Differential Adaptive Diffusion: Understanding Diversity and Learning Whom to Trust in Viral...

Post on 13-Nov-2023

0 views 0 download

transcript

Electronic copy available at: http://ssrn.com/abstract=1904693

Working Paper No. RHS-06-138

2011

Differential Adaptive Diffusion: Understanding Diversity and Learning Whom to Trust in Viral

Marketing

Hossam Sharara University of Maryland - College of Computer, Mathematical and Physical Sciences

William M. Rand University of Maryland

Lise Getoor University of Maryland - College of Computer, Mathematical and Physical Sciences

This Paper can be downloaded without charge from the Social Science Research Network Electronic Paper Collection

http://ssrn.com/abstract=1904693

Electronic copy available at: http://ssrn.com/abstract=1904693Electronic copy available at: http://ssrn.com/abstract=1904693

Differential Adaptive Diffusion: Understanding Diversityand Learning whom to Trust in Viral Marketing

Hossam ShararaComputer Science Department

University of Maryland, College Park

William RandRobert H. Smith School of Business

University of Maryland, College Park

Lise GetoorComputer Science Department

University of Maryland, College Park

Abstract

Viral marketing mechanisms use the existing social networkbetween customers to spread information about products andencourage product adoption. Existing viral marketing modelsfocus on the dynamics of the diffusion process, however theytypically: (a) only consider a single product campaign and (b)fail to model the evolution of the social network, as the trustbetween individuals changes over time, during the course ofmultiple campaigns. In this work, we propose an adaptiveviral marketing model which captures: (1) multiple differentproduct campaigns, (2) the diversity in customer preferencesamong different product categories, and (3) changing con-fidence in peers’ recommendations over time. By applyingour model to a real-world network extracted from the Diggsocial news website, we provide insights into the effects ofnetwork dynamics on the different products’ adoption. Ourexperiments show that our proposed model outperforms ear-lier non-adaptive diffusion models in predicting future prod-uct adoptions. We also show how this model can be used toexplore new viral marketing strategies that are more success-ful than classic strategies which ignore the dynamic nature ofsocial networks.

IntroductionHow information diffuses through social networks is a ques-tion that has attracted scholars from a wide variety of re-search disciplines. A richer understanding of the mechanismgoverning the spread of new ideas or trends in social me-dia has implications for marketing, sociology, journalism,computer science and many other research areas. Modelsof network diffusion have been used to study phenomena aswidespread as product recommendation systems (Leskovec,Singh, and Kleinberg 2006), viral marketing (Krackhardt1996; Richardson and Domingos 2002; Domingos 2005;Leskovec, Adamic, and Huberman 2007), disease transmis-sion (Dodds and Watts 2005), herding behavior in finan-cial markets (Welch 2000; Drehmann, Oechssler, and Roi-der 2005), and even the contagion properties of obesity(Christakis and Fowler 2007). This is in part because thewidespread growth and use of online social networks hascreated a new opportunity to observe diffusion processes ona very large scale, and across different types of interactionsfrom email to microblogging to the sharing of photos.

Copyright c© 2011, Association for the Advancement of ArtificialIntelligence (www.aaai.org). All rights reserved.

Viral marketing builds upon these network-based diffu-sion processes. The main goal of viral marketing is to ex-ploit existing social networks among customers by encour-age those customers to share product information with theirfriends. This goal is based on the premise that consumers’purchasing decisions are heavily influenced by recommen-dations and referrals from their family, friends, and col-leagues; an assumption that has been supported by researchsince some of the earliest studies of diffusion (Ryan andGross 1943). Recently, viral marketing has become moreappealing to marketers as consumers have started to showan increasing resistance to traditional forms of advertisingsuch as TV or newspaper ads.

One of the major early success stories of viral market-ing was the introduction of “Hotmail”, which was able togain twelve million subscribers in just eighteen months byadding a simple promotional message with each outgoingemail (Jurvetson 2000). Similarly, cell phone companies areanother industry where providers take advantage of socialnetwork-based diffusion by offering highly discounted ratesfor customers talking to other customers within the samenetwork. Thus, if a customer’s social circle (family, friends,colleagues) is using a certain provider, there’s an added in-centive for her to use the same provider.

However, social networks are not static. In addition, asconsumers continue to listen to their friends and family, theylearn that some of their social connections have recommen-dations that are more appropriate for them and that othermembers of their social network simply do not have thesame interests as they do. This is in part because differentindividuals are interested in different topics. For someonewho is primarily interested in science, if their friend con-stantly talks to them about new sports developments, send-ing them emails, and links to promotions for sporting events,that friend is essentially acting as a spammer and the focalindividual will eventually decrease their trust in her.

