scholarly journals Human social preferences cluster and spread in the field

2020 ◽  
Vol 117 (37) ◽  
pp. 22787-22792 ◽  
Author(s):  
Alexander Ehlert ◽  
Martin Kindschi ◽  
René Algesheimer ◽  
Heiko Rauhut

While it is undeniable that the ability of humans to cooperate in large-scale societies is unique in animal life, it remains open how such a degree of prosociality is possible despite the risks of exploitation. Recent evidence suggests that social networks play a crucial role in the development of prosociality and large-scale cooperation by allowing cooperators to cluster; however, it is not well understood if and how this also applies to real-world social networks in the field. We study intrinsic social preferences alongside emerging friendship patterns in 57 freshly formed school classes (n = 1,217), using incentivized measures. We demonstrate the existence of cooperative clusters in society, examine their emergence, and expand the evidence from controlled experiments to real-world social networks. Our results suggest that being embedded in cooperative environments substantially enhances the social preferences of individuals, thus contributing to the formation of cooperative clusters. Partner choice, in contrast, only marginally contributes to their emergence. We conclude that cooperative preferences are contagious; social and cultural learning plays an important role in the development and evolution of cooperation.

2018 ◽  
Vol 2018 ◽  
pp. 1-22 ◽  
Author(s):  
Shuang Zhao ◽  
Xiapu Luo ◽  
Xiaobo Ma ◽  
Bo Bai ◽  
Yankang Zhao ◽  
...  

Proximity-based apps have been changing the way people interact with each other in the physical world. To help people extend their social networks, proximity-based nearby-stranger (NS) apps that encourage people to make friends with nearby strangers have gained popularity recently. As another typical type of proximity-based apps, some ridesharing (RS) apps allowing drivers to search nearby passengers and get their ridesharing requests also become popular due to their contribution to economy and emission reduction. In this paper, we concentrate on the location privacy of proximity-based mobile apps. By analyzing the communication mechanism, we find that many apps of this type are vulnerable to large-scale location spoofing attack (LLSA). We accordingly propose three approaches to performing LLSA. To evaluate the threat of LLSA posed to proximity-based mobile apps, we perform real-world case studies against an NS app named Weibo and an RS app called Didi. The results show that our approaches can effectively and automatically collect a huge volume of users’ locations or travel records, thereby demonstrating the severity of LLSA. We apply the LLSA approaches against nine popular proximity-based apps with millions of installations to evaluate the defense strength. We finally suggest possible countermeasures for the proposed attacks.


2022 ◽  
Vol 40 (2) ◽  
pp. 1-23
Author(s):  
Sheng Zhou ◽  
Xin Wang ◽  
Martin Ester ◽  
Bolang Li ◽  
Chen Ye ◽  
...  

User recommendation aims at recommending users with potential interests in the social network. Previous works have mainly focused on the undirected social networks with symmetric relationship such as friendship, whereas recent advances have been made on the asymmetric relationship such as the following and followed by relationship. Among the few existing direction-aware user recommendation methods, the random walk strategy has been widely adopted to extract the asymmetric proximity between users. However, according to our analysis on real-world directed social networks, we argue that the asymmetric proximity captured by existing random walk based methods are insufficient due to the inbalance in-degree and out-degree of nodes. To tackle this challenge, we propose InfoWalk, a novel informative walk strategy to efficiently capture the asymmetric proximity solely based on random walks. By transferring the direction information into the weights of each step, InfoWalk is able to overcome the limitation of edges while simultaneously maintain both the direction and proximity. Based on the asymmetric proximity captured by InfoWalk, we further propose the qualitative (DNE-L) and quantitative (DNE-T) directed network embedding methods, capable of preserving the two properties in the embedding space. Extensive experiments conducted on six real-world benchmark datasets demonstrate the superiority of the proposed DNE model over several state-of-the-art approaches in various tasks.


Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequate for the high value of the published information. For all these reasons, online social networks suffer more and more attacks by sophisticated crackers and scammers. To make things worse, the information gathered from social web sites can trigger attacks to even more sensible targets. This work reviews some typical social attacks that are conducted on social networking systems, describing real-world examples of such violations and analyzing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


2013 ◽  
pp. 103-120
Author(s):  
Giuseppe Berio ◽  
Antonio Di Leva ◽  
Mounira Harzallah ◽  
Giovanni M. Sacco

The exploitation and integration of social network information in a competence reference model (CRAI, Competence, Resource, Aspect, Individual) are discussed. The Social-CRAI model, which extends CRAI to social networks, provides an effective solution to this problem and is discussed in detail. Finally, dynamic taxonomies, a model supporting explorative conceptual search, are introduced and their use in the context of the Social-CRAI model for exploring retrieved information available in social networks is discussed. A real-world example is provided.


2018 ◽  
Vol 32 (26) ◽  
pp. 1850319 ◽  
Author(s):  
Fuzhong Nian ◽  
Longjing Wang ◽  
Zhongkai Dang

In this paper, a new spreading network was constructed and the corresponding immunizations were proposed. The social ability of individuals in the real human social networks was reflected by the node strength. The negativity and positivity degrees were also introduced. And the edge weights were calculated by the negativity and positivity degrees, respectively. Based on these concepts, a new asymmetric edge weights scale-free network which was more close to the real world was established. The comparing experiments indicate that the proposed immunization is priority to the acquaintance immunization, and close to the target immunization.


