can somehow predict the impact of a given message or manipulate it in order to amplify how long it will spread, it would give them a huge advantage over their competitors. Intuitively, it is expected that two factors contribute to make an information becoming viral: how influential the person who spreads is inside its network and the content of the message. The former should have a more important role, since people will not just blindly share any content, or will they? In this work it is found that the degree of a node alone is capable of accurately predicting how many followers of the seed user will spread the information through a simple linear regression. The analysis was performed with five different messages from Twitter network that was shared with different degrees along the users. The results show evidences that no matter the content, the number of affected neighbors is predictable. The role of the content of the messages of a user is likely to influence the network formation and the path the message will follow through the network. Keywords—complex networks, information diffusion, diffusion model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

بهبود کارایی پروتکلSIP در شرایط اضافه بار با استفاده از قابلیت مبتنی بر پنجره

The extent and diversity of systems provided by IP networks have made various technologies to approach integrating various types of access networks and converting to next generation network. The Session Initiation Protocol (SIP) with respect to facilities such as being in text form, end-to-end connection, independence from the type of transmitted data, and supporting various forms of transmissi...

متن کامل

Mass Media vs. the Mass of Media: A Study on the Human Nodes in a Social Network and their Chosen Messages

In Internet-based social networks, the nodes have the most pivotal role in the processes and outcomes of the networks. Whether they pay attention to a message in the network or ignore it defines the fate of the message. One message is shared and re-shared by millions of users and another is left forgotten. The current study tries to shed light on one aspect of the role of the users in a social ...

متن کامل

The Influence of Utilizing Social Networks on the Generation Gap in Families in 5th District of Tehran

This study aimed to examine the influence of utilizing social networks on the intergenerational gap between families living in District 5 of Tehran. The method to conduct the research was a kind of survey method, and a researcher-made questionnaire was applied to gather information. The sampling method is a randomized cluster, and 400 people determined the sample size by applying Cochran's form...

متن کامل

The Influence of Location on Nodes’ Centrality in Location-Based Social Networks

Nowadays, due to the widespread use of social networks, they can be used as a convenient, low-cost, and affordable tool for disseminating all kinds of information and data among the massive users of these networks. Issues such as marketing for new products, informing the public in critical situations, and disseminating medical and technological innovations are topics that have been considered b...

متن کامل

بهبود پروتکل AODV جهت مقابله با حملات کرم‌چاله در شبکه‌های اقتضایی

Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node.  In Wormhole attacks, one malicious node tunnels packets from its location to the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1508.05617  شماره 

صفحات  -

تاریخ انتشار 2015