What counts as a weak tie? A comparison of filtering techniques to analyze co-exposure networks

Subhayan Mukerjee, Tian Yang, Georg Stadler, Sandra González-Bailón

Research output: Contribution to journalArticlepeer-review

Abstract

Co-exposure networks offer a useful tool for analyzing audience behavior. In these networks, nodes are sources of information and ties measure the strength of audience overlap. Past research has used this method to analyze exposure to content on social media and the web. However, we still lack a systematic assessment of how different choices in the construction of these networks impact the results. Here we evaluate three different filtering rules that have been used in the literature to eliminate noise in raw data and identify the strongest connections (i.e., those above a certain weight). Moreover, we also provide a mathematical heuristic to choose the optimal threshold. To illustrate our approach, we use two observed networks measuring co-exposure to news sources on the web. We then formulate the problem of filtering the networks as a trade-off between network sparsity (i.e., the need to remove the weakest ties) and connectedness (i.e., the need to preserve the observed connectivity). Our mathematical approach resolves this problem by finding the threshold that maximizes the number of edges removed while minimizing the number of nodes becoming isolates. This analytical technique is generalizable and can be applied to the analysis of any weighted structure that requires solving a similar trade-off between network measures.

Original languageEnglish (US)
Pages (from-to)386-393
Number of pages8
JournalSocial Networks
Volume68
DOIs
StatePublished - Jan 2022

Keywords

  • L-curve method
  • co-exposure networks
  • thresholding
  • weighted graphs

ASJC Scopus subject areas

  • Anthropology
  • Sociology and Political Science
  • General Social Sciences
  • General Psychology

Fingerprint

Dive into the research topics of 'What counts as a weak tie? A comparison of filtering techniques to analyze co-exposure networks'. Together they form a unique fingerprint.

Cite this