However, if another friend makes a recommendation andthe focal individual adopts the product that they recommendthen the trust of the focal individual in that friend will in-crease. As a result of these processes, the social networkof confidence changes in time due to the recommendationand adoption process. Although the dynamics of social trusthas attracted the attention of multiple researchers (Golbeck2009), most current viral marketing models do not fully ad-

Electronic copy available at: http://ssrn.com/abstract=1904693Electronic copy available at: http://ssrn.com/abstract=1904693

dress either the fact that social networks change in time, orthe heterogeneity of preferences that individuals have fordifferent topics.

In this paper, we present an adaptive model that addressesthis shortcoming by allowing individuals to have differentpreferences for product categories, while adapting their con-fidence in other individuals’ recommendations on the basisof history. This model is novel in that previous models as-sume the confidence that a user has in other individuals re-mains constant over time, and that preference for adoptionis not dependent on product categories. By incorporatingnetwork-level dynamics into a standard diffusion model andallowing for heterogeneous preferences, our model providesa better prediction of expected users’ adoption of a givenproduct. We then build upon this model to examine whomto target using viral marketing.

BackgroundOne of the first and most influential diffusion models wasproposed by Bass (1969). This model of product diffusionpredicts the number of people who will adopt an innova-tion over time, and though it does not explicitly account forthe social network, it does assume that the rate of adoptionis dependent on other members of the population, specifi-cally the current proportion who have already adopted. Thediffusion equation used by this model describes the cumu-lative proportion of adopters in the population at any timeas a function of the intrinsic adoption rate, and a measure ofsocial contagion. The model describes an S-shaped curve,where adoption is slow at first, takes off exponentially andflattens at the end. The Bass model has been shown to effec-tively model word-of-mouth product diffusion at the aggre-gate level (Mahajan, Muller, and Bass 1990), but does notexplicitly model the decision of an individual consumer.

Though the Bass model can easily be generalized toaddress individual-level decisions (Stonedahl, Rand, andWilensky 2010), most diffusion models that capture the pro-cess of adoption of an idea or a product at an individual leveluse a different mechanism and can generally be divided intotwo groups: threshold models and cascade models. Thresh-old models are based on the work performed by Granovetter(1978) and Schelling (1978) in the late 70’s. Basically, eachindividual, v, in the network has a personal adoption thresh-old θv ∈ [0, 1], typically drawn from some probability dis-tribution. A given individual v in the network adopts a newproduct if the sum of the connection weights of its neigh-boring peers that have already adopted the product N(v) isgreater than her personal threshold:

u∈N(v)

w(u, v) ≥ θv.

Although the above model represents a linear thresholdmodel, it can be easily generalized further with replacingthe summation with an arbitrary function on the set of ac-tive neighbors of individual v. Dodds and Watts (2005) havealso shown that a more general model than this can be usedto describe both the Bass model and the threshold model.

Cascade models (Goldenberg, Libai, and Muller 2001)were originally inspired by research on interacting particle

systems. In these type of models, whenever a peer u of anindividual v adopts a given product, then individual v alsoadopts with probability pu,v . In other words, each individ-ual has a single, probabilistic chance to activate each one ofher currently inactive peers, after becoming active herself.A very common example is the independent cascade model,in which the probability that an individual is activated by anewly active peer is independent of the set of peers who haveattempted to activate her in the past. Kempe et al. (2003)proposed a broader framework that simultaneously general-izes the linear threshold and independent cascade models,having equivalent formulations in both cases.

Regardless of the adoption model, one of the key aspectsthat affects information diffusion is the interaction structure.For instance, a model for product adoption in small-worldnetworks was proposed by Centola et al. (2005), wherean individual’s probability of adopting a product is depen-dent on having more than one neighbor who has previouslyadopted the product. Wu et al. (2004) modeled opinion for-mation on different network topologies, and found that ifhighly connected nodes were seeded with a particular opin-ion, this would proportionally affect the long term distribu-tion of opinions in the network. The work of Holme et al.(2006) focuses on coupling the evolution of both the socialnetwork and opinion formation, where both aspects adapt toeach other during the evolution process.

