Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Influencing Busy People in a Social Network

Abstract

We identify influential early adopters in a social network, where individuals are resource constrained, to maximize the spread of multiple, costly behaviors. A solution to this problem is especially important for viral marketing. The problem of maximizing influence in a social network is challenging since it is computationally intractable. We make three contributions. First, we propose a new model of collective behavior that incorporates individual intent, knowledge of neighbors actions and resource constraints. Second, we show that the multiple behavior influence maximization is NP-hard. Furthermore, we show that the problem is submodular, implying the existence of a greedy solution that approximates the optimal solution to within a constant. However, since the greedy algorithm is expensive for large networks, we propose efficient heuristics to identify the influential individuals, including heuristics to assign behaviors to the different early adopters. We test our approach on synthetic and real-world topologies with excellent results. We evaluate the effectiveness under three metrics: unique number of participants, total number of active behaviors and network resource utilization. Our heuristics produce 15-51% increase in expected resource utilization over the naïve approach.

1 Introduction

Often, we are unable to adopt a behavior—despite knowledge of behavior utility, interest in adoption and knowledge of behavior adoption amongst friends—because we lack the resources to adopt the behavior. Consider the following scenarios: Many of John’s friends are planning to take the free flu shot offered at the university health clinic this week. Unfortunately for John, he is planning to be away from the university at that time and unable to make use of the opportunity. Mary wants to buy and cook with organic produce like her neighbors, but in her small town the only grocer that sells organic produce is ten miles away; unlike her neighbors, she does not own a car, and thus cannot afford to spend time traveling to the store and back on a public bus. Both examples point to absence of resources, either time, or a tangible resource like a car being an important barrier to adoption of behavior.

This paper investigates the problem of how to maximize the spread of multiple, costly behaviors in a social network when individuals have limited resources. In general, resources can be time, money or any tangible asset. We plan to address this problem by identifying a small set of influential individuals, who by becoming early adopters of the behavior will maximize the spread of the behavior in the network. The ability to identify such individuals is vital to viral marketing. The problem of multiple behavior “influence maximization” can be shown to be computationally intractable. Indeed, a simpler version of influence maximization, when we are interested in maximizing the spread of a single behavior, without resource constraints has been shown to be NP-hard [1].

Our research in the more generalized influence maximization problem is motivated by a desire to model and analyze a more realistic decision making process: individuals have to decide which subset of behaviors—amongst those that their friends have adopted—to adopt that consume fewer resources than what they possess. Faced with such a scenario, we would expect a rational individual to adopt that subset of behaviors that maximizes their utility while subject to resource constraints. That individuals with limited resources affect the behavior dynamics has empirical support: Hodas and Lerman [2] suggests that resource constraints help explain why information stops spreading on networks like Twitter. Resource constraints not only limit individual participation, but also shape how behaviors spread in a network. Although there is some work on diffusion of two competitive behaviors, the general idea of individual level resource constraint, and the presence of multiple costly behaviors is largely unexplored in past work.

In this paper, we develop a model of multiple behavior diffusion that captures the complex dynamics of multiple behavior adoption in resource constrained networks. We answer two specific questions with this model: who are the k most influential individuals in a network? and what set of behaviors should these influential individuals adopt, if they are chosen as the early adopters? We make several contributions in this paper.

  • To the best our knowledge, our work is the earliest of its kind to analyze the influence of individual resource constraints on multiple, costly behavior adoption in an network. We propose a model of multiple behavior adoption that extends the earlier threshold model developed by Granovetter [3], via incorporating resource constraints and individual intent. Thus, an individual adopts a behavior when she receives a “social signal”—knowledge of neighbors actions—of sufficient strength (that is, when sufficient number of neighbors have adopted), the behavior is of high utility and when she has the resources to do so.
  • We show that the influence maximization problem in the multiple behavior case is NP-hard. However, we note that this result is unsurprising since the influence maximization problem in the single behavior case which is a special case of the research question addressed in this paper was shown to be NP-hard by Kempe et al. [1]. Importantly, we prove that the influence maximization problem for multiple behaviors, with individual resource constraints is submodular, implying the existence of a greedy algorithm that approximates the optimal solution within a factor of 1 − 1/e.
  • We propose several efficient heuristics to approximately solve the NP-hard influence maximization problem, including identifying the behavior that each seed ought to adopt. For example, our Expected Immediate Adoption heuristic is O(n log n + m), where n is the number of nodes in the graph and m is the number of edges. In contrast, the greedy algorithm that best approximates the optimal solution is O(n2) with a large constant since the greedy algorithm requires costly stochastic simulation to evaluate the diffusion. The heuristics to assign behavior include assigning behaviors randomly to each node, assigning behaviors proportional to cost, and assigning all seed nodes to have the highest cost behavior.

We use three different metrics to evaluate the different heuristics: unique number of participants, number of behaviors in the network and expected resource utilization. We test our approach on synthetic and real-world topologies with excellent results. We show that two heuristics that evaluate Influence Weight and Expected Immediate Adoption provide very good solutions to the seed selection problem. Our seed selection heuristics produce 15-51% increase in expected resource utilization over the naïve approach of identifying individuals with the highest degree as influential. We find that when behaviors are assigned to seeds proportional to behavior cost, we have the highest resource utilization, and when all seeds are assigned the lowest cost behavior, we see the highest participation.

The rest of the paper is organized as follows. In the next section we review the relevant literature. In Section 3 we formally define our behavior diffusion model. In Section 4 we define the seed selection problem, prove intractability results, and provide an approximation algorithm for a slightly simplified model. In section 5 we present different heuristics and compare their performance for synthetic as well as real world networks. In Section 6 we discuss different behavior distribution strategies and present simulation results. In Section 7 we discuss open issues, extensions and our conclusions. The supporting information file S1 Appendix illustrates and elaborates a few technical issues that are not addressed fully in the main paper.

2 Related Work

There is a rich body of literature spanning multiple disciplines that have analyzed the problem of diffusion of behavior. It would be infeasible to present an exhaustive survey of past work related to this paper and we hope to present a representative sample here.

Motivated by the work of Rogers [4] amongst others, Bass [5] proposed a temporal model of sales of infrequently bought consumer durables (e.g. buying refrigerators). The model proposed that the probability of initial purchase at a time t, given that no purchase has been yet made is a linear function of previous buyers. Based on earlier work that identified different buying behaviors, Bass [5] proposed that there were essentially two types of consumer behavior—innovators and imitators. Innovators bought products without being influenced by social pressures, whereas imitators were influenced by the adoption decisions of other buyers. While Bass model has been highly influential—the result is a simple model of aggregate behavior whose parameters can be estimated from sales data—it is a population model that ignores the network structure in which an individual finds herself. Granovetter [3] proposed a simple social influence model of adoption: an individual adopts a behavior if a certain fraction of the group adopt the behavior, and where the fraction exceeds the individual’s private threshold.

As Young [6] points out in his study of innovation diffusion, a major limitation of threshold models is that we do not know why an individual is influenced by his peers since Granovetter’s model lacks an economic incentive for the individual to adopt the behavior. This can be addressed via a threshold model that arises out of a network coordination game: an individual adopts a behavior to coordinate with her network neighbors in a manner that maximizes her utility. It is easy to show that the network coordination game, where each neighbor has adopted behaviors with different utilities, is equivalent to each individual possessing a local, private threshold that must be exceeded for her to adopt.

Watts [7] analyzes random graphs using the linear threshold model to identify conditions for the emergence of global cascades. A node is called vulnerable if its threshold θ ≤ 1/K where it has K neighbors. The vulnerable nodes are said to percolate when they form a giant component. He find that if vulnerable nodes percolate then global cascades can occur. In more recent work Watts and Dodds [8] critically evaluate the “influential hypothesis” which has played a significant role in the development of the theory of social diffusion processes. The influential hypothesis posits that opinion leaders or “influentials” act as intermediaries in the dissemination of the information from mass media to general public. Watts and Dodds [8] show that except for some special situations large scale social cascades are driven by a critical mass of easily influenced individual rather than the influentials. However, mechanisms to efficiently trigger cascades in such networks is unclear.

The idea of modeling complex social phenomena like behavior diffusion using the mathematical model of networks and network based stochastic processes pertains to the field of complex network analysis. For general introduction to complex networks and application of the methods in varied areas of scientific research see [911].

There has been much work in Computer Science on the problem of influence maximization—how to efficiently identify seeds (or “innovators” in the parlance of [5]) that maximally influence the network. Domingos and Richardson [12] and Kempe et al. [1] initiated the study of the computational problem of seed selection in the context of a “viral” social diffusion process. [1] formalized the algorithmic problem for Independent Cascade and Linear Threshold models, proved the intractability results and provided a greedy approximation algorithm based on earlier work by Nemhauser et al. [13]. However the greedy algorithm is computationally very expensive in practice since identifying each seed requires a large number of stochastic simulations, Much of the recent work(e.g. [14]) has focused on reducing the computational complexity of the simulations. Identifying cheap computational heuristics that match the performance of Kempe et al. [1] are surprisingly less common. Chen et al. [15] who developed computationally cheap heuristics for the Independent Cascade model that matches the performance of the greedy approximation algorithm is an exception. In the Independent Cascade model, a vertex v has a fixed probability p of influencing each of its network neighbors to adopt the behavior. Crucially in the model, it can attempt to influence each of its neighbors just once with probability p. There has been much work to identify these probabilities for the independent cascade model [1618].

Motivated by earlier work in Economics on cascades by Arthur [19], Chierichetti et al. [20] and Martin et al. [21] study the scheduling of cascades on a arbitrary graph. In the problem that Chierichetti et al. [20] study, there are two competing products and individuals choose one product over the other keeping in mind two factors: their own preference for each product and the payoff from aligning with the choices of their neighbors. If one product has a preference probability p the other has preference probability 1 − p. They show that if they can schedule the order in which individuals make decisions on which of the two competing products that they adopt, the number of adoptions is linear in the size of the social network. There is an important difference between the Arthur [19] model and the linear threshold model adopted in this paper. The difference is that while in the Arthur [19] model, a person examines the numbers of adoptees for both products to make a decision, in the linear threshold model, a person makes a decision on adopting a product only based on number of adoptees for that product. Due to this distinction, the number of adoptees for a product in the linear threshold model is monotone over time and the outcome is order independent.

