2016
DOI: 10.1016/j.comcom.2015.07.012
|View full text |Cite
|
Sign up to set email alerts
|

Phantom cascades: The effect of hidden nodes on information diffusion

Abstract: Research on information diffusion generally assumes complete knowledge of the underlying network. However, in the presence of factors such as increasing privacy awareness, restrictions on application programming interfaces (APIs) and sampling strategies, this assumption rarely holds in the real world which in turn leads to an underestimation of the size of information cascades. In this work we study the effect of hidden network structure on information diffusion processes. We characterise information cascades … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…As Bikhchandani et al (1998) note, information cascades can influence the behavior of economic subjects. Meanwhile, Mahdi (2017) is considering information cascades as a part of complex networks, when Belák et al (2016) and Sattari & Zamanifar (2018) focus on the effect of hidden nodes on information diffusion.…”
Section: Problem Statementmentioning
confidence: 99%
“…As Bikhchandani et al (1998) note, information cascades can influence the behavior of economic subjects. Meanwhile, Mahdi (2017) is considering information cascades as a part of complex networks, when Belák et al (2016) and Sattari & Zamanifar (2018) focus on the effect of hidden nodes on information diffusion.…”
Section: Problem Statementmentioning
confidence: 99%
“…On the other hand, a cascade has a limited lifespan and spreads over hours to days, so the sequence from beginning to end of a cascade is usually fixed within a limited data collection interval. (2) We are not interested in hidden nodes that do not have any global or local signals in structure or diffusion data. However, we can somewhat handle users with private accounts.…”
Section: Introductionmentioning
confidence: 99%
“…(3) We consider that the source and mediators of an information dissemination process are internal factors of the network, and any external agents are ignored. As mentioned before, incomplete data in the collected set from a social network is inevitable, and missing data can significantly affect the difference between the output of methods and what actually happens in the real world [2].…”
Section: Introductionmentioning
confidence: 99%
“…The second category focuses on analyzing the effect of network nodes (users) on information diffusion using different mathematical models [22][23][24][25][26][27][28]. Kimura et al [22] considered the optimization problem of extracting the most influential nodes over a social network.…”
Section: Introductionmentioning
confidence: 99%
“…More recently, Saito et al [27] proposed an efficient method to find a new kind of influential nodes (supermediators) over a social network and characterized the properties of supermediators. From another perspective, Belák et al [28] studied the effect of hidden nodes on information diffusion and characterized information cascades.…”
Section: Introductionmentioning
confidence: 99%