Once a diffusion model and a network topology are spec-ified, the next question is which set of individuals shouldbe targeted to maximize the spread of information through-out the network. The problem of influence maximizationwas formalized by Domingos et al. (2001), who noticedthat ordinary data mining techniques that reason about con-sumer behavior in independent settings, do not utilize net-work information. They proposed a probabilistic modelof user-interaction to study influence propagation in net-works, and then explored how to identify a group of in-dividuals, who if they adopted a product, would maxi-mize the speed and amount of adoption throughout the net-work. Even before Domingos et al. formalized this prob-lem, one hypothesis as to how to maximize diffusion cen-tered around the concept of influentials, who are individ-uals that have a disproportionate effect, compared to aver-age individuals, on the amount and rate of information dif-fusion. In many information diffusion models, it has beenshown that the most influential individuals in a network arethe most central, where centrality is measured in a vari-ety of different ways, including the most highly connectednodes, i.e. degree centrality (Wasserman and Faust 1994;Albert, Jeong, and Barabasi 2000). Other solutions havealso been proposed, for instance, Stonedahl et al. (2010)show that not only is degree centrality important in maxi-mizing diffusion, but in real social networks it is importantto consider the clustering of a node’s neighbors since tightclustering slows the diffusion process.

Case Study: Digg

Many popular online social network platforms allow forindividuals to recommend items of interest and exchange

Electronic copy available at: http://ssrn.com/abstract=1904693

5%

10%

15%

20%

25%

erc

enta

ge

of

sto

ries

0%

5%

10%

15%

20%

25%

Perc

enta

ge

of

sto

ries

Topics

Figure 1: Topic distribution of stories in Digg dataset

knowledge. One such example is Digg.com, which is a pop-ular social news website, where users can share and voteon different stories, referred to as “digging”, to elevate theranking of the story on the website. Digg’s users form asocial network by “following” other users in the network,which enables automatic tracking of their future diggs andsubmissions. Each news story on Digg belongs to one of tentopics; Business, Entertainment, Gaming, Lifestyle, Offbeat,Politics, Science, Sports, Technology, and World News. Weconstructed a sample from the Digg network which includedboth the diggs and follows for 11,942 users and the storiesthey submitted over a 6 months period (Jul - Dec 2010). Thesample include 1.3 million follows relationships among theusers, with over 1.9 million diggs, on 48,554 news stories.

The network alone is not enough to describe the diffusionprocess in a network, it is also important to understand themechanism by which a user provides recommendations totheir peers. These mechanisms differ by platform and mar-keting strategy. For example, some mechanisms are basedon broadcast techniques, where all the peers of a given userare informed when she adopts a product. In other settings,the user has to explicitly select peers to send her product rec-ommendations to after adoption. Digg.com uses a broadcastmechanism, where connected users are able to see all theactivities of their peers as soon as it is performed.

Analysis

We begin by analyzing the topic distribution of the news sto-ries in the collected data. As shown in Figure 1, though thereare differences, all ten topics are represented at comparablelevels in our dataset, without a single topic dominating theothers. Technology, Entertainment, and Lifestyle are amongthe topics with higher frequency, while Gaming, Science,and Sports are the ones with lowest number of submissions.

We use the topic distribution of individual user submis-sions (the actual stories / links they submitted), as opposedto their diggs, as an influence-independent source for deter-mining a user’s topic preferences. Given this topic distri-bution, we then measure the correlation between the users’topic preferences and their actual adoptions, i.e., their diggs.Figure 2 shows the Kullback-Leibler divergence betweenthe topic distribution of the users’ submissions versus theirdiggs. For most users, there is very little divergence be-

tween their adoption behavior and their inferred preferencesaccording to their submissions. However, in approximately10% of the users, there is a quite significant difference be-tween the topic distribution of the stories they digg and theones they submit. One possible explanation is that whilemost people adopt only stories of interest to them, thereare a smaller percentage of “imitators” who are easily influ-enced by their peers and do not weight their own preferencesas highly. Similar results were obtained using normalizedmutual information (NMI) between the topic distribution ofusers’ preferences and adoptions, with imitators appearingto be even more prominent (˜16% of the users).

0%

2%

4%

6%

8%

10%

12%

14%

0.01 0.1 1 10

Per

cen

tag

e o

f U

sers

KL-divergence (log scale)

Figure 2: KL-divergence between the topic distribution ofusers’ submissions and diggs.

In order to characterize users’ topic preferences, we mea-sure the KL-divergence between the topic distribution ofeach user’s submissions and a uniform distribution of topics.Lower values indicates that the user’s submission pattern iscloser to uniform, while higher values indicate that the useris more interested in certain topics but not in others. FromFigure 3, we can distinguish three different groups of usersin the network: Focused users (˜53% of the users) who arecharacterized by having highly skewed preferences towardsone or two topics, Biased users ( ˜32% of the users) whohave less skewed preferences towards a larger set of topics,and Balanced users (˜15% of the users) who have almost-uniform topic preferences in their submissions.