Seeman and Singer [22] examines the adaptive seeding problem in the framework of two-stage stochastic optimization. The problem here is: given a seed budget, and a subset X of accessible users, how to choose a set of seeds from X, utilizing only part of the seed budget, such that the expected value of the influence function (i.e. spread) can be maximized by utilizing the remaining seed budget on some subset of their neighbors. Rubinstein et al. [23] analyzes the same problem in the more general setting, where different individuals have different activation costs. Although they call this setting by the name “knapsack” constraint, it differs from the knapsack constrain that we have imposed in our model (see section 3) in two important aspect: first, they do not consider multiple competing behaviors, and second, in their setting it is more appropriate to consider that the advertiser or the campaign runner is solving a knapsack problem, whereas in our model each individual is solving a knapsack type of constraint for making behavior adoption decisions.

In Economics, there is a rich body of work [2426] that examines both social learning—how individuals adopt beliefs—and consequently identifying influentials. Social learning is the idea that rational agents take optimal decisions based on the observations of other agents. While assumptions vary—whether the network is fully observable; only adoptions but not payoffs are observable—the idea that individuals choose the behavior that maximizes their utility has a natural appeal. For example, Bala and Goyal [24] introduce the idea of “learning from neighbors”—analysis of a set of infinite agents who can observe the actions and outcomes of only their network neighbors. The main result is that in a connected graph, if the actions are ranked by payoffs, then in the long run, everyone chooses the same action with probability one.

The DeGroot [27] influence model has seen significant follow up work (e.g. [25]). In the basic model, a person updates their belief (e.g. about the occurrence of an event) using a weighted sum of the beliefs of their neighbors. A directed graph is called aperiodic if 1 is the greatest common divisor of all the lengths of the different directed cycles, and a closed set of nodes is one where any node in this set is not influenced by nodes outside this set. For a connected, aperiodic, directed graph, we can show that all closed strongly connected components arrive at a consensus; different closed components will in general arrive at different consensus values. A node not belonging to any closed component will arrive at a belief that is a weighted average of consensus beliefs of components to which it is connected. Thus we can compute a measure of “influence” in the following manner. Assume that T is the influence weight matrix of the social network where Ti,j is the weight that node i has for node j. Then, it is straightforward to show that sj the influence of a node j is the the jth entry of the leading left eigenvector s of T, where sT = s. One weakness in thinking in terms of influence in the DeGroot [27] model is that since only the closed sets of nodes arrive at a consensus, it is possible to construct directed graphs where a small set of closed nodes have all the influence since only closed sets of nodes will have non-zero entries in the eigenvector s. This is exactly the issue in the original PageRank algorithm where the PageRanks of nodes except for closed sets will go to zero. A simple solution in the PageRank case was to used a scaling with random restarts. Extending the scaled PageRank model to the DeGroot [27] model essentially implies that individuals look at the average beliefs of their neighbors with probability p and a randomly chosen individual’s belief with probability 1 − p, where p is the scaling factor.

There is a clear distinction between the linear threshold models (e.g. [1]) analyzed in Computer Science literature and the DeGroot [27] influence model or the Bayesian social learning frameworks (e.g. [24]) analyzed in research papers in Economics. In the linear threshold model, the adoption is “progressive”—once a node adopts a behavior, it will never drop that behavior [1]. In the DeGroot [27] influence model and the social learning frameworks, individuals update their beliefs at every time-step as a weight average of the beliefs of their network neighbors. Their beliefs will converge in the limit. It can be shown the convergence speed depends on the size of the second largest eigenvalue of T, the influence weight matrix. See Jackson [28] for a textbook proof.

Our work on maximizing the spread of behavior in resource constrained networks is informed by this literature, but is markedly different in a number of aspects. Much of the existing literature is concerned with diffusion of a single influence, while simultaneous diffusion of multiple influences is a more realistic scenario. The idea that individuals are resource constrained is important—were it not so, adoption rates of multiple behaviors would follow trivially from prior work on influence maximization [1]. Introduction of resource constraints implies that each individual now has to choose from a subset of behaviors adopted by his network neighbors such that the cost of her behaviors is less than her available resource in a manner that maximizes utility. Thus, each individual solves a knapsack problem of picking behaviors to maximize their utility while these behaviors satisfy their individual resource constraints. Bharathi et al. [29] and Carnes et al. [30] discuss the problem of multiple competing influences, but they also do not incorporate the resource constraints or the utility maximizing behavior of individuals into their models. That individuals in a social network are resource constrained has an empirical basis—Hodas and Lerman [2] provide empirical evidence in support of the hypothesis that social contagions are constrained by finite amount of resources (e.g. time to process information) available to the individuals constituting the social network. However, their work does not shed any light on the algorithmic question of influence maximization in resource constrained networks.

Our notion of individual resource constraints is a form of bounded rationality, a well known idea in Economics (e.g. [31, 32]). In our framework, individuals cannot view the entire network, but only their network neighborhood. However, we do assume that the network neighborhood is fully observable and that each individual is rational—able to evaluate the utility of a set of behaviors in her neighborhood and be able to identify the set that maximizes utility. To the best of our knowledge the present work is the first investigation of the seed selection problem for multiple behavior diffusion in a resource constrained social network.

3 Multiple Behavior Adoption for Resource Bounded Networks

In this section we introduce our multiple behavior diffusion model. First, we will describe our model of multiple behavior diffusion when individuals have bounds on resources available to them. Then we will introduce metrics including resource utilization, unique participation and number of behavior adoptions to evaluate the behavior adoption process. We represent the social network by an undirected graph G = (V, E). Each node vV of the graph G represents an individual and an edge eE between two nodes indicate a social relationship between the two individuals. Without loss of generality, we assume that the goal is to spread k behaviors in the network.

3.1 Our Diffusion Model

We now describe the model for each user, the properties of each behavior and the behavior adoption process. For easy reference Table 1 presents the symbols used subsequently in this paper. Conceptually our behavior adoption model can be described as follows—an individual adopts a new behaviors if the behavior has some value to her i.e. she has some interest in the behavior (intent), a significant number of her friends have adopted the behavior (social signal), and she has enough available resource to pursue it (resource).

thumbnail
Table 1. Glossary of symbols used in the paper.

The first half contains symbols used in this section, and the second half contains symbols used in the next section on influential identification problem.

https://doi.org/10.1371/journal.pone.0162014.t001

Each behavior i has a cost ci and a utility ui associated with it. In a simplification, we assume that both the cost ci and the utility ui of behavior i are intrinsic to the behavior and independent of the individual who adopts the behavior. Without loss of generality, we assume that 0 ≤ ci, ui ≤ 1.

Individuals are resource constrained: an individual may have limited time, money or may not possess other material resources to adopt a behavior. Therefore, we assign a fixed resource r(v) for each individual vV towards adopting behaviors. The resource satisfies 0 ≤ r(v) ≤ 1. For example, if we assume that individuals’ resources are independent and identically distributed then the resource value r(v) can be assumed to be obtained from a uniformly distributed random variable U(0, 1). Without loss of generality we assume that the resource type (e.g. money, time) is the same as the cost type. Let N(v) denote the set of neighbors of v in the network. Then we assume that a neighboring node u asserts a social influence on node v with weight 1/|N(v)|.

An individual will adopt a behavior i when she receives a strong social signal, has the resources to do so and when there is sufficiently high payoff in adopting the behavior. A behavior is a likely candidate for adoption when the strength of social signal exceeds a threshold, and the individual has enough resource to adopt the behavior. Fig 1 depicts the situation where the candidate behaviors are those for which the high social signal and resource availability conditions are met. We assume that each individual v has a different, fixed, threshold θi(v) for each behavior, and that each threshold is obtained independently from a uniformly distributed random variable U(0, 1). The strength of social signal is measured by li(v) which is defined as the sum of influence weights—the social signal—exerted on v by its neighbors who have adopted behavior i. The payoff pi(v) for a behavior i is defined as the weighted sum of the intrinsic utility ui and the local network utility li(v). That is, pi(v) = wui + (1 − w)li(v). Where, w denotes the relative weight of the intrinsic utility (i.e. intent). Fig 1 also shows this situation where the payoff is determined by social signal and intent. An individual adopts only those candidate behaviors that have high payoff (shown as the intersection between Candidate and Payoff in Fig 1). If there are multiple candidate behaviors, then an individual adopts a subset of candidate behaviors that maximizes total payoff.

thumbnail
Fig 1. Payoff for adopting a behavior comes from an individual’s intent and social signal.

https://doi.org/10.1371/journal.pone.0162014.g001

Let us examine the diffusion of behavior over time, to illuminate the key ideas. The process takes place over discrete epochs. Notice that while individual actions in a network are asynchronous, we can choose an appropriate time granularity for analysis to assume synchronized decision making. We assume each node is aware of the behaviors adopted by her neighbors. The individual v first identifies all candidate behaviors. A behavior j is a candidate to be adopted if two conditions hold. First, the social signal strength for behavior j must exceed the threshold for that behavior at node v, i.e. lj(v) ≥ θj(v). Second, the individual v must have the resources to adopt the behavior, i.e. r(v) ≥ cj. The first condition is the familiar Linear Threshold (LT) model [1]. In problem formulation there are multiple behaviors, and the individual v chooses a subset of candidate behaviors that maximizes the total payoff, subject to the condition that the sum of the adoption costs of the behaviors is less than the resource constraint. Let Bv be the set of candidate behaviors for an individual v. So v adopts a set of behaviors BBv that maximizes ∑iB pi(v) subject to the constraint that ∑iB cir(v). At every epoch, the individual v evaluates all behaviors, including behaviors already adopted, to evaluate payoff. The behavior diffusion process continues until no additional adoption is possible.

