TY - JOUR
T1 - Social diffusion sources can escape detection
AU - Waniek, Marcin
AU - Holme, Petter
AU - Cebrian, Manuel
AU - Rahwan, Talal
N1 - Publisher Copyright:
© 2022 The Authors
PY - 2022/9/16
Y1 - 2022/9/16
N2 - Influencing others through social networks is fundamental to all human societies. Whether this happens through the diffusion of rumors, opinions, or viruses, identifying the diffusion source (i.e., the person that initiated it) is a problem that has attracted much research interest. Nevertheless, existing literature has ignored the possibility that the source might strategically modify the network structure (by rewiring links or introducing fake nodes) to escape detection. Here, without restricting our analysis to any particular diffusion scenario, we close this gap by evaluating two mechanisms that hide the source—one stemming from the source's actions, the other from the network structure itself. This reveals that sources can easily escape detection, and that removing links is far more effective than introducing fake nodes. Thus, efforts should focus on exposing concealed ties rather than planted entities; such exposure would drastically improve our chances of detecting the diffusion source.
AB - Influencing others through social networks is fundamental to all human societies. Whether this happens through the diffusion of rumors, opinions, or viruses, identifying the diffusion source (i.e., the person that initiated it) is a problem that has attracted much research interest. Nevertheless, existing literature has ignored the possibility that the source might strategically modify the network structure (by rewiring links or introducing fake nodes) to escape detection. Here, without restricting our analysis to any particular diffusion scenario, we close this gap by evaluating two mechanisms that hide the source—one stemming from the source's actions, the other from the network structure itself. This reveals that sources can easily escape detection, and that removing links is far more effective than introducing fake nodes. Thus, efforts should focus on exposing concealed ties rather than planted entities; such exposure would drastically improve our chances of detecting the diffusion source.
KW - Applied sciences
KW - Computer science
KW - Computer systems organization
KW - Internet
KW - Internet-based information systems
KW - Social sciences
UR - http://www.scopus.com/inward/record.url?scp=85137282678&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85137282678&partnerID=8YFLogxK
U2 - 10.1016/j.isci.2022.104956
DO - 10.1016/j.isci.2022.104956
M3 - Article
AN - SCOPUS:85137282678
SN - 2589-0042
VL - 25
JO - iScience
JF - iScience
IS - 9
M1 - 104956
ER -