Finally, we analyze the dynamics of change in the na-ture of the social relationships between users, and how it af-fects peer influence over time. We hypothesize that as timepasses, peers with similar preferences in topics start gain-ing confidence in each other’s recommendations, yieldinghigher levels of adoptions, while on the other hand, peerswhose preferences are farther apart from each other becomeless confident in each other’s recommendations, resulting inlower adoption levels. To test our hypothesis, we measured,at different time points, the average number of diggs on thesame story by different peers for different values of KL-divergence between their topic preferences. Figure 4 showsthat peers with lower KL-divergence in their topic prefer-ences increase their number of shared diggs over time, whilethe ones with higher levels of divergence have a decreasingpattern of adoptions over time.

10%

15%

20%

25%

Perc

enta

ge o

f u

sers

0%

5%

10%

15%

20%

25%

0 2 4 6 8 10 12 14

Perc

enta

ge o

f u

sers

KL-divergence

Figure 3: KL-divergence between uniform topic distributionand users’ submissions

Differential Adaptive Diffusion

We view our input social network as a directed weightedgraph G(V,E), where V represents the network users, andE represents the social relationships among them. Eachedge e(u, v) ∈ E is associated with a confidence valuewi(u, v) ∈ [0, 1] representing the confidence user v hasin the recommendations of her peer u during campaign i.This confidence value wi(u, v) is updated only once percampaign, and in general this update could take place ei-ther immediately after a recommendation or at the end of acampaign. In the model results presented here, we only up-date at the end of a campaign. Given a preference functionF(v, c) : V × C → [0, 1] that quantifies user preferencesfor different product categories c ∈ C for a given user v,we then define the probability of node v adopting a productof category c ∈ C within campaign i as a result of node uadopting it as:

p(u, v) , wi(u, v)×F(v, c)

To start a new campaign for a certain product xc of cat-egory c, a marketing incentive is provided to a chosen setof seed nodes in the network to initiate the diffusion. Asthe diffusion process unfolds, the set of nodes who adopt theproduct at each time step, t, referred to as the “active” nodes,influence their peers through recommendations. These rec-ommendations cause their neighbors to consider whether ornot to adopt the product. The adoption function can take anyform including any of the functions described in the back-ground section, but throughout the following discussion wewill assume an independent cascade process. Thus each ac-tive node u in time step t has a single chance of activating apeer v that has not already adopted the product where it suc-ceeds with probability p(u, v), which will result in v adopt-ing the product. Once node u attempts to activate an inactivenode v, it can never attempt to activate node v, in any futuretime step, i.e., node u will return to an inactive but adoptedstate after this time step. Given the set of active neighborsNt(v) of a given inactive node v at time t, the posterior prob-ability of v adopting the product at time t+1 can be definedas pt+1(v, xc|Nt(v)) = 1 −

u∈Nt(v)(1 − p(u, v)). When

a node adopts the product, it becomes active, and starts acti-vating its currently inactive neighbors at future time points.

Figure 4: Heat map of the average number of diggs for dif-ferent values of topic divergence between peers across time.

The diffusion process continues until no further adoptionsoccur for the current product.

At the end of each campaign, the confidence valuesamong peers are updated according to the outcome of theproduct recommendation across the corresponding edge. Wedenote by t∗i (v) the time step within campaign i at which anode v adopts the product. If a given node u ends up notadopting the product by the end of campaign i, t∗i (u) is setto ∞. Using a kernel function K, the change in confidencevalues at the end of campaign i for product xc can be calcu-lated as ∆Wi+1 = K(Wi; θ), where θ ∈ [0, 1] is a kernelparameter specifying the rate of change. For instance, a lin-ear kernel can be defined as:

KL(Wi; θ) ={

θ × 1−wi(u,v)t∗i(v)−t∗

i(u)+1 , t∗i (u) < ∞∧ t∗i (v) < ∞

θ × −wi(u,v)tmax

i(v)−t∗

i(u)+1 , t∗i (u) < ∞∧ t∗i (v) = ∞

where tmaxi (v) = maxt∗

i{t∗i (u) : (u, v) ∈ E ∧ t∗i (u) < ∞}

represents the time of the last adoption by any of v’s peers.This linear kernel assigns credit to each peer u of a node v

proportional to the elapsed time between that peer’s recom-mendation and node v adopting the product. The intuition isthat the node u, that last recommended the product, has thehighest impact for influencing node v to adopt the product,and thus should be assigned higher confidence in her futurerecommendations to v. If node v ends up not adopting theproduct by the end of the campaign, each peer u who rec-ommended the product to node v is penalized relative to thetime of the last recommendation. In this case, the last per-son to recommend the product, even though v still has notadopted it and will not adopt it, gets the maximum penaltyfor their recommendation.