In our diffusion model, we assume that the total resources available r(v) at each node are known, while the threshold for adoption θ for any behavior is unknown. This assumption is reasonable when people are willing to make public their available resources to participate in a set of behaviors. This can arise say in a private, mobile social network app focused on adoption of healthy behaviors including wellness, healthy eating and exercise, where individuals join the network to participate in healthy behaviors but each individual is resource limited. An individual may declare that she has only one hour to spend on exercise each week, but would like to be nudged to participate in a health-related activity.

Fig 2 shows an illustration of the spread of behaviors with a four node network where three different behaviors—recycling, using public transport and eating locally grown food—are denoted by behaviors 1, 2 and 3 respectively. At time step 0 the state of the network is shown in Fig 2(b). At this time step, for v, the social signal of eating locally grown food is weak. So v considers only the recycling and the using public transport behaviors for adoption. After maximizing payoff subject to the resource constraint, v adopts only the recycling behavior. Although public transport has strong social signal, v cannot adopt that behavior because it does not have enough resources to adopt the behavior. Notice that the payoff for recycling is higher than that of public transport, though the intrinsic utility of recycling was lower than that of public transport.

For the purpose of deriving the analytical proofs, we shall assume that the adoption of behaviors is “sticky”, that is, once a node adopts a behavior it never drops the behavior. This simplification is also known as progressive behavior adoption [1]. Once a node adopts a “sticky” behavior its available resource to adopt other behaviors decreases.

Having described the multiple behavior diffusion process, now we describe different measures of behavior diffusion.

3.2 Measurement of Diffusion

We measure the effectiveness of the diffusion process with three metrics: total participation, total adoption and resource utilization. The metrics are useful to understand the different seed selection heuristics discussed in the next section. Since the behavior adoption is a stochastic process, we compute the expected value of each metric through simulation.

  1. Total Participation This metric counts the number of individuals who have adopted at least one behavior (i.e. become active) during the process; we measure the expected number of adoptions via simulation. Exact computation of this metric is shown to be #P-hard [33]).
  2. Total Adoption In contrast to total participation, we need to keep track of the total number adoptions of behaviors during the diffusion process. We count the number of adoptions over all the behaviors during a diffusion process and via simulation determine the expected adoptions. Notice that since an individual can adopt more than one behavior, total participation can be less than total adoption. For the familiar single behavior adoption problem, these two measure will be identical.
  3. Resource Utilization This metric captures the efficiency of the network to adopt costly behaviors. Not all resources available in a social network may be used for behavior adoption. This is because individuals have variable resources, and they may be unable to adopt the subset of behaviors that fully takes advantage of their desire to participate because of two reasons. First, they may have more resources than needed to adopt a behavior. Second, if their friends (i.e. network neighbors) have limited resources, then the social signals that they receive will be about adopting low-cost resources, and hence a particular individual may never see costly behaviors in their social circle that they could potentially adopt. Let us assume that a node v with resource r(v) has adopted one or more behaviors. Let s(v) be the amount of resource that v has used to adopt those behaviors, where s(v) ≤ r(v). Therefore the individual has r(v) − s(v) amount of his resource remaining unused. Thus, Resource utilization is the expected value of the ratio ∑vV s(v)/∑vV r(v) i.e. the ratio of total utilized resource to the total amount of available resource of all the individuals in the social network.

Having discussed the multiple behavior diffusion process under resource constraints and three measures of diffusion of behavior, we now turn to discuss the problem of identifying the top-k influential nodes or seeds in a resource constrained network. There are two principal questions: how to efficiently identify influential nodes; for each node, assign the set of behaviors that this node ought to adopt. In the next section, we shall formally define the influential identification problem, show intractability and present an approximation algorithm. In Section 5, we shall introduce several heuristics to identify influential nodes and well as show experimental results. In Section 6, we address the question of distributing behaviors onto the influential nodes.

4 The Influential Identification Problem

In this section we introduce the first algorithmic problem that we want to address in the context of multiple behavior diffusion in a resource constrained social network. This problem is called seed selection problem. In the next section we will formally define this problem and analyze its complexity. Then we will describe and analyze different strategies for solving the problem. Then we will provide experimental evaluation of those strategies on synthetic as well as real world social networks.

4.1 Problem Definition

There are two key problems: we need to identify the set of early adopters or seed nodes and we need to determine which behaviors ought to be adopted by each seed node. We assume that the number of initial adopters is small in comparison to the size of the network. This is reasonable as it corresponds to an advertiser with a finite budget to persuade the seeds to adopt. Here we identify two subproblems which are related to seed identification. To simplify things, in this section we will assume that the behaviors are uniformly distributed over the seed set.

  1. P1: Resource Utilization Maximization Given a fixed seed budget b and a fixed distribution of behaviors in the seed set, we want to select b nodes in the network such that the resource utilization metric is maximized.
  2. P2: Total Participation (or Adoption) Maximization Given a fixed seed budget b and a fixed distribution of behaviors in the seed set, we are interested in finding b nodes in the network that maximize the total participation (or total adoption) in the network.

It can be easily shown that the optimization problems P1 and P2 are NP-complete. We show that influence maximization problem for LT model, which is proven to be an NP-complete problem [1], is a special case of P1. Let the number of behaviors k = 1 and the cost of adoption of that behavior is also 1. Each node v is allocated resource r(v) = 1. For these values of the parameters our multiple behavior diffusion model reduces to the LT model of influence propagation and resource utilization can be calculated as the ratio of the spread and total number of nodes in the network. So maximizing the resource utilization translates into maximizing the spread. Same transformation applies to problem P2 also since total participation (and total adoption) is identical to the spread in the one behavior case. Next, we propose a number of heuristics to solve the problem.

4.2 Approximation Algorithm for the Sticky Model

In this section we will provide an approximation algorithm for a variant of the problem P2 (total participation maximization) when behavior adoption is sticky—i.e. once an individual adopts a behavior he never abandons that behavior. Note that both problems—P1, P2 are still NP-hard in the Sticky model. We will construct our algorithm by first showing that the total participation function is submodular. Then following a technique by [13] we will obtain an approximation algorithm for the problem.

4.2.1 Submodularity of Total Participation.

In this section we will show that the total participation function for the sticky model is submodular. Throughout this section we will assume that the k behaviors are indexed in the ascending order of their cost. For a given set S of seeds for the k behaviors, let σ(S) denote the total participation i.e. the expected number of active nodes, regardless of behavior adopted, at the end of the process. We will show that σ(S) is a submodular function. Our proof consists of in three steps—first we define an equivalent alternative process of the Sticky Multiple Behavior Diffusion process, then we show that the alternative process and the sticky multiple behavior diffusion process are both equivalent in the sense of the distribution, and finally we prove the submodularity for the equivalent process.

We introduce an alternative live edge process to model behavior diffusion since the threshold model for behavior adoption is known to be not sub-modular [1]. For the alternative model we would like to distinguish between the behaviors a node can adopt under some circumstances and those that it cannot under any circumstances. If the cost of adoption of a behavior is greater than the available resource of a node then clearly the node cannot adopt that behavior. Since the behaviors are indexed in the ascending order of their cost, this distinction can be made by a single indicator variable. For each node v, let us define κ(v) as the largest index j such that cjr(v). If v does not have enough resource to adopt any of the behaviors then κ(v) is defined to be 0.

Prior to any diffusion each node v selects at most κ(v) edges—thus once for each behavior that it can potentially adopt—by repeating with replacement the following random edge selection process κ(v) times. Each node v selects the edge ev,w with probability bv,w and no edge with probability 1 − ∑wN(v) bv,w, where bv,w denotes the influence weight exerted by the neighbor w on v and ∑wN(v) bv,w ≤ 1. So v selects at most one edge for each of the κ(v) behaviors.

If an edge is selected then that edge is designated as the live edge for the behavior i. All the other edges are considered blocked for that behavior. In this model we start with one set of seeds for each of the k behaviors, k sets in total. In time step t, a node v considers a behavior i for adoption such that: the behavior i is not already adopted by v and that a neighbor of v, connected to v by the live edge for the behavior i, has adopted behavior i by time t − 1. The node then adopts a subset of all such considered behaviors to maximizes its total payoff subject to the constraint that the combined cost of the behaviors is less than the available resource. Once a node adopts a behavior it becomes active with respect to that behavior and the behavior sticks—when a node adopts a behavior it never gets rid of it.

Next we prove a lemma that the alternative live edge process is stochastically equivalent to the Sticky Multiple Behavior Diffusion model described earlier.

Lemma 4.1 For a given seed set S, the following two distributions over the set of nodes are the same:

  1. The distribution over active sets obtained by running the sticky multiple behavior diffusion model to completion starting with S.
  2. The distribution over sets of active nodes reachable from S via live edges under the random selection of edge model described above.

Proof. First we prove for the simpler case when k = 1, i.e. there is only one behavior that diffuses in the network and then generalize to the case of arbitrary number of behaviors. Notice that in this case each node will have at most one live edge. This case is similar to the Linear Threshold (LT) model described in [1] with the key difference that in our case each node is resource constrained. Let G = (V, E) be the given graph. We only need to consider the nodes v with r(v) ≥ c1. We delete all nodes with r(v) < c1 and edges associated with these nodes from G producing a graph G′. Thus in G′, the behavior adoption process reduces to the single behavior LT model discussed in [1].

