skip to main content
research-article

On the Aggression Diffusion Modeling and Minimization in Twitter

Published:09 December 2021Publication History
Skip Abstract Section

Abstract

Aggression in online social networks has been studied mostly from the perspective of machine learning, which detects such behavior in a static context. However, the way aggression diffuses in the network has received little attention as it embeds modeling challenges. In fact, modeling how aggression propagates from one user to another is an important research topic, since it can enable effective aggression monitoring, especially in media platforms, which up to now apply simplistic user blocking techniques.

In this article, we address aggression propagation modeling and minimization in Twitter, since it is a popular microblogging platform at which aggression had several onsets. We propose various methods building on two well-known diffusion models, Independent Cascade (IC) and Linear Threshold (LT), to study the aggression evolution in the social network. We experimentally investigate how well each method can model aggression propagation using real Twitter data, while varying parameters, such as seed users selection, graph edge weighting, users’ activation timing, and so on. It is found that the best performing strategies are the ones to select seed users with a degree-based approach, weigh user edges based on their social circles’ overlaps, and activate users according to their aggression levels. We further employ the best performing models to predict which ordinary real users could become aggressive (and vice versa) in the future, and achieve up to AUC = 0.89 in this prediction task. Finally, we investigate aggression minimization by launching competitive cascades to “inform” and “heal” aggressors. We show that IC and LT models can be used in aggression minimization, providing less intrusive alternatives to the blocking techniques currently employed by Twitter.