We can use different types of kernels to control the dy-namics of the confidence levels in the network. For instance,this kernel could be exchanged with a kernel where only thelast node to provide a recommendation is penalized or re-warded, as opposed to all nodes, or one where all nodes arepunished or rewarded equally. Regardless, as a new cam-paign is initiated for a different product, the new, updated

confidence values are used to compute the influence proba-bilities, thus enabling the model to capture the dynamics ofthe diffusion process across different product types.

Experimental Evaluation

To test our proposed model, we used the first four monthsof interactions, i.e., diggs and submissions, on the Diggnetwork as training data to learn the confidence values be-tween different users, and we used the last two months forevaluation. We use the action of “digging” a story as aproxy for product adoption, and the topic distribution ofusers’ submissions to estimate their preferences. Startingfrom a uniform assignment of confidence values across allpeers, we track the propagation of user diggs, and updatethe corresponding confidence values according to the pro-posed model. We use the learned values along with the userpreferences to predict adoptions for new stories.

We compare our approach with two proposed approachesin (Goval, Bonchi, and Lakshmanan 2010) for learning theinfluence probabilities from training data. In the first ap-proach (Bernoulli), they consider each recommendation aseparate Bernoulli trial, and then estimate the confidence be-tween two users as the maximum likelihood estimate (MLE)of the ratio of successful recommendations over the totalnumber within a given contagion time. In the second pro-posed approach (Bernoulli-PC), they use the same Bernoullirepresentation but in this approach they give partial creditfor each product adoption based to the set of peers who rec-ommended the product within a given time frame. Althoughboth approaches have comparable performance, Goval et al.show that introducing the notion of “contagion time” as afactor in estimating the influence probability outperformsstatic methods and yields more accurate results.

The above method utilizes a threshold adoption rule as op-posed to the cascade rule that we utilize in our model (Adap-tive). We can convert between these two models; as shownby Kempe et al. (Kempe, Kleinberg, and Tardos 2003),the independent cascade model is equivalent to a thresholdmodel where the adoption threshold is set to the posteriorprobability of adoption; i.e. for a given user v, if we setθv = 1 −

u∈N(v)(1 − p(u, v)), the threshold model is

equivalent to the independent cascade model. We use thisconversion to facilitate in-depth evaluation of our model.We compare the different models by means of ROC curves,which are more appropriate than precision-recall curves inthis setting (Provost, Fawcett, and Kohavi 1998). The ROCcurve shows the relative trade-offs between the true positives(correctly identified adoptions) and the false positives (unre-alized predicted adoptions) as the discrimination thresholdis varied. Each point in the ROC curve corresponds to onepossible value of activation threshold for the users.

Figure 5 illustrates the performance of all three modelsusing ROC curves where the x-axis is the false positiverate (FPR) and the y-axis is the true positive rate (TPR).Our proposed model (Adaptive) outperforms both baselines(Bernoulli and Bernoulli-PC), yielding higher true positiverates at low values of false positives. We also experimentedwith using a predictor that ignores the peer-influence alto-

��� ��� ��� ��� ��� ��� ��� �� �� ��� ����

���

���

���

���

���

���

��

��

���

� ������

���������

������������

���������������

�������������

Figure 5: ROC performance of two comparison mod-els (Bernoulli and Bernoulli-PC) and the proposed model(Adaptive) on the basis of the False Positive Rate (FPR) andTrue Positive Rate (TPR) for each model.

gether and relies only on the stories that were promoted tothe “top stories” section in Digg.com. This popularity-basedpredictor yielded an accuracy of 45.7%, which is lower thanrandom prediction, indicating that individuals’ connectionsand interactions with their content preferences are more im-portant factors than the overall popularity.

These results show that by modeling the dynamics of thediffusion process at a finer-grained level, taking into accountthe heterogeneity of users and the dynamics of the socialnetwork, it is possible to create a model which outperformsa more naı̈ve model. This in turn leads to a better under-standing of the whole diffusion process. In the next sectionwe discuss the implications of our model for existing viralmarketing strategies, and suggest a new strategy that bettercaptures our findings.

Adaptive Viral Marketing

One of the main implications of our model is a better under-standing of the effects of existing viral marketing strategieson social networks in the long term. Our model suggeststhat user recommendations are most effective when recom-mended to the right subset of friends. If a user is very selec-tive and makes each recommendation to only a few friends,then the chances of success are slim due to limited networkexposure. On the other hand, recommending a product toeveryone may have limited returns as well, due to the ef-fect of irrelevant recommendations on the confidence levelsbetween peers. From the perspective of a brand manager in-terested in maximizing the diffusion of recommendations, itis important to provide incentives to encourage the right bal-ance between reaching as many users as possible and at thesame time targeting the most appropriate consumers.