Now we repeat that proof from Kempe et al. [1] since it will serve as the basis for the generalized case of k > 1. We argue by induction over the time step t. Let S(t) be the set of nodes who have adopted behavior 1 at the end of time step t for the sticky behavior diffusion model with k = 1. We need to know the probability that a node v with r(v) ≥ c1 that have not yet adopted behavior 1 at the end of time step t will adopt the behavior in the next time step t + 1. This probability is the same as the probability that the nodes in S(t) \ S(t − 1) will push the influence weight of v over its threshold at time t, given that the threshold was not already crossed at time t − 1. This probability is given by:

For the alternative live edge process each node v with r(v) ≥ c1 selects at most one live edge randomly at the beginning of the process. Notice that we don’t have to select the live edges over time, they can all be simply selected in the beginning. Under this model we need to compute the probability that a node v with r(v) ≥ c1 that has not adopted behavior 1 at the end of time step t will adopt it in the next time step. This probability is precisely same as the probability that the live edge of v comes from one of the nodes in S(t) \ S(t − 1), given that it did not came from S(t − 1). This probability is also given by:

So by induction we find that the two processes define the same distribution over the active sets. Next we provide the proof for when the number of behaviors k > 1. Notice that [1] only proved the case of k = 1.

We prove the claim by induction on the time step t. Clearly the claim is true for t = 0. We define as the set of active nodes with behavior i at the end of time step t of the sticky multiple behavior diffusion model. Let . That is, S(t) is the set of nodes that have adopted at least one behavior. Notice that S0 = S. Let v be a node that is not active at the end of time step t and κ(v) = κ ≠ 0, where κ(v) is the number of distinct behaviors v can adopt one at a time. Then the probability that v will become active at the end of time step t + 1 is equal to the probability that the nodes in S(t) \ S(t − 1) will push the influence weight of at least one of the first κ behaviors over its corresponding threshold value, given that none of those thresholds were already crossed. This probability is

On the other hand we run the live edge reachability process as described above and denote by the set of all nodes with behavior i at the end of time step t. Let . If node v is not active at the end of time step t with κ(v) = κ ≠ 0, then the probability that it will be active at the end of time step t + 1 is equal to the probability that at least one of its κ live edges comes from the nodes of S(t) \ S(t − 1) (with the corresponding behavior), given that none of those live edges came from S(t − 1). This probability is also given by -

By induction over the time step of the process we see that the distribution over the active sets at the end of the sticky multiple behavior diffusion process is same as the distribution produced by the alternative live edge process.

Next we prove the final result.

Theorem 4.2 For an arbitrary instance of the Sticky Multiple Behavior Diffusion model the total participation function σ(.) is submodular.

Proof. Let us define σ′(S) as the expected number of active nodes at the completion of the alternative random process. By Lemma 4.1, we can show that σ′(S) = σ(S), for all seed sets S under same distribution of behaviors on the seed set, and where σ(S) is the total participation (expected number of active nodes, active for any behavior) for the sticky multiple behavior adoption process.

Now we show that σ′(.), the total participation function is submodular. Let X be a particular choice of live/blocked edges for all nodes. Let denote the cardinality of the set of active nodes at the completion of the alternative process. Let R(v, X) denote the set of nodes reachable from seed node v that satisfy the following condition—any node in R(v, X) has a behavior seeded by v and the node is connected to v by a live edge path for that behavior under the choice X. Therefore .

First we will show that for a fixed choice X, is submodular. Let S and T be two sets of nodes such that ST and v is any node. Let us consider . This is the number of nodes that are in R(v, X) but not in ∪uS R(u, X). This number is at least as large as the number of nodes in R(v, X) but not in the bigger union ∪uT R(u, X). Therefore it follows that .

Finally we have

Since a non-negative linear combination of submodular functions is also submodular, σ′(.) is submodular. This completes our proof.

4.2.2 The Approximation Algorithm.

We are interested in obtaining an approximation guarantee for the total participation maximization problem under the Sticky multiple behavior diffusion model. For this type of optimization problems involving submodular functions there is a greedy algorithm that approximates the optimum within a factor of (1 − 1/eϵ), where e is the base of natural logarithm and ϵ is any positive real number ([13, 1]). So the approximation algorithm gives a performance guarantee of at least 63% of the optimum. We modify the basic greedy algorithm to adapt it to the multiple behavior case (Algorithms 1, 2).

Algorithm 1: Approximation algorithm for the sticky multiple behavior diffusion model

Input: G: = (V, E), the social network; b, a vector of size k containing number of required seeds for each of the behaviors.

Output: S, a vector of size k containing seed sets of required size for all the behaviors.

1 Let V′: = V and S : = ϕ

2 repeat

3for each behavior i do

4   Let (ui, si): = Core-Greedy(i, b[i], S, V′)

5end

6  Let imax: = arg maxi∈{1, …, k} si;

7  Let v: = uimax;

8  Set S[imax]: = S[imax] ∪ {v} and b[imax]: = b[imax] − 1;

9  Set V′: = V′ − v;

10if r(v) ≤ cimax then

11   Set r(v): = cimax;

12end

13 until b = 0;

In Algorithm 1, in line 4, we obtain the node ui associated with the maximum spread si for behavior i via the Core-Greedy algorithm. Then, in lines 6–7, we identify the behavior imax with the maximum spread and the corresponding node uimax that was the seed for the behavior. This node v is then added to the set of seeds for that behavior (imax, line 8) and then removed from the set of nodes to be considered as seeds in the next round (line 9). In line 11, if the resource for the seed is less than the cost of the behavior, we “top-up” the resource of the seed so that it can adopt the behavior. Notice that to avoid “topping-up” we can simply ignore nodes v that have resources less than the cost of the behavior to be adopted r(v) < ci when examining nodes in the Core-Greedy algorithm.

Algorithm 2: Core-Greedy algorithm used in the approximation algorithm for the sticky model

Input: i the behavior; b[i], the number of seeds required for the ith behavior; S, the set of already selected seeds for all the behaviors; V′ the remaining population of nodes from where one chooses new seeds.

Output: (u, s) if b[i] is not zero then a tuple consisting of u, the best choice of seed from the population V′ for the ith behavior, given the already selected seedset S, and s its corresponding spread value (total participation).

1 if b[i] = 0 then

2  Return (‘nobody’, 0)

3 end

4 Let s be a vector indexed by the set V′, and s = 0

5 for vVdo

6  Let S: = S

7  Set S[i]: = S[i]∪{v};

8  Set s[v]: = Estimate-Spread(S);

9 end

10 Select u: = arg max v {s[v]|vV′};

11 Return (u, s[u]);

In Algorithm 2, we present the Core-Greedy algorithm which selects seeds given a behavior, the set of nodes from which to choose the “best” node, the set of nodes already chosen to be seed nodes. In line 8, we estimate the spread of the behavior through a stochastic simulation: given a specific node to be selected as the seed node, we compute the expected spread via a simulation; in each run, we assign each node with a threshold picked from U(0, 1) and then let the behavior spread by assessing for each node that hasn’t yet adopted the behavior whether it will adopt the behavior. Finally in lines 10–11 we select the node with the highest expected spread and return this tuple.

In this section we formally defined the seed selection problem and showed that the problem is NP-hard. Then in Section 4.2 we showed the total participation function was sub-modular leading to a greedy seed selection algorithm.

Although we achieve an approximation guarantee for the seed selection problem, the time complexity of the approximation strategy is O(n2 kb), where n is the number of vertices in the graph, k is the number of behaviors, and b is the number of seeds required. Moreover the constant is large (Kempe et al. [1] use 10,000 simulations to estimate the expected spread) since we need to simulate the diffusion process multiple times to estimate the spread throughout the algorithm. This makes the approximation algorithm impractical for networks of large size and motivates us to explore cheap heuristics that perform reasonably well for practical instances. Different efficient heuristics for the seed selection problem is the topic of the next section.

5 Seed Selection: Heuristics and Experiments

In this section we develop heuristics to identify seed nodes for behavior diffusion in a resource constrained social network and then show experimental results that help us analyze the impact of each heuristic.

5.1 Summary of Variation & Notation

There are a number of variations possible—in terms of resources and behaviors—for nodes selected as seeds. The first issue is whether we top up the resource of a selected seed. Topping up a seed provides it with additional resources to adopt the behavior in case the behavior was more costly than available resources. This corresponds to real life events like providing early adopters with free items, gift coupons or other services like free access to recycling facilities etc. Depending on whether we allow seeds to be topped up we have two variations of the seed selection algorithm—Topped Up (suffix T is added to the name of the algorithm) and No Top Up (suffix NT is added). In the NT version only the nodes with sufficient resource for adopting a behavior are considered as candidates for seed selection. On the other hand in the T version all the nodes are considered as possible candidates.

Another variation is possible depending on whether a node can be selected as a seed for more than one behavior or strictly one behavior. In the first case a seed may be assigned more than one behaviors and we suffix M (for multiple) to the seed selection algorithm. In the second case a seed is assigned exactly one behavior and we use the suffix S (for single). It is easy to see that S version can never find a solution that is better than the M version for the same type of top up regime.

Combining these two types of variations we can have four different variants of each seed selection algorithm—S-T, S-NT, M-T and M-NT. In this paper most of the results are for the S-T variant. However in Appendix B in S1 Appendix we present some results comparing these different variations of the seed selection algorithm and discuss a few consequences.

5.2 Seed Selection Heuristics

We discuss heuristics based on node degree, influence weight and expected immediate adoption for the behavior diffusion model under resource constraint. Notice that the node attributes required in these heuristics can all be computed locally at each node without necessitating a graph wide computation. These consideration automatically excludes more computation intensive measures like betweenness centrality. We start by developing heuristics which are based on node degree.

5.2.1 Node Degree.

The social capital of an individual increases the number of acquaintances. While the nature of the connections and the specific structure of the network in which an individual is embedded play a role in determining the influence of an individual, an individual’s node degree is a good first degree approximation to an individual’s “influence” on his acquaintances. We first discuss the heuristic and present some useful variants.

