Distinguishing between Personal Preferences and Social Influence in Online Activity Feeds
Many online social networks thrive on automatic sharing of friends' activities to a user through activity feeds, which may influence the user's next actions. However, identifying such social influence is tricky because these activities are simultaneo…
Authors: Amit Sharma, Dan Cosley
Distinguishing between P er sonal Preferences and Social Influence in Online Activity Feeds Amit Sharma Dept. of Computer Science Cornell Uni versity Ithaca, NY 14853 USA asharma@cs.cornell.edu Dan Cosley Information Science Cornell Uni versity Ithaca, NY 14853 USA drc44@cornell.edu ABSTRA CT Many online social networks thriv e on automatic sharing of friends’ acti vities to a user through acti vity feeds, which may influence the user’ s next actions. Howe ver , identifying such social influence is tricky because these activities are simulta- neously impacted by influence and homophily . W e propose a statistical procedure that uses commonly av ailable network and observ ational data about people’ s actions to estimate the extent of cop y-influence—mimicking others’ actions that ap- pear in a feed. W e assume that non-friends don’t influence users; thus, comparing how a user’ s activity correlates with friends versus non-friends who hav e similar preferences can help tease out the effect of cop y-influence. Experiments on datasets from multiple social networks show that estimates that don’t account for homophily overestimate copy-influence by varying, often large amounts. Further , copy-influence estimates fall below 1% of total actions in all networks: most people, and almost all actions, are not af- fected by the feed. Our results question common perceptions around the e xtent of copy-influence in online social networks and suggest improvements to diffusion and recommendation models. A uthor Ke ywor ds Influence; Preferences; Homophily; Social Networks; Activity Feed A CM Classification Keyw ords H.1.2 Models and Principles: User/Machine Systems— Hu- man F actors INTRODUCTION In many social media, people consume and giv e feedback on items. For example, on Last.fm, people express their prefer- ences for songs by listening to or loving them. These actions are shared to their friends or followers through an acti vity feed that aggregates the actions of a user’ s friends. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial adv antage and that copies bear this notice and the full cita- tion on the first page. Copyrights for components of this work owned by others than A CM must be honored. Abstracting with credit is permitted. T o copy otherwise, or re- publish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org. CSCW ’16 , February 27-March 02, 2016, San Francisco, CA, USA © 2016 A CM. ISBN 978-1-4503-3592-8/16/02...$15.00 DOI: http://dx.doi.org/10.1145/2818048.2819982 A fundamental question in these online social networks is how friends influence people’ s preferences and decisions. Such influence operates through many mechanisms, includ- ing social proof, conformity , mimicry , and personal liking (see [17] for a revie w) and can affect our consumption of in- formation [36, 37], preferences for cultural items [40, 43], adoption of new products [2], behaviors around health [13], and even decisions to vote [11]. Influence has also captured the popular imagination, as a powerful force that makes con- tent spread virally through a social network [26, 16]. Measur- ing the extent of this influence, then, is an important problem in understanding diffusion in social netw orks. In general, observ ational data from social networks, both of- fline and online, do show correlation in friends’ acti vities, or locality in their preferences within a social network [44]. Studies in T witter [39], W ikipedia [19], Flickr [14], and Sec- ond Life [8] consistently find that a user’ s probability of adopting an item increases with the number of friends who hav e done so before. Howe ver , this locality may not be due to social influence be- cause other social processes might also lead to the same cor- relation. Notably , people are more likely to form social ties with people who are similar to them, via the homophily se- lection process [35]. Thus, ev en in the absence of any social influence, underlying similarity between people may lead to observed similarities in their preferences on items that could lead to ov erestimates of social influence. Untangling this knot is a problem that has vex ed sociologists for decades. In general, without either strong assumptions about influence mechanisms (e.g., [45, 34, 15]) or strong knowledge of latent variables that indicate homophily (e.g., [2]), a structural analysis of the causal graphical model [38] encoding influence and homophily shows that distinguishing them is impossible [42]. In this paper , we make principled assumptions about both the influence mechanism and indicators of homophily to de velop a method for identifying influence that is well-suited for con- tinuous activity data from online social networks. Since ac- tivity feeds are a primary interface element in most social net- works that e xpose people to their friends’ updates [47, 33, 10, 7] and facilitate social learning [12, 20], we look specifically at ho w influence might flow through these feeds. That is, we study whether exposure to friends’ activities through an aggregated feed makes a user more likely to copy or mimic them; we call this mechanism copy-influence due to the feed. For indicators of homophily , instead of using demographic or other latent attributes as in Aral et al. [2], we directly use people’ s decisions on items to model their underlying prefer- ences, and look at whether people copy friends’ actions more than we would expect based on their underlying preferences. That is, if a user sees that her friend on Last.fm lov ed a song, does it make her more likely to lov e it as well? Or would she hav e loved it an yways? Our method is based on the observ ation that feeds rarely sho w activity of non-friends to a user . Thus, comparing ho w of- ten a user copies actions from her friends’ feed to how often she copies actions from a simulated feed constructed from ac- tions of a matched set of non-friends with preferences similar to her friends provides a statistical procedure for estimating influence. W e first sho w that this procedure distinguishes copy-influence from preference similarity using semi-synthetic data based on a dataset we collected from Last.fm. W e then apply it to real activity data from Last.fm, Goodreads, Flixster , and Flickr . Our results on this broad range of websites and item domains rev eal three main takeaways about the