References

  1. Johnie J. Allen and Craig A. Anderson. 2017. General aggression model. The International Encyclopedia of Media Effects. Wiley, New York, 1–15.Google ScholarGoogle Scholar
  2. Rajesh Basak, Shamik Sural, Niloy Ganguly, and Soumya K. Ghosh. 2019. Online public shaming on Twitter: Detection, analysis, and mitigation. IEEE Trans. Comput. Soc. Syst. 6, 2 (2019), 208–220.Google ScholarGoogle ScholarCross RefCross Ref
  3. Allan Borodin, Yuval Filmus, and Joel Oren. 2010. Threshold models for competitive influence in social networks. In Proceedings of the International Workshop on Internet and Network Economics. Springer, 539–550.Google ScholarGoogle ScholarCross RefCross Ref
  4. Ceren Budak, Divyakant Agrawal, and Amr El Abbadi. 2011. Limiting the spread of misinformation in social networks. In Proceedings of the 20th International Conference on World Wide Web. ACM, 665–674.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, and Athena Vakali. 2017. Mean birds: Detecting aggression and bullying on Twitter. In Proceedings of the ACM on Web Science Conference. ACM, 13–22.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali, and Nicolas Kourtellis. 2019. Detecting cyberbullying and cyberaggression in social media. ACM Trans. Web 13, 3 (2019), 1–51.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Ning Chen. 2009. On the approximability of influence in social networks. SIAM J. Discrete Math. 23, 3 (2009), 1400–1415.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Wei Chen, Yajun Wang, and Siyu Yang. 2009. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 199–208.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Lucie Corcoran, Conor Guckin, and Garry Prentice. 2015. Cyberbullying or cyber aggression? A review of existing definitions of cyber-based peer-to-peer aggression. Societies 5, 2 (2015), 245–255.Google ScholarGoogle ScholarCross RefCross Ref
  10. Thomas Davidson, Dana Warmsley, Michael Macy, and Ingmar Weber. 2017. Automated hate speech detection and the problem of offensive language. In Proceedings of the 11th International AAAI Conference on Web and Social Media.Google ScholarGoogle Scholar
  11. Pedro Domingos and Matt Richardson. 2001. Mining the network value of customers. In Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 57–66.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Juan Fernández-Gracia, Krzysztof Suchecki, José J. Ramasco, Maxi San Miguel, and Víctor M. Eguíluz. 2014. Is the voter model a model for voters?Phys. Rev. Lett. 112, 15 (2014), 158701.Google ScholarGoogle ScholarCross RefCross Ref
  13. Antigoni Maria Founta, Constantinos Djouvas, Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Gianluca Stringhini, Athena Vakali, Michael Sirivianos, and Nicolas Kourtellis. 2018. Large scale crowdsourcing and characterization of Twitter abusive behavior. In Proceedings of the 12th International AAAI Conference on Web and Social Media.Google ScholarGoogle Scholar
  14. Xinran He, Guojie Song, Wei Chen, and Qingye Jiang. 2012. Influence blocking maximization in social networks under the competitive linear threshold model. In Proceedings of the SIAM International Conference on Data Mining. SIAM, 463–474.Google ScholarGoogle ScholarCross RefCross Ref
  15. Angela K. Henneberger, Donna L. Coffman, and Scott D. Gest. 2017. The effect of having aggressive friends on aggressive behavior in childhood: Using propensity scores to strengthen causal inference. Soc. Dev. 26, 2 (2017), 295–309.Google ScholarGoogle ScholarCross RefCross Ref
  16. Qianjia Huang, Vivek Kumar Singh, and Pradeep Kumar Atrey. 2014. Cyber bullying detection using social and textual analysis. In Proceedings of the 3rd International Workshop on Socially Aware Multimedia. 3–6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Qingye Jiang, Guojie Song, Cong Gao, Yu Wang, Wenjun Si, and Kunqing Xie. 2011. Simulated annealing-based influence maximization in social networks. In Proceedings of the 25th AAAI Conference on Artificial Intelligence.Google ScholarGoogle Scholar
  18. David Kempe, Jon Kleinberg, and Éva Tardos. 2003. Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 137–146.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Jintae Lee and Younghwa Lee. 2002. A holistic model of computer abuse within organizations. Info. Manage. Comput. Secur. 10, 2 (2002), 57–63.Google ScholarGoogle ScholarCross RefCross Ref
  20. Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance. 2007. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 420–429.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Cheng Long and Raymond Chi-Wing Wong. 2011. Minimizing seed set for viral marketing. In Proceedings of the IEEE 11th International Conference on Data Mining. IEEE, 427–436.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Hao Ma, Haixuan Yang, Michael R. Lyu, and Irwin King. 2008. Mining social networks using heat diffusion processes for marketing candidates selection. In Proceedings of the 17th ACM Conference on Information and Knowledge Management. ACM, 233–242.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Binny Mathew, Ritam Dutt, Pawan Goyal, and Animesh Mukherjee. 2019. Spread of hate speech in online social media. In Proceedings of the 10th ACM Conference on Web Science. 173–182.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Julian J. McAuley and Jure Leskovec. 2012. Learning to discover social circles in ego networks. In Advances in Neural Information Processing Systems, vol. 25. Citeseer, 548–56.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Marko Milosavljević and Sally Broughton Micova. 2016. Banning, blocking and boosting: Twitter’s solo-regulation of expression. Media Studies 7, 13 (2016).Google ScholarGoogle Scholar
  26. Flaviano Morone and Hernán A. Makse. 2015. Influence maximization in complex networks through optimal percolation. Nature 524, 7563 (2015), 65–68.Google ScholarGoogle Scholar
  27. B. Aditya Prakash, Deepayan Chakrabarti, Nicholas C. Valler, Michalis Faloutsos, and Christos Faloutsos. 2012. Threshold conditions for arbitrary cascade models on arbitrary networks. Knowl. Info. Syst. 33, 3 (2012), 549–575.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Matthew Richardson and Pedro Domingos. 2002. Mining knowledge-sharing sites for viral marketing. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 61–70.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Kevin C. Runions and Michal Bak. 2015. Online moral disengagement, cyberbullying, and cyber-aggression. Cyberpsychol. Behav. Soc. Netw. 18, 7 (2015), 400–405.Google ScholarGoogle ScholarCross RefCross Ref
  30. Peter K. Smith, Jess Mahdavi, Manuel Carvalho, Sonja Fisher, Shanette Russell, and Neil Tippett. 2008. Cyberbullying: Its nature and impact in secondary school pupils. J. Child Psychol. Psychiatry 49, 4 (2008), 376–385.Google ScholarGoogle ScholarCross RefCross Ref
  31. Anna Squicciarini, Sarah Rajtmajer, Y. Liu, and Christopher Griffin. 2015. Identification and characterization of cyberbullying dynamics in an online social network. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. 280–285.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Chrysoula Terizi, Despoina Chatzakou, Evaggelia Pitoura, Panayiotis Tsaparas, and Nicolas Kourtellis. 2021. Modeling aggression propagation on social media. Online Soc. Netw. Media: Special Issue on Online Harms 24 (2021), 100137.Google ScholarGoogle ScholarCross RefCross Ref
  33. Guangmo Tong, Weili Wu, Shaojie Tang, and Ding-Zhu Du. 2017. Adaptive influence maximization in dynamic social networks. IEEE/ACM Trans. Netw. 25, 1 (2017), 112–125.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Hanghang Tong, B. Aditya Prakash, Tina Eliassi-Rad, Michalis Faloutsos, and Christos Faloutsos. 2012. Gelling, and melting, large graphs by edge manipulation. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management. ACM, 245–254.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Hanghang Tong, B. Aditya Prakash, Charalampos Tsourakakis, Tina Eliassi-Rad, Christos Faloutsos, and Duen Horng Chau. 2010. On the vulnerability of large graphs. In Proceedings of the IEEE International Conference on Data Mining. IEEE, 1091–1096.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Daniel Trpevski, Wallace K. S. Tang, and Ljupco Kocarev. 2010. Model for rumor spreading over networks. Phys. Rev. E 81, 5 (2010), 056102.Google ScholarGoogle ScholarCross RefCross Ref
  37. Yang Wang, Deepayan Chakrabarti, Chenxi Wang, and Christos Faloutsos. 2003. Epidemic spreading in real networks: An eigenvalue viewpoint. In Proceedings of the 22nd International Symposium on Reliable Distributed Systems. IEEE, 25–34.Google ScholarGoogle ScholarCross RefCross Ref
  38. Zeerak Waseem and Dirk Hovy. 2016. Hateful symbols or hateful people? Predictive features for hate speech detection on Twitter. In Proceedings of the NAACL Student Research Workshop. 88–93.Google ScholarGoogle ScholarCross RefCross Ref
  39. Peng Wu and Li Pan. 2017. Scalable influence blocking maximization in social networks under competitive independent cascade models. Comput. Netw. 123 (2017), 38–50.Google ScholarGoogle ScholarCross RefCross Ref
  40. Savvas Zannettou, Barry Bradlyn, Emiliano De Cristofaro, Haewoon Kwak, Michael Sirivianos, Gianluca Stringini, and Jeremy Blackburn. 2018. What is gab: A bastion of free speech or an alt-right echo chamber. In Proceedings of the Web Conference. 1007–1014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Huiyuan Zhang, Huiling Zhang, Xiang Li, and My T. Thai. 2015. Limiting the spread of misinformation while effectively raising awareness in social networks. In Proceedings of the International Conference on Computational Social Networks. Springer, 35–47.Google ScholarGoogle Scholar
  42. Adam G. Zimmerman and Gabriel J. Ybarra. 2016. Online aggression: The influences of anonymity and social modeling.Psychol. Pop. Media Cult. 5, 2 (2016), 181.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. On the Aggression Diffusion Modeling and Minimization in Twitter

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Article Metrics

        • Downloads (Last 12 months)60
        • Downloads (Last 6 weeks)8

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!