5.2.1.1 Naïve. We rank the nodes according to their degree, pick top k nodes, and assign them different behaviors. This is a naïve extension of the high degree heuristic for the LT model [1]. We test three variants of this heuristic. The first variant is naïve degree with random tie breaking and no top up (see Algorithm 3). Here no top up means that a seed node is never assigned a behavior that it cannot adopt with its own resource, i.e. a seed node is assigned a behavior only if it has sufficient resource to adopt it. Random tie breaking means that we assign a high degree node a behavior that is chosen uniformly at random from the set of behaviors that the node can adopt with its available resource. So each seed node is assigned at most one behavior (if a seed node does not have enough resource to adopt any behavior, no behavior is assigned to it). In Algorithm 3 the loop (lines 2-9) continues until we have no more nodes to identify as seeds. In the second variant naïve degree with random tie breaking and top up each seed node is always assigned one randomly chosen behavior irrespective of its resource level. If its resource is not sufficient for adoption of the behavior we top up its resource so that it can bear the cost of adoption of the assigned behavior. In the third variant naïve degree with knapsack tie breaking, each seed node is assigned all the behaviors that will maximize its utility subject to its resource constraint—to determine which behaviors to assign we solve a knapsack problem. Notice that degree based heuristics are optimistic—it is possible that neighbors of a seed do not have resources to adopt the behavior of the seed, thus preventing diffusion of behavior.

Algorithm 3: Naïve Degree Based with Random Tie breaking and No Top Up

Input: G: = (V, E)—the social network, b—a vector of size k containing number of required seeds for each of the behaviors

Output: S—a vector of size k containing seed sets for each of the k behaviors

1 Let V′: = V and S: = ϕ

2 repeat

3  Select v: = arg max u {|N (u)|: uV ′};

4V′: = V′ \ {v};

5  Select j uniformly at random from the set of behaviors i that still need seeds to be assigned: {i: b[i] ≠ 0};

6if r(v) ≥ cj then

7   Set S[j]: = S[j] ∪ {v} and b[j]: = b[j] − 1;

8   Designate v as an early adopter for behavior j;

9end

10 until b = 0;

5.2.1.2 Neighbors With Sufficient Resource. This heuristic takes into account both the degree and available resource of the neighbors when selecting the seed nodes. For each behavior i we calculate di(v)—the number of neighbors of a node v with sufficient resource for adoption of behavior i with cost ci (i.e. the number of neighbors u of seed node v with r(u) ≥ ci). Clearly di(v) is a better indicator of the suitability of selecting v as a seed for the ith behavior than just the node degree. In the degree and resource ranked heuristic (see Algorithm 4) we compute di(v) for all the nodes (lines 2-10), rank them according to the value of this metric and select the required number of seeds for the ith behavior from the top of the ranking. If a node is selected as a candidate seed for more than one behaviors, we break the tie randomly and top up its resource so that it can adopt the randomly assigned behavior (lines 19-22). Then we add one more candidate for the behaviors that were not assigned. We repeat the process until the required number of seeds are selected for all the behaviors. For example if we need to identify 3 seeds for behavior 1, 4 for behavior 2, and 3 for behavior 3. Assume that the second ranked node on the list for behavior 1 appears in all the other lists. Suppose when we break the tie the node is assigned behavior 3. Then we pick the one additional node for each behavior 1 and 2 with the next highest value of di(v).

One weakness of the degree based and degree-resource based heuristics is that they provide no estimate of the effectiveness of the seed in terms of adoptions. We address this issue next.

Algorithm 4: Degree and Resource Ranked Heuristic

Input: G: = (V, E)—the social network, b—a vector of size k containing number of required seeds for each of the behaviors

Output: S—a vector of size k containing seed sets of required size for all the behaviors

1 Let di(v): = 0 for all vV and i ∈ {1, …, k};

2 for each vV do

3for each behavior i do

4   for each neighbor u of v do

5    if r(u) ≥ ci then

6     di(v): = di(v) + 1;

7    end

8   end

9end

10 end

11 Let V′: = V and S : = ϕ;

12 repeat

13for each behavior i do

14   Let Ti be the set of top b[i] nodes from V′ in the decreasing sorted order of di(v);

15end

16  Let ;

17  Set V′: = V′ \ T;

18for each node v in T do

19   Select j uniformly at random from the set of behaviors {i|vTi };

20   if r(v) ≤ cj then

21    Set r(v): = cj

22   end

23   Set S[j]: = S[j] ∪ {v} and b[j]: = b[j] − 1;

24   Designate v as an early adopter for behavior j;

25end

26 until b = 0;

5.2.2 Influence Weight Based Heuristics.

We compute an influence weight measure to estimate the influence of a potential seed set on its neighbors. We can compute the influence weight measure for a set of seeds by summing over the influence weight of individual seeds. Let u be a neighbor of v. v exerts a social influence of weight on u. The Influence Weight exerted by v on its neighbors is . Notice that while social capital of a node v is given by N(v) the number of neighbors of v, its net social influence depends on the number of neighbors of its immediate neighbors. That is social influence of a node v is .

We will restrict the summation over those neighbors u that have enough resource to adopt behavior i. Hence we call this metric Constrained Social Influence Weight (CIW) of v for the behavior i and denote it by ei(v). The justification of this heuristic comes from [8], where it is argued that large cascades are driven by a critical mass of easily influenced individuals. However, we note that Watts and Dodds [8] did not consider resource bounded individuals in their framework. Intuitively, higher ei(v) includes the possibility that v is connected to individuals who can be easily influenced by v to adopt behavior i which can potentially lead to a large cascade of behavior i. Next we describe two heuristics based on the CIW.

5.2.2.1 Rank Based. We rank all the nodes (see Algorithm 5) based on the value of ei(v) (lines 2–10) and choose the required number of seeds for behavior i starting from the highest ranked nodes. We perform the same evaluation for all behaviors. If a node is selected as a candidate seed for more than one behaviors, then we pick one of the behaviors at random and assign it to the node (line 19). And similar to Algorithm 4, for all behaviors not selected we pick from the remaining nodes (i.e. vV′) with the next highest value of ei(v) and add it to the corresponding list (i.e. Ti for a behavior not selected). If the node does not have sufficient resource to adopt that behavior then its resource is topped up. The process continues until the required number of seeds are allocated to all the behaviors.

Algorithm 5: CIW Rank Based

Input: G: = (V, E)—the social network, b—a vector of size k containing number of required seeds for each of the behaviors

Output: S—a vector of size k containing seed sets of required size for all the behaviors

1 Let ei(v): = 1 for all vV and i ∈ {1, …, k};

2 for each vV do

3for each behavior i do

4   for each neighbor u of v do

5    if r(u) ≥ ci then

6     ;

7    end

8   end

9end

10 end

11 Let V′: = V and S : = ϕ

12 repeat

13for each behavior i do

14   Let Ti be the set of top b[i] nodes from V′ in the decreasing sorted order of ei(v);

15end

16  Let ;

17  Set V′: = V′ \ T;

18for each node v in T do

19   Select j uniformly at random from the set of behaviors {i|vTi };

20   if r(v) ≤ cj; then

21    Set r(v): = cj;

22   end

23   Set S[j]: = S[j] ∪ {v} and b[j]: = b[j] − 1;

24   Designate v as an early adopter for behavior j;

25end

26 until b = 0;

5.2.2.2 Max Margin. The hill climbing heuristic builds the seed set incrementally, each time selecting a new seed node that maximizes the marginal increase of influence weight until the required number of seeds is obtained. So in this case while computing the influence weight of a potential seed node for a behavior we exclude those neighbors of the node who are already selected as seeds for that behavior. As with the previous heuristic, if the node does not have sufficient resource then it is topped up so that it can adopt the assigned behavior.

Algorithm 6: CIW based Max Margin Heuristic

Input: G: = (V, E)—the social network, b—a vector of size k containing number of required seeds for each of the behaviors

Output: S—a vector of size k containing seed sets of required size for all the behaviors

1 Let V′: = V and S : = ϕ;

2 repeat

3for each behavior i do

4   Let Ti: = Core-Hill-Climbing(i, b[i], S[i], V′);

5end

6  Let ;

7  Set V′: = V′ \ T;

8for each node v in T do

9   Select j uniformly at random from the set of behaviors {i|vTi };

10   if r(v) ≤ cj; then

11    Set r(v): = cj;

12   end

13   Set S[j]: = S[j] ∪ {v} and b[j]: = b[j] − 1;

14   Designate v as an early adopter for behavior j;

15end

16 until b = 0;

Algorithm 7: Core-Hill-Climbing

Input: i—the behavior, b[i]—number of seeds required for the ith behavior, S[i]—the set of already selected seeds for the ith behavior, V′—the remaining population of nodes to choose new seeds from

Output: Ti—the set of b[i] newly selected seeds

1 Let ei(v): = 1 for all vV \ S[i] and i ∈ {1, …, k};

2 for each vV \ S[i] do

3for each neighbor u of v s.t. uV \ S[i] do

4   if r(u) ≥ ci then

5    ;

6   end

7end

8 end

9 Let Ti: = ϕ;

10 for j = 1 to b[i] do

11  Select u: = arg maxv {ei(v)|vV′ \ Ti};

12Ti: = Ti ∪ {u};

13for each neighbor v of u in V′ \ Ti do

14   ;

15end

16 end

5.2.3 Expected Immediate Adoption.

Notice that the randomized behavior adoption process at a node in the network does not depend on any other node once the behaviors adopted by its neighbors are known. So for a seed set S we can compute the expected number of nodes with behavior i in the next time step in the following manner—for any node v that is a neighbor of a seed node u with behavior i, we compute the probability that in the next time step it will adopt behavior i, and then we sum up the probabilities for all such nodes v in the network. Appendix A in S1 Appendix explains how to compute this probability with a detailed example. For a given seed set S and a behavior i, we define Expected Immediate Adoption(EIA), IAi(S), as this expected number of nodes with behavior i after one time step. Although the exact computation of total number of adoptions at the completion of the behavior diffusion process is #P-hard for the LT model [33], the exact computation of adoptions after exactly one time step is a tractable problem (Appendix A in S1 Appendix). If we assume that higher values of IAi(S) would result in higher values of expected number of adoptions of behavior i at the completion of the diffusion process, then we can use IAi(S) as a metric for determining the initial seed set. Instead of one step expected adoption numbers, one can use expected number of adoptions after two or more steps to better predict the final adoption. However, finding closed form expression is hard, and one would need to use a two-stage simulation to make the calculation.

