scholarly journals High Degree Vertices and Spread of Infections in Spatially Modelled Social Networks

Author(s):  
Joshua Feldman ◽  
Jeannette Janssen
Keyword(s):  
2021 ◽  
pp. 1-15
Author(s):  
V. Indu ◽  
Sabu M. Thampi

Social networks have emerged as a fertile ground for the spread of rumors and misinformation in recent times. The increased rate of social networking owes to the popularity of social networks among the common people and user personality has been considered as a principal component in predicting individuals’ social media usage patterns. Several studies have been conducted to study the psychological factors influencing the social network usage of people but only a few works have explored the relationship between the user’s personality and their orientation to spread rumors. This research aims to investigate the effect of personality on rumor spread on social networks. In this work, we propose a psychologically-inspired fuzzy-based approach grounded on the Five-Factor Model of behavioral theory to analyze the behavior of people who are highly involved in rumor diffusion and categorize users into the susceptible and resistant group, based on their inclination towards rumor sharing. We conducted our experiments in almost 825 individuals who shared rumor tweets on Twitter related to five different events. Our study ratifies the truth that the personality traits of individuals play a significant role in rumor dissemination and the experimental results prove that users exhibiting a high degree of agreeableness trait are more engaged in rumor sharing activities and the users high in extraversion and openness trait restrain themselves from rumor propagation.


2021 ◽  
pp. 141-158
Author(s):  
Rubicelia Valencia-Ortiz ◽  
Julio Cabero-Almenara ◽  
Urtza Garay Ruiz

Addictions to online social networks is a problem facing technological societies, and those most affected by this phenomenon are young people and teenagers. Among its effects are the decrease in academic performance and the increase in violent behavior. Given these facts, governments around the world are adopting mechanisms for their prevention. The present work describes the results of research focused on investigating the proposals that would be adopted by the members of the educational community to carry out preventive actions against the addiction and abuse of online social networks. The methodological design has been based on the intensive use of the Nominal Groups technique developed by Delbecq and Andrew in 1971 and which facilitates reaching consensus in a structured group process. The results show the high degree of coincidence among the participants stands out, which validates the usefulness of the measures, and that the addiction to social networks perceives it as a direct consequence of the addition to mobile phones and the Internet. Therefore, it seems necessary that prevention plans should have a generalized perspective that encompasses all three technologies


2017 ◽  
Vol 51 (3) ◽  
pp. 670-688 ◽  
Author(s):  
Jamie Johnston

Using Contact Theory as a lens, this article presents the results of a case-based study in Norway on language cafes and integration. The methodology includes participant observation and questionnaires for both the programmes’ participants and volunteers. The results show that the programming reduces intergroup prejudice by fostering the following four processes: learning about the out-group, changing behaviour, generating affective ties, and in-group reappraisal, as well as offering a high degree of friendship potential. Thus, the programming supports the expansion of social networks across intercultural lines and, thereby, facilitates integration.


2021 ◽  
Author(s):  
Mohsen Rezvani ◽  
Mojtaba Rezvani

Abstract Recent studies have shown that social networks exhibit interesting characteristics such as community structures, i.e., vertexes can be clustered into communities that are densely connected together and loosely connected to other vertices. In order to identify communities, several definitions have been proposed that can characterize the density of connections among vertices in the networks. Dense triangle cores, also known as $k$-trusses, are subgraphs in which every edge participates at least $k-2$ triangles (a clique of size 3), exhibiting a high degree of cohesiveness among vertices. There are a number of research works that propose $k$-truss decomposition algorithms. However, existing in-memory algorithms for computing $k$-truss are inefficient for handling today’s massive networks. In this paper, we propose an efficient, yet scalable algorithm for finding $k$-trusses in a large-scale network. To this end, we propose a new structure, called triangle graph to speed up the process of finding the $k$-trusses and prove the correctness and efficiency of our method. We also evaluate the performance of the proposed algorithms through extensive experiments using real-world networks. The results of comprehensive experiments show that the proposed algorithms outperform the state-of-the-art methods by several orders of magnitudes in running time.


Author(s):  
Renata Soares Martins ◽  
Suely Aparecida do Nascimento Mascarenhas ◽  
Gisele Cristina Resende

This article invites us to reflect on oversharenting and family life that, owing to the proliferation of communications technology and the internet, is intersected by digital cyberculture. The research was carried out on the social network, using the method of searching by hashtag. The results showed that during 2018 in two weeks, 20,781 posts were made using the hashtag “minidiva” and 1,679 with the hashtag “miniblogger”, from which three posts were collected each day. Netnography was used to analyze the images and categorize them: (1) oversharenting and family life, (2) social media and child consumption, (3) child adultization. It was concluded that online social networks (Instagram) are spaces where interpersonal relationships; it was seen that the act of consuming gained relevance in the family and that the child’s exposure occurs without awareness, which can cause a high degree of exposure and consequently have adverse effects for everyone.