Author(s):  
Masoud Bashari ◽  
M.-R. Akbarzadeh-T.

Opinion formation in social networks is an interesting dynamical process from the perspective of system modeling due to its large scale as well as the variety of structural and parametric uncertainties that it entails. This paper proposes a probabilistic fuzzy opinion formation model for predicting the opinions of communities in the social networks. In this regard, the opinions of a group of individuals about a given topic in a Telegram pilot group, as a popular social network, are collected and presented in the framework of the probabilistic fuzzy model. Based on the obtained data, the parameters of the model are extracted, and the model is tuned. Finally, the variations of the actual opinions throughout time are compared with the model predictions. The numerical results in this study show that, with appropriately tuned parameters, the model successfully represents the opinion formation process, with an average error that approaches zero.


2016 ◽  
Vol 26 (1) ◽  
pp. 65-92 ◽  
Author(s):  
Adam Joseph Nazaroff ◽  
Christina Tsoraki ◽  
Milena Vasic

The Neolithic period bore witness to the emergence of novel engagements between humans and the material world. In the Middle East, these interactions were important components of broader social and ritual developments which came about with the rise of sedentary communities. In this paper, we examine the significance of these processes as represented by elaborate flint daggers at the site of Çatalhöyük in Central Anatolia. Detailed analyses of the manufacture, use and deposition of these items indicate that they were central nodes in multiple social and material relations, and functioned as durable facets of Çatalhöyük's artisanal social fabric. Their presence at the apogee of Çatalhöyük's ritual florescence further identifies their importance to particular segments of the community. Studying the intentionality of dagger production and use, we conclude, allows us to comment on the particulars of material milieu in shaping the social networks necessary for the development of large-scale sedentary communities.


2012 ◽  
Vol 35 (1) ◽  
pp. 42-43 ◽  
Author(s):  
Pieter van den Berg ◽  
Lucas Molleman ◽  
Franz J. Weissing

AbstractLab experiments on punishment are of limited relevance for understanding cooperative behavior in the real world. In real interactions, punishment is not cheap, but the costs of punishment are of a different nature than in experiments. They do not correspond to direct payments or payoff deductions, but they arise from the repercussions punishment has on social networks and future interactions.


PLoS ONE ◽  
2021 ◽  
Vol 16 (1) ◽  
pp. e0244619
Author(s):  
Amaia Albizua ◽  
Elena M. Bennett ◽  
Guillaume Larocque ◽  
Robert W. Krause ◽  
Unai Pascual

The social-ecological effects of agricultural intensification are complex. We explore farmers’ perceptions about the impacts of their land management and the impact of social information flows on their management through a case study in a farming community in Navarra, Spain, that is undergoing agricultural intensification due to adoption of large scale irrigation. We found that modern technology adopters are aware that their management practices often have negative social-ecological implications; by contrast, more traditional farmers tend to recognize their positive impacts on non-material benefits such as those linked with traditions and traditional knowledge, and climate regulation. We found that farmers’ awareness about nature contributions to people co-production and their land management decisions determine, in part, the structure of the social networks among the farming community. Since modern farmers are at the core of the social network, they are better able to control the information flow within the community. This has important implications, such as the fact that the traditional farmers, who are more aware of their impacts on the environment, rely on information controlled by more intensive modern farmers, potentially jeopardizing sustainable practices in this region. We suggest that this might be counteracted by helping traditional farmers obtain information tailored to their practices from outside the social network.


2020 ◽  
Author(s):  
Paolo Scarabaggio ◽  
Raffaele Carli ◽  
Mariagrazia Dotoli

The main characteristic of social networks is their ability to quickly spread information between a large group of people. This phenomenon is generated by the social influence that individuals induce on each other.<br>The widespread use of online social networks (e.g., Facebook) increases researchers' interest in how influence propagates through these networks. One of the most important research issues in this field is the so-called influence maximization problem, which essentially consists in selecting the most influential users (i.e., those who are able to maximize the spread of influence through the social network).<br>Due to its practical importance in various applications (e.g., viral marketing, target advertisement, personalized recommendation), such a problem has been studied in several variants. Different solution methodologies have been proposed. Nevertheless, the current open challenge in the resolution of the influence maximization problem still concerns achieving a good trade-off between accuracy and computational time. <br>In this context, based on the well-known independent cascade and the linear threshold models of social networks, we propose a novel low-complexity and highly accurate algorithm for selecting an initial group of nodes to maximize the spread of influence in large-scale networks. In particular, the key idea consists in iteratively removing the overlap of influence spread induced by different seed nodes. Application to several numerical experiments based on real datasets proves that the proposed algorithm effectively finds practical near-optimal solutions of the addressed influence maximization problem in a computationally efficient fashion. Finally, comparison with the best performing state of the art algorithms demonstrates that in large scale scenarios, the proposed approach shows higher performance in terms of influence spread and running time.


Sign in / Sign up

Export Citation Format

Share Document