We build up S incrementally adding one seed at a time based on the EIA value. At each iteration we choose the node that maximizes the marginal increase in the EIA value to add to the seed set. See Algorithm 8 for detailed description.

Algorithm 8: Incremental Expected Immediate Adoption Based Heuristic

Input: G: = (V, E)—the social network, b—a vector of size k containing number of required seeds for each of the behaviors

Output: S—a vector of size k containing seed sets of required size for all the behaviors

1 Let V′: = V and S : = ϕ;

2 repeat

3for each behavior i do

4   Let (ui, si): = Find-Next-Seed-IA(i, b[i], S, V′);

5end

6  Let imax: = arg maxi∈{1, …, k} si;

7  Let v: = uimax;

8  Set V′: = V′\{v};

9  Set S[imax]: = S[imax] ∪ {v} and b[imax]: = b[imax] − 1;

10if r(v) ≤ cimax then

11   Set r(v): = cimax;

12end

13 until b = 0;

Algorithm 9: Find-Next-Seed-IA heuristic; selects the node that gives maximum marginal increase of the Immediate Adoption value

Input: i—the behavior, b[i]—number of seeds required for the ith behavior, S—the set of already selected seeds for all the behaviors, V′—the remaining population of nodes to choose new seeds from

Output: (u, s)—if b[i] is not zero then a tuple consisting of the best choice of next seed from the population V′ for the ith behavior, given the already selected seedset S and its corresponding Expected Immediate Adoption value

1 if b[i] = 0 then

2  Return (‘nobody’, 0)

3 end

4 Let s be a vector indexed by the set V′, and s = 0;

5 for vVdo

6  Let S: = S;

7  Set S[i]: = S[i] ∪ {v};

8  Set s[v]: = Compute-IA(S);

9 end

10 Select u: = arg max v{s[v]|vV′};

11 Return (u, s[u]);

5.2.4 Greedy Approximation (KKT).

Kempe et al. [1] presents a greedy approximation algorithm with approximation guarantee of 63% for the LT model and single behavior case. In section 4.2 we have shown that a modified version of this algorithm provides us with the same approximation guarantee for the simplified Sticky Model. In particular, we showed that our algorithm under the total participation diffusion metric was sub-modular and hence we shall use this algorithm to select seeds. However, since we did not show that behavior diffusion to be sub-modular and hence prove the approximation guarantee under the the more general case of total adoption or under the resource utilization metric, using our algorithm may be less than optimal. Hence we denote our algorithm as a heuristic—we call it the KKT heuristic after the authors of [1]. Note that due to the high computational cost involved in simulation this algorithm is not scalable to large size networks.

5.3 Simulation Experiments

In this section we describe different simulation experiments and compare the effectiveness of our proposed heuristics for the seed selection problem. We have implemented the multiple behavior diffusion model described in Section 3.1 and the heuristics discussed in Section 5 in the NetLogo Programming environment [34]. In the following experiments we have assumed that we want to spread three behaviors b1, b2, b3 with costs c1 = 0.2, c2 = 0.5 and c3 = 0.7. We have assumed that behavior utility is proportional to cost. Hence our nominal utility values for the corresponding behaviors are u1 = 0.2, u2 = 0.5 and u3 = 0.7. Finally, we assume that individuals’ resources are independent and identically distributed i.e the resource r(v) is uniformly distributed random variable U(0, 1) for all vV.

5.3.1 Network Topologies.

We have used synthetic networks as well as a large real-world network for our experiments. We synthesize network topologies through three social network generation models: preferential attachment [35]; Small-world [36] and spatially clustered [37]. All the synthetic networks have 500 nodes. In the preferential attachment network each new coming node adds one link to one of the existing nodes according to the in-degree distribution. The small world network formation starts with a regular ring lattice where each node is connected to two adjacent nodes in the circular order. In the rewiring stage each edge is rewired with probability p = 0.2. In the spatially clustered network average node degree is set to 10. All the important properties—low effective diameter, power law degree distribution and high clustering—found in real world social networks are exhibited by at least one of the above synthetic networks. The real world data set is the ca-GrQc collaboration network form the SNAP network database [38]. It is a collaboration network amongst authors who submitted their papers to the General Relativity and Quantum Cosmology category of e-print arXiv.org database. This network has 5242 nodes and 28980 edges.

The network types are abbreviated in the tables with experimental results as follows: PA (Preferential Attachment); SW (Small World); SC (Spatially Clustered); QC (the ca-GrQc quantum cosmology collaboration network form the SNAP network database).

5.3.2 Empirical Evaluation.

In this section we compare the seven seed selection heuristics described in Section 5.2 for different network topologies. For the seed selection experiments, we fix the behavior distribution over the seeds: the behaviors are assumed to be uniformly distributed over the seeds. We use a specific fraction α of the population as seeds. In this experiment, we have used α = 0.1 in line with prior work [8]. This means that for synthetic networks, we use b = 51 seeds, and b = 501 for the real-world network. The number of seeds is chosen in such a way that it is a multiple of 3, since we have 3 test behaviors. All the results discussed in this section are for the S-T variant of the algorithm. As a reminder the S-T variant is the case when each seed node adopts a single behavior with top-up. Full description of the notations can be found in Section 5.1. In Appendix B in S1 Appendix we present the result of comparison among the different variants.

There are two sources of randomness in the synthetic network generation models: behavior adoption thresholds at each individual for each behavior and network topology. Since each aspect is independent of the other, we have conducted two different types of simulations. In the first, we pick an arbitrary topology and vary individual thresholds over the different simulation runs. We term this as threshold average. In the second type of simulation, we fix the individual thresholds, obtained from the uniform distribution, and vary the topologies over the simulations. We term this as network average. Notice that the real-world dataset—ca-GrQc network—has a fixed topology and hence only one type of randomness: variation of the individual thresholds. We use 5000 independent runs of the diffusion process to obtain stable estimates for both threshold and network types of simulations.

Interestingly, simulation under both network and threshold average yield identical results (see Table 2). While the reader can find a formal proof of equivalence between the network average and threshold average simulations in Appendix C in S1 Appendix, we present an informal argument here. The case for k − regular graphs is easy to see. No matter the topology, every node will experience the same distribution of thresholds as any other node as the number of simulations tends to infinity. In the more general case, consider the network thresholds case when topologies are varied under fixed (but randomly assigned) thresholds. Since every topology is the output of a random graph generation process (e.g. small world), every topology follows a characteristic degree distribution (depending on the graph generation parameters). Thus any node with a fixed threshold has a finite probability of having all the possible different degrees. Since the thresholds are chosen uniformly at random, across all nodes, every threshold value will “experience” different node degrees (i.e. number of neighbors) over the course of the entire simulation. A similar argument follows for the threshold average case when the topology is random but fixed and when the thresholds are chosen randomly for every simulation run. In the remainder of the paper, we shall only show threshold averages for the sake of definiteness.

thumbnail
Table 2. Maximum Possible Resource Utilization of different network types.

Each node solves the knapsack problem and selects optimal behaviors. Then, we diffuse the behaviors. We are reporting the equilibrium values under two conditions: we fix the thresholds and vary topology (Network Average); we fix a random topology and vary thresholds (Threshold Average). Notice that the the quantum physics collaborative dataset, we cannot report a network average since the topology is fixed. Maximum resource utilization occurs when the number of seeds is equal to N—each node is a seed. In this case, it is easy to show that resource utilization is 0.78 for the three behavior case with specific costs. Notice below that resource utilization is less than this number, since each node will adjust to its social signal.

https://doi.org/10.1371/journal.pone.0162014.t002

Since seed selection sub-problems P1 and P2 are NP-complete (ref. Section 5), determining the maximum possible utilization or total participation in the network for the given value of b under uniform behavior distribution is computationally intractable. However, we can estimate the value of maximum possible utilization in the network if we assume that b = N, the case when each network node is a seed. First the nodes in the network adopt the subset of behaviors that maximizes their payoffs subject to the resource constraint. Then we let the diffusion process run till the network reaches equilibrium. The expected value of the resource utilization at this point will upper bound of resource utilization in that network and enables comparison with our heuristics. Table 2 provides the value of this maximum possible utilization for different networks. Notice that for three behaviors with costs c1 = 0.2, c2 = 0.5 and c3 = 0.7, it is straightforward to show that the maximum utilization will be bounded by the value 0.78, assuming that the thresholds are obtained from U(0, 1). The fact that the simulation results are slightly lower that 0.78 is because nodes will “align” with their neighbors over time due to the social influence.

Let us examine the resource utilization for our cost distribution c = (0.2, 0.5, 0.7) in a little more detail. We assume that an individual’s resources are drawn from a uniform distribution U(0, 1). If we assume that every individual can adopt any subset of available behaviors provided they have the resources, independent of the behavior adoption by their neighbors, we can thus estimate the upper bound for resource utilization in the social network. Given the distribution of costs, not all individuals can fully utilize their resources. However, it is easy to see that individuals with resources exactly equal to one of the numbers from the set {0.2, 0.5, 0.7, 0.9} are able to fully utilize their available resources. We call this the set of full utilization points. Now, an individual with resource say 0.4 can only adopt behavior with cost 0.2 and so on. Thus the expected resource utilization is:

The denominator of the equation is the value of resource utilization when an individual has behaviors that exactly match available resources. The costs of the different behaviors completely specifies the set of full utilization points. It is straightforward to prove the following lemma.

Lemma 5.1 Let there be n utilization points μ1, μ2, …, μn with 0 < μ1 < μ2 < …, <μn ≤ 1.0. Then the maximum resource utilization is .