2017 ◽  
Vol 52 (1) ◽  
pp. 141-160
Author(s):  
Kristian Larsson

AbstractNo systematic investigations of Elfriede Jelinek’s authorial positioning within the hierarchies of the literary field exist. Previous research has nevertheless noted that the authorship is distinguished by a high degree of reflexivity in relation to the power structures it confronts. Studies on the very earliest phase of establishing herself in the Austrian literary field in the years 1966–1969 have, however, emphasized two characteristics: social isolation and literary imitation. Both aspects suggest authorial immaturity if not inferiority, which seems oddly anachronistic and normative given the astonishingly rapid literary success of Jelinek in this period. This article relates the early success to a shift of values in the literary field at the end of the 1960 s, which allowed for new forms of provocative and experimental expressions to generate literary capital. Jelinek’s transgressive authorial dispositions accumulate symbolic capital using a combination of eclectic texts and strategies of self-fashioning within quite diverse contexts, drawing on social networks, media outlets, and literary publications. The theoretical framework primarily draws on concepts developed by Pierre Bourdieu, most notably habitus and symbolic capital.


2004 ◽  
Vol 18 (1) ◽  
pp. 132-157 ◽  
Author(s):  
Ion Bogdan Vasi

This article analyzes one of the most virulent protests witnessed by post-socialist societies: the social movements of the Jiu Valley miners in Romania. I argue that the key to comprehending the Jiu Valley miners’ extraordinary mobilization can be found in the density of their social networks, which, under a particular political opportunity structure, became a crucial resource for social movement organizations. Dense social networks and a favorable political opportunity created organizational resources that were utilized by movement entrepreneurs to build a unique participant identity. Having abundant organizational resources, influential allies, and sharing a special collective identity rooted in a tradition of militancy, Jiu Valley miners could achieve a high degree of mobilization, use noninstitutionalized confrontational tactics, and be victorious.


Author(s):  
Charlotte Out ◽  
Ahad N. Zehmakan

Consider a graph G, representing a social network. Assume that initially each node is colored either black or white, which corresponds to a positive or negative opinion regarding a consumer product or a technological innovation. In the majority model, in each round all nodes simultaneously update their color to the most frequent color among their connections. Experiments on the graph data from the real world social networks (SNs) suggest that if all nodes in an extremely small set of high-degree nodes, often referred to as the elites, agree on a color, that color becomes the dominant color at the end of the process. We propose two countermeasures that can be adopted by individual nodes relatively easily and guarantee that the elites will not have this disproportionate power to engineer the dominant output color. The first countermeasure essentially requires each node to make some new connections at random while the second one demands the nodes to be more reluctant towards changing their color (opinion). We verify their effectiveness and correctness both theoretically and experimentally. We also investigate the majority model and a variant of it when the initial coloring is random on the real world SNs and several random graph models. In particular, our results on the Erdős-Rényi, and regular random graphs confirm or support several theoretical findings or conjectures by the prior work regarding the threshold behavior of the process. Finally, we provide theoretical and experimental evidence for the existence of a poly-logarithmic bound on the expected stabilization time of the majority model.


2017 ◽  
Vol 4 (5) ◽  
pp. 170094 ◽  
Author(s):  
Ignacio Vidal-Franco ◽  
Jacobo Guiu-Souto ◽  
Alberto P. Muñuzuri

Understanding and predicting the evolution of competing languages is a topic of high interest in a world with more than 6000 languages competing in a highly connected environment. We consider a reasonable mathematical model describing a situation of competition between two languages and analyse the effect of the speakers' connectivity (i.e. social networks). Surprisingly, instead of homogenizing the system, a high degree of connectivity helps to introduce differentiation for the appropriate parameters.


2014 ◽  
Vol 2 (3) ◽  
pp. 303-325 ◽  
Author(s):  
JAMESON K. M. WATTS ◽  
KENNETH W. KOPUT

AbstractA preference for diversity has been identified as an important predictor of tie formation in certain networks, both social and organizational, that also exhibit a high degree of suppleness–the ability to retain their general form and character under stress (Durkheim, 1893/1997. The division of labor in society; Powell et al., 1996. Administrative Science Quarterly 116–145; Powell et al., 2005. American Journal of Sociology, 110(4), 1132–1205; Koput & Gutek, 2010. Gender stratification in the IT industry: Sex, status and social capital. Edward Elgar Publishing). Extant models of preferential attachment, based on popularity, similarity, and cohesion, meanwhile, produce exceedingly brittle networks (Albert et al., 2000. Nature, 406(6794), 378–382; Callaway et al., 2000. Physical Review Letters, 85(25), 5468–5471; Holme et al., 2002. Physical Review E, 65(2), 026107; Shore et al., 2013 Social Networks, 35(1), 116–123). A model of preferential attachment based on diversity is introduced and simulated, demonstrating that a preference for diversity can create a structure characterized by suppleness. This occurs because a preference for diversity promotes overlapping and redundant weak ties during the early stages of network formation.


Sign in / Sign up

Export Citation Format

Share Document