Given this dilemma, a natural question to ask is: whatis the appropriate mechanism to maximize both spread andadoption of recommendations? We propose an “adaptiverewards” solution, where instead of rewarding an individualbased only on successful recommendations, the reward isbased on successful and unsuccessful recommendations.

� ��� ��� ��� ��� ���

��

���

���

���

���

���

���

��

��

���

����

� ��

� ����

� ����

� �����

� ��

��������

������� �� ����

(a) Adoption Rate

� ��� ��� ��� ��� ���

���

���

���

���

���

���

��

��

���

� ��

� ����

� ����

� �����

� ��

��������

����� ������ ���

(b) Confidence Level

Figure 6: Effect of varying the conservation parameter α

Suppose a user v, with pv peers in the social network, ischosen to start the campaign for a certain product. Assumeonly mv of her peers have high preference for that specificproduct category. Then, whenever a recommendation is suc-cessful (a purchase based on a recommendation is carriedout), user v gets rewarded (α × r), whereas if the recom-mendation is unsuccessful, v gets penalized ((1 − α) × r),where α is a conservation parameter, varying from 0 to 1,with 0 representing fully conservative behavior and 1 repre-senting fully nonconservative behavior.

According to the classic viral marketing mechanism,where users only receive rewards for adoptions and nopenalties for the lack of adoptions, there is no reason fora user v to be selective in the choice of whom to recom-mend the product to. In many cases a user will know whichsubset of her peers are the most probable ones to purchase agiven product, based on their knowledge of their peers’ pref-erences. However, there still exists a slight chance for any ofv’s peers to purchase the product, including those that do nothave a preference for the product, and there is no punishmentfor failed recommendations. Thus, the expected reward thatuser v will acquire through sending recommendations to allher peers is greater than or equal to the reward she would re-ceive if she uses a more selective strategy under the classicviral marketing reward mechanism.

However, by utilizing the proposed adaptive rewardsmechanism, there is an explicit penalty for unsuccessfulrecommendations. Following the same setup, if individ-ual v chooses to be selective in recommending the product,thus sending the recommendations only to the interested mv

connections, her expected reward will be (r × α × mv).However, if v chooses to follow a nonconservative strat-egy, the expected reward is decreased by a penalty rel-ative to her unsuccessful recommendations and becomes(r × (α × mv − (1 − α) × (pv − mv))). Tuning the con-servation parameter α allows us to experiment with differentmechanisms and their effect on product success and overallconfidence levels.

Despite the fact that the main benefits of our proposedstrategy appears on the network level through reducing thespamming behavior within the social network, it also car-ries an advantage for individuals by maximizing their re-

wards over time. While the users have different preferencesfor different product categories, their judgment in the confi-dence of their peers is evaluated on an aggregate level. So, ifan individual chooses to engage in spamming behavior, thiswill lead to increased resistance by her peers to any futurerecommendation they receive from her, regardless of theirpreference for the product category, thus decreasing that in-dividual’s future rewards significantly. As a result, by usingour proposed method, individuals must face the penalty ofspamming behavior explicitly, and as a result they will bemore likely to follow a strategy which will maintain theirpeers’ confidences in them in the long run, and therefore in-crease their long term reward.

To test the proposed viral marketing strategy, we use anagent-based model to simulate the behavior of users in dif-ferent settings. First, we generate a synthetic network usingpreferential attachment (Barabasi and Albert 1999). We usetwo modes of experiment where we allow the agents to ei-ther observe the preference values of their peers before mak-ing a recommendation, or learning these preference accord-ing to the peer’s response to the recommended products. Themain objective of each agent is to maximize its expected re-wards according to the utilized strategy. Using our proposedadaptive diffusion model, we simulate the diffusion of 500product campaigns for 5 different categories. We use a linearkernel for adjusting the confidence levels between peers.

Figure 6 shows that by decreasing the value of α, en-couraging users to be more conservative in their decisions,the rate of decline in the average confidence level betweenpeers decreases. However, as a side effect of being moreconservative, the spread of the products decreases as well.This is illustrated by the fact that the adoption rate is alwayslower for lower levels of α in the early campaigns, and forvery low values of α the adoption rate is always low, but forhigher values of α, the adoption rate declines substantially inlater campaigns due to the rapid decrease in confidence lev-els between peers. In fact, utilizing intermediate values forα (e.g. α = 0.5, corresponding to equal chances of rewardand penalty) consistently maintains high adoption rates andhigh overall confidence even over a large number of market-ing campaigns. We tested the robustness of this result byvarying the number of product categories and the size of the