Proof. The expected value of the resource utilization is:

By setting partial derivatives with respect to the utilization points of the maximum resource utilization function to 0, it is straightforward to show that the utilization points must be uniformly distributed. That is, μi = i/(n + 1) and the corresponding maximum resource utilization value is . Since μ1 always represents the lowest cost behavior, by simply introducing a new lower cost behavior with cost μ1/2, we increase the number of utilization points from n → 2n + 1, and increasing the relative utilization by 1/2n. As a specific example with three utilization points, μ = (0.25, 0.5, 075) the costs for the corresponding two behaviors are c = (0.25, 0.5), with maximum resource utilization of 3/4. When we introduce a new behavior with cost equal to half the cost of the lowest cost behavior (i.e. 0.125), the number of utilization points jumps to 7, thereby increasing the utilization to 7/8 and increasing relative utilization by 1/6 or 16.7%.

Table 3 shows the estimated resource utilization of different networks for threshold and network average simulations for each of the eight seed selection heuristics. The two Constrained Social Influence Weight heuristics (Ranked and Max Margin) show the highest expected utilization. The differences between the influence weight heuristics and the other heuristics are statistically significant (p < 0.01).

thumbnail
Table 3. Resource Utilization under Threshold Average.

Both heuristic variants of the Influence Weight give excellent results. The differences between the heuristics for the same type of average are statistically significant. * result is obtained with 50 independent runs.

https://doi.org/10.1371/journal.pone.0162014.t003

Table 4 presents the Total Participation and Total Adoption under threshold average condition for all the eight heuristics. The Expected Immediate Adoption based heuristic (EIA) shows the best result. The results remain qualitatively unchanged in the network average case.

thumbnail
Table 4. Total Participation / Total Adoption under Threshold average as a percentage of the network size for four different types of networks—Preferential Attachment (PA); Small World (SW); Spatially Clustered (SC); Quantum Cosmology (QC).

Both versions of the Constrained Social Influence Weight heuristics and the Expected Immediate Adoption heuristic give excellent results. The differences between the heuristics for the same type of average are statistically significant. * result is obtained with 50 independent runs.

https://doi.org/10.1371/journal.pone.0162014.t004

We compare the performance of the two Influence Weight based heuristics—Constrained Social Influence Weight-Ranked and Constrained Social Influence Weight-Max Margin—and the Expected Immediate Adoption based heuristic against the greedy approximation algorithm. Due to a large computational cost it is infeasible to run the greedy algorithm on the large networks used in experiments thus far. So we create synthetic networks of size 100 nodes with number of seeds b = 9 with 3 seeds allocated to each behavior, for the purpose of comparison via Preferential Attachment, Small World and Spatially Clustered network generators. Our estimates are obtained by running the model 5000 times on each network. Table 5 presents the results of the comparison for the total participation metric. Notice that for the Preferential Attachment network heuristics Constrained Social Influence Weight-Ranked and the Expected Immediate Adoption perform even better than the greedy approximation algorithm. This is not surprising since the greedy algorithm may fail to obtain the optimal solution in isolated cases. In the next section, we discuss how to distribute behaviors over the seeds.

thumbnail
Table 5. Total Participation / Total Adoption under different networks as a percentage of the network size for three different types of networks—Preferential Attachment (PA); Small World (SW); Spatially Clustered (SC).

The heuristics Constrained Social Influence Weight-Ranked, Constrained Social Influence Weight-Max Margin and the Expected Immediate Adoption give results quite close to the greedy approximation algorithm.

https://doi.org/10.1371/journal.pone.0162014.t005

6 Assigning Seeds Optimal Behaviors

In this section we discuss the behavior distribution problem—what set of behaviors should each seed node adopt? We will first formally introduce the problem as an optimization problem. Next we will discuss different strategies for distributing the behaviors over the seed set. Then we will compare these different strategies through simulation experiments and identify the pros and the cons of each strategy.

The behaviors adopted by the set of seed nodes have different implications on the metrics—total participation, total adoption and resource utilization (see Section 3.2 for a definition of these measures). If all nodes adopted the least costly behavior, for example, we would expect total participation to increase, but low resource utilization. The converse would be true in the case when seed nodes are chosen in such a way that all adopt the most expensive behavior. However, if we want to strike a balance between different behaviors such that all the behaviors are represented in the population, then we will have to distribute all the behaviors over the seed set according to some ratio. Here we formalize this scenario as an optimization problem.

  1. P3: Optimum Behavior Distribution over the Seed Set: Given that we are to pick b seeds and there is a lower bound on the number of adoptions of the lowest cost behavior smin, identify the optimum distribution of behaviors over the seed set and the optimum set of b seeds that will maximize the resource utilization while maintaining expected spread of smin for the lowest cost behavior.

It should be noted that in the case of multiple behavior diffusion metrics like resource utilization, total participation and total adoption depends not only on the choice of the seeds but also on the distribution of the different behaviors in the chosen seed set. In the results that follow, we assume that each seed node is assigned a single behavior. Note that this assignment doesn’t preclude the seeds as well other nodes from adopting more than one behavior. We test following five different distributions of the behaviors in the seed set. In the highest cost behavior only distribution we allocate all the seeds to the highest cost behavior and none to the other behaviors. In the proportional to cost distribution the behaviors are distributed over the seeds in the ratio of their costs. That is, higher cost behaviors have more seeds allocated to them. The justification for this heuristic is that higher cost behaviors will diffuse less and hence if we would like to see higher resource utilization, we should set more seeds to adopt the higher cost behaviors. Uniform distribution assigns the seeds a behavior chosen uniformly at random all the behaviors. In the Inversely proportional to cost behavior distribution behaviors are distributed over the seeds in the inverse ratio of their costs. So the highest cost behavior gets the lowest number of seeds and the lowest cost behavior gets the highest number of seeds. Finally, in the lowest cost behavior only distribution all the seeds are assigned to the lowest cost behavior and no seeds are given to the other behavior. Once we have identified how many seed nodes are needed for each behavior, using the aforementioned strategies, we identify the optimal seeds for that behavior via the Constrained Social Influence Weight—Max Margin heuristic.

6.1 Experimental Evaluation

In this section we investigate the effects of the different behavior distribution heuristics across the initial seed set described in the previous section. For this simulation, we use Constrained Social Influence Weight-Max Margin heuristic, since it is one of the best performing seed selection heuristics (see Table 3). Adopting the strategy in Watts and Dodds [8], we designate the fraction of seeds designated to be early adopters to be α = 0.1. This means that we have b = 51 for the synthetic networks (N = 500) and b = 501 for the quantum physics collaboration network. As before, we compute the metrics under the threshold average and the network average simulations.

In the tables in this section, we shall use the following notation: Low (All seeds are assigned Lowest Cost Behavior); Inv. (the seeds are allocated behavior in Inverse proportion to behavior cost; Unif. (the behaviors are distributed Uniformly at random); Prop. (the behaviors are distributed Proportional to behavior cost); High (all seeds are allocated the Highest cost behavior).

Table 6 shows the resource utilization in different networks for the threshold average and the network average simulations. We see that when each seed is allocated the same lowest (highest) cost behavior, the utilization is lowest (highest). This is unsurprising as we should expect high utilization to occur when we have high cost behaviors in the network. In Table 7, we show the difference between the number of unique participants and the total number of behavior adoptions. We have omitted the simulations for the network average case, due to space limitations. Those simulations are qualitatively similar to Table 7. Notice that when all the seeds have either the same lowest cost or highest cost behavior assigned to all of them, there is unsurprisingly no difference between the total number participants and the total number of unique adoptions. As Table 7 shows, change to the behavior distribution over the seeds alters the unique number of participants as well as the total adoption. Therefore the seed distributions need to be chosen with care, the appropriate metric in mind. Both uniform and proportional to cost behavior distribution methods seem to hit a sweet spot between utilization and behavior diversity.

thumbnail
Table 6. Resource Utilization under Threshold Average.

Among the behavior distribution heuristics, assigning every seed the lowest (highest) cost behavior results in the lowest (highest) utilization. Assigning seeds proportional to cost, works as well as the assigning everyone the highest cost behavior.

https://doi.org/10.1371/journal.pone.0162014.t006

thumbnail
Table 7. Total Participation / Total adoption under Threshold for different behavior distributions over seeds.

Seeds are chosen under Constrained Social Influence Weight—Max Margin heuristic. Notice that when all the seeds are the same behavior (Low, High), the number of unique participants and adoptions are identical.

https://doi.org/10.1371/journal.pone.0162014.t007

7 Discussion and Open Issues

One of the main motivations of the present work was to develop a realistic model of the behavior diffusion process. There are many ways in which our work can be extended. Here we discuss about a few such possible extensions.

Our present model does not consider the role of behavioral inertia in the diffusion process. It is well known that such behavioral inertia plays an important role in many collective social behavior problems. For a discussion of the role of inertia in voting behavior and how to model it with the help of a freezing period see [39]. However, in our case often people are hesitant of adopting new behaviors because they cannot free their resources from practicing an old behavior which possibly has less value. This can be modeled in our framework by introducing an additional benefit for the already adopted behaviors. Another technique would be to introduce epidemic models such as SIRS to better model long-term behavioral adoption.

In a network, we receive social signals from our friends, but there is noise because we miss messages and or we check them late. In modeling the behavior adoption problem, we have ignored the role of constraints in how they affect the production and consumption of messages from peers. Explicit consideration of the cost of social signaling would not only make the model more realistic and provide better bounds on the maximal resource utilization of the networks resources.

For the seed selection heuristics we have considered relatively simple node measures for the sake of computational efficiency and performance. It would be interesting to see if more complex measures, such as betweenness centrality, cross clustering coefficient, and clustering coefficient entropy [40] would result in improved quality of seeds at the expense of more computation.

The study of social diffusion and information contagion has met with its fair share of criticism. Aral et al. [41] argues that in their observational study more than 50% of the perceived behavior contagion can be attributed to homophily instead of social influence. However Shalizi and Thomas [42] have shown that homophily and social influence are generically confounded in social diffusion processes and it in general not easy to distinguish between the two effects. We have tried to take this observation into account while developing our model (see Section 3.1). In our model, the diffusion process is not exclusively driven by the social influence effects but an individual’s intrinsic characteristics including interest in the behavior as well as resource constraints.

Goel et al. [43] has provided an important critique of research that focuses on modeling large-scale adoption through contagion like models. Their research shows that much of the empirically observed cascades on a variety of networks is small—in most cases, the cascade stops within one degree of the initial adopting seed. However, we note that large cascades do occur but are rare—the “Spanish Flu” of 1918-19 infected 500M people, a third of the world’s population at the time [44, 45]. The main difference between Goel et al. [43] and our own work is that while there is less empirical evidence for large cascades, we are interested in engineering large cascades through careful seed selection. We conjecture that large cascades are less likely to occur in “natural” cascades because the chance that all the influentials adopt the behavior nearly simultaneously to cause a large cascade would be rare.

8 Conclusions

In this paper we have considered the problem of seed selection to maximize resource utilization for multiple behavior diffusion processes. This problem has implications in a varied set scenarios, ranging from viral marketing campaign to mass adoption of sustainable behaviors and public health. We have considered a social network where individuals are constrained by available resources for adoption of new behaviors. Our work is the first of its kind, to the best of our knowledge to study the influence of individual resource constraints on multiple, costly behavior adoption. Mindful of the confound between homophily and structural effects, individuals in our model respond to the social influence as well as the intrinsic utility of a spreading behavior. We have shown that the core optimization problems are NP-complete and provided novel heuristics for solving them. We have tested our heuristics against the random and naïve methods and have shown that our heuristics perform very well. We have also shown that depending on the objective of the campaign, there are different strategies for distributing the behaviors over the initial seed set that result in qualitatively different outcomes. Some of the open issues include the use of epidemic models for modeling long-term behavior adoption and incorporating the idea of noisy social signals in modeling behavior adoption.

Author Contributions

  1. Conceptualization: HS KS.
  2. Data curation: KS.
  3. Formal analysis: KS.
  4. Funding acquisition: HS.
  5. Software: KS.
  6. Supervision: HS.
  7. Validation: KS HS.
  8. Visualization: KS HS.
  9. Writing – original draft: KS.
  10. Writing – review & editing: HS.

References

  1. 1. Kempe D, Kleinberg J, Tardos E. Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. KDD’03. New York, NY, USA: ACM; 2003. p. 137–146.
  2. 2. Hodas NO, Lerman K. How visibility and divided attention constrain social contagion. In: 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 ASE/IEEE International Confernece on Social Computing (SocialCom). IEEE; 2012. p. 249–257.
  3. 3. Granovetter M. Threshold models of collective behavior. American journal of sociology. 1978; p. 1420–1443.
  4. 4. Rogers E. Diffusion of Innovations. Free Press; 1962.
  5. 5. Bass FM. A new product growth for consumer durables. Management Science. 1969;15:215–227.
  6. 6. Young HP. Innovation Diffusion in Heterogeneous Populations: Contagion, Social Influence, and Social Learning. The American Economic Review. 2009;99(5):pp. 1899–1924.
  7. 7. Watts DJ. A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences. 2002;99(9):5766–5771. pmid:16578874
  8. 8. Watts DJ, Dodds PS. Influentials, Networks, and Public Opinion Formation. Journal of Consumer Research. 2007;34:441–458.
  9. 9. Gao ZK, Jin ND. A directed weighted complex network for characterizing chaotic dynamics from time series. Nonlinear Analysis: Real World Applications. 2012;13(2):947—952.
  10. 10. Gao ZK, Yang YX, Fang PC, Jin ND, Xia CY, Hu LD. Multi-frequency complex network from time series for uncovering oil-water flow structure. Scientific Reports. 2015;5:8222 EP –. pmid:25649900
  11. 11. Gao ZK, Fang PC, Ding MS, Jin ND. Multivariate weighted complex network analysis for characterizing nonlinear dynamic behavior in two-phase flow. Experimental Thermal and Fluid Science. 2015;60:157—164.
  12. 12. Domingos P, Richardson M. Mining the Network Value of Customers. In: In Proceedings of the Seventh International Conference on Knowledge Discovery and Data Mining. ACM Press; 2002. p. 57–66.
  13. 13. Nemhauser GL, Wolsey LA, Fisher ML. An analysis of approximations for maximizing submodular set functions—I. Mathematical Programming. 1978;14(1):265–294.
  14. 14. Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N. Cost-effective Outbreak Detection in Networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD); 2007. p. 420–429.
  15. 15. Chen W, Wang Y, Yang S. Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. KDD’09. New York, NY, USA: ACM; 2009. p. 199–208.
  16. 16. Saito K, Nakano R, Kimura M. Prediction of Information Diffusion Probabilities for Independent Cascade Model. In: Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part III. KES’08. Berlin, Heidelberg: Springer-Verlag; 2008. p. 67–75.
  17. 17. Goyal A, Bonchi F, Lakshmanan LVS. Learning influence probabilities in social networks. In: Proceedings of the third ACM international conference on Web search and data mining. WSDM’10. New York, NY, USA: ACM; 2010. p. 241–250.
  18. 18. Mathioudakis M, Bonchi F, Castillo C, Gionis A, Ukkonen A. Sparsification of influence networks. In: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. KDD’11. New York, NY, USA: ACM; 2011. p. 529–537.
  19. 19. Arthur WB. Competing Technologies, Increasing Returns, and Lock-In by Historical Events. The Economic Journal. 1989;99(394):pp. 116–131.
  20. 20. Chierichetti F, Kleinberg J, Panconesi A. How to Schedule a Cascade in an Arbitrary Graph. SIAM Journal on Computing. 2014;43(6):1906–1920.
  21. 21. Martin T, Schoenebeck G, Wellman M. Characterizing Strategic Cascades on Networks. In: Proceedings of the Fifteenth ACM Conference on Economics and Computation. EC’14. New York, NY, USA: ACM; 2014. p. 113–130.
  22. 22. Seeman L, Singer Y. Adaptive Seeding in Social Networks. In: Proceedings of the IEEE Annual Symposium on Foundations of Computer Science (FOCS-13); 2013.
  23. 23. Rubinstein A, Seeman L, Singer Y. Approximability of Adaptive Seeding under Knapsack Constraints. In: The ACM Conference on Economics and Computation (EC) 2015; 2015.
  24. 24. Bala V, Goyal S. Learning from Neighbours. The Review of Economic Studies. 1998;65(3):pp. 595–621.
  25. 25. Golub B, Jackson MO. Naïve Learning in Social Networks and the Wisdom of Crowds. American Economic Journal: Microeconomics. 2010;2(1):pp. 112–149.
  26. 26. Acemoglu D, Dahleh MA, Lobel I, Ozdaglar A. Bayesian learning in social networks. The Review of Economic Studies. 2011;78(4):1201–1236.
  27. 27. DeGroot MH. Reaching a Consensus. Journal of the American Statistical Association. 1974;69(345):pp. 118–121.
  28. 28. Jackson MO. Social and economic networks. vol. 3. Princeton University Press Princeton; 2008.
  29. 29. Bharathi S, Kempe D, Salek M. Competitive Influence Maximization in Social Networks. In: Deng X, Graham F, editors. Internet and Network Economics. vol. 4858 of Lecture Notes in Computer Science. Springer Berlin Heidelberg; 2007. p. 306–311.
  30. 30. Carnes T, Nagarajan R, Wild SM, Zuylen AV. Maximizing influence in a competitive social network: a follower’s perspective. In: In ICEC’07: Proceedings of the ninth international conference on Electronic commerce. ACM; 2007. p. 351–360.
  31. 31. Simon HA. Theories of bounded rationality. Decision and organization. 1972;1(1):161–176.
  32. 32. Kahneman D. Maps of Bounded Rationality: Psychology for Behavioral Economics. The American Economic Review. 2003;93(5):pp. 1449–1475.
  33. 33. Chen W, Yuan Y, Zhang L. Scalable Influence Maximization in Social Networks under the Linear Threshold Model. In: Proceedings of the 2010 IEEE International Conference on Data Mining. ICDM’10. Washington, DC, USA: IEEE Computer Society; 2010. p. 88–97.
  34. 34. Wilensky U. NetLogo; 1999.
  35. 35. Barabasi AL, Albert R. Emergence of Scaling in Random Networks. Science. 1999;509-12:286.
  36. 36. Watts DJ, Strogatz SH. Collective Dynamics of “Small-World” Networks. Nature. 1998;440-42:393. pmid:9623998
  37. 37. Stonedahl F, Wilensky U. NetLogo Virus on a Network model; 2008.
  38. 38. Leskovec J, Kleinberg J, Faloutsos C. Graph evolution: Densification and shrinking diameters. ACM Trans Knowl Discov Data. 2007;1(1).
  39. 39. Wang Z, Liu Y, Wang L, Zhang Y. Freezing period strongly impacts the emergence of a global consensus in the voter model. Scientific Reports. 2014;4:3597 EP –. pmid:24398458
  40. 40. Gao ZK, Yang YX, Fang PC, Zou Y, Xia CY, Du M. Multiscale complex network for analyzing experimental multivariate time series. EPL (Europhysics Letters). 2015;109(3):30005.
  41. 41. Aral S, Muchnik L, Sundararajan A. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences of the United States of America. 2009;106:21544–21549. pmid:20007780
  42. 42. Shalizi CR, Thomas AC. Homophily and Contagion Are Generically Confounded in Observational Social Network Studies. SOCIOLOGICAL METHODS AND RESEARCH. 2011;40:211. pmid:22523436
  43. 43. Goel S, Watts DJ, Goldstein DG. The structure of online diffusion networks. In: Proceedings of the 13th ACM Conference on Electronic Commerce. EC’12. New York, NY, USA: ACM; 2012. p. 623–638.
  44. 44. Johnson NPAS, Mueller J. Updating the Accounts: Global Mortality of the 1918–1920 “Spanish” Influenza Pandemic. Bulletin of the History of Medicine. 2002;76(1):105–115. pmid:11875246
  45. 45. Taubenberger JK, Morens DM. 1918 Influenza: the Mother of All Pandemics. Emerging Infectious Diseases. 2006;12(1):15–22. pmid:16494711