20%

40%

60%

80%

100%

do

pti

on

per

cen

tage

α = 0 α = 0.25

α = 0.5 α = 0.75

α = 1

0%

20%

40%

60%

80%

100%

0 100 200 300 400 500

Ad

op

tio

n p

erce

nta

ge

Campaign

α = 0 α = 0.25

α = 0.5 α = 0.75

α = 1

(a) Adoption Rate

20%

40%

60%

80%

100%

rag

e con

fid

ence

lev

el

α α

0%

20%

40%

60%

80%

100%

0 100 200 300 400 500

Av

era

ge

con

fid

ence

lev

el

Campaign

α = 0 α = 0.25

α = 0.5 α = 0.75

α = 1

(b) Confidence Level

Figure 7: Effect of allowing individuals to learn the preferences of their peers

initial seeding set. The same conclusion holds across all ofthese changes in the parameters of the systems.

In real settings, users do not necessarily know the prefer-ences of their peers in advance, but rather learn them throughpeers’ responses to different recommendations. To accountfor this more realistic situation, we give agents the abilityto learn the preferences of their peers instead of directly ob-serving them. At each time step, if the agent decides to rec-ommend a product to one of its peers, it stores whether or notthat peer adopted the product. Then, when deciding whetheror not to make a recommendation in the future, the agentuses the stored outcomes to estimate that peer’s preferencetoward different product categories.

The basic hypothesis is that the adoption rate will gener-ally rise over the direct observation case, due to the fact thatthe agents inference of their peers’ preferences also takesinto account the confidence levels, since the peers’ responseto recommendations account for both factors. This informa-tion is not contained in the direct observation of peer prefer-ences’ and since it is the composite of confidence and pref-erence that determines actual adoption, the agents are betterable to predict their peers’ adoptions. This indicates thatthe adaptive rewards mechanism may work even better incontexts when individuals do not have perfect knowledge oftheir peers’ preference but must instead learn both the pref-erence and confidence levels from observing past behavior.Moreover, as shown in Figure 7, for moderate values of α,the performance of the proposed strategy is remarkably bet-ter than low and high levels of α, in terms of both productadoption and maintaining confidence levels in the network,which indicates that encouraging agents to target a smallsubset of their peers is the optimal strategy.

In order to analyze our model, we carried out another ex-periment where we manually inserted a set of spammers intothe network. A spammer in our model forwards recommen-dations for any product it adopts to all its peers, regardlessof their preferences. We set (α = 0.5) for the rest of theusers, and examined various numbers of seeded spammers.

As illustrated in Figure 8, the agents in the network wereable to identify the spamming agents after a relatively smallnumber of campaigns, dropping their confidence in them.The effect of spamming behavior is obvious in this figurethrough the decreased adoption rate as the percentage of

spammers present in the network is increased, but the col-lective behavior of the non-spammer agents maintains theconfidence level among trusted peers, while removing anyconfidence in spammers. This minimizes the effect of thespamming behavior on the adoption rates over time.

Conclusion and Future Work

In this work, we provided insight into the effect of network-level dynamics and individual heterogeneity on the diffusionprocess in real-world networks. Utilizing a sample of users’interactions on the Digg.com social news website, we ana-lyzed the effect of peers’ confidence in each other’s recom-mendations on the adoption of different products over time.We presented an adaptive diffusion model that is able to cap-ture the observed properties, and showed that it outperformsearlier non-adaptive models in predicting future adoptions.

By analyzing the implications of our proposed model forexisting viral marketing strategies, we illustrated that mostexisting strategies focus on maximizing the product spreadwithin each campaign, but fail to account for the long-termeffects that spamming behavior can have on the underlyingsocial network across campaigns. We then introduced a newviral marketing strategy based on our proposed adaptive dif-fusion model, that accounts for the social network dynamicsacross different product campaigns. Our experiments haveshown that the proposed adaptive viral marketing strategy isable to account for the changes in peers’ confidence acrossmultiple campaigns, maintaining higher levels of productadoptions than those attained by classic strategies in the longterm. We also showed that the proposed adaptive strategy isless prone to spamming behavior.

We believe one major application of our work is in iden-tifying influentials. Our model suggests that using onlystructural-based measures for determining influentials ig-nore individual behavior, and may lead to decreased efficacyof these strategies in the long run if the chosen individualturn out to be engaged in spamming behavior. One direc-tion for future work is incorporating peer-confidence, by an-alyzing past interactions, into the process of identifying in-fluentials. Other directions for future work include analyz-ing the dynamics of change in individual-level preferences,and whether these changes result from peer influence (con-tagion) or other external factors.

20%

40%

60%

80%

100%

do

pti

on

Percen

tag

e

10% Spammers

25% Spammers

50% Spammers

0%

20%

40%

60%

80%

100%

0 100 200 300 400 500

Ad

op

tio

n P

ercen

tag

e

Campaign

10% Spammers

25% Spammers

50% Spammers

(a) Adoption Rate (b) Confidence Level

Figure 8: Varying the percentage of spammers at (α = 0.5)

ReferencesAlbert, R.; Jeong, H.; and Barabasi, A. 2000. Error andattack tolerance of complex networks. Nature 406:378 –382.

Barabasi, A. L., and Albert, R. 1999. Emergence of scalingin random networks. Science 285(5439):509 – 512.

Bass, F. 1969. A new product growth for model consumerdurables. Management Science 15(5):215 – 227.

Centola, D., and Macy, M. 2005. Complex contagion andthe weakness of long ties. American Journal of Sociology.

Christakis, N. A., and Fowler, J. H. 2007. The spread ofobesity in a large social network over 32 years. New EnglandJournal of Medicine 357:370 – 379.

Dodds, P. S., and Watts, D. J. 2005. A generalized modelof social and biological contagion. Journal of TheoreticalBiology 232:587 – 604.

Domingos, P., and Richardson, M. 2001. Mining thenetwork value of customers. In Proceedings of the Sev-enth ACM SIGKDD International Conference on Knowl-edge Discovery and Data Mining (KDD).

Domingos, P. 2005. Mining social networks for viral mar-keting. IEEE Intelligent Systems 20(1):80 – 82.

Drehmann, M.; Oechssler, J.; and Roider, A. 2005. Herdingand contrarian behavior in financial markets : An internetexperiment. American Economic Review 95(5):1403 – 1426.

Golbeck, J., ed. 2009. Computing with Social Trust.Springer.

Goldenberg, J.; Libai, B.; and Muller, E. 2001. Talk of thenetwork: A complex systems look at the underlying processof word-of-mouth. Marketing Letters 3(12):211 – 223.

Goval, A.; Bonchi, F.; and Lakshmanan, L. V. S. 2010.Learning influence probabilities in social networks. In Pro-ceedings of the Third ACM International Conference on WebSearch and Data Mining (WSDM).

Granovetter, M. 1978. Threshold models of collective be-havior. American Journal of Sociology 83(6):1420 – 1443.

Holme, P., and Newman, M. E. J. 2006. Nonequilibriumphase transition in the coevolution of networks and opinions.Physical Review E 74.

Jurvetson, S. 2000. What exactly is viral marketing? RedHerring 110 – 111.

Kempe, D.; Kleinberg, J.; and Tardos, E. 2003. Maximiz-ing the spread of influence in a social network. In Proceed-ings of the Ninth ACM SIGKDD International Conferenceon Knowledge Discovery and Data Mining (KDD).

Krackhardt, D. 1996. Structural leverage in marketing. Net-works in Marketing 50 – 59.

Leskovec, J.; Adamic, L.; and Huberman, B. 2007. Thedynamics of viral marketing. ACM Transactions on the Web.

Leskovec, J.; Singh, A.; and Kleinberg, J. 2006. Pat-terns of influence in a recommendation network. In Pacific-Asia Conference on Knowledge Discovery and Data Mining(PAKDD).

Mahajan, V.; Muller, E.; and Bass, F. 1990. New productdiffusion models in marketing: A review and directions forresearch. The Journal of Marketing 54(1):1–26.

Provost, F. J.; Fawcett, T.; and Kohavi, R. 1998. The caseagainst accuracy estimation for comparing induction algo-rithms. In Proceedings of the Fifteenth International Con-ference on Machine Learning (ICML).

Richardson, M., and Domingos, P. 2002. Miningknowledge-sharing sites for viral marketing. In the EighthACM SIGKDD International Conference on KnowledgeDiscovery and Data Mining (KDD).

Ryan, B., and Gross, N. 1943. The diffusion of hybrid seedcorn in two Iowa communities. Rural sociology 8(1):15–24.

Schelling, T. C. 1978. Micromotives and macrobehavior.Norton.

Stonedahl, F.; Rand, W.; and Wilensky, U. 2010. Evolvingviral marketing strategies. In Proceedings of the 12th annualconference on Genetic and evolutionary computation, 1195–1202. ACM.

Wasserman, A., and Faust, K. 1994. Social Network Analy-sis. Cambridge University Press.

Welch, I. 2000. Herding among security analysts. Journalof Financial Economics 58:369 – 396.

Wu, F., and Huberman, B. A. 2004. Social structure andopinion formation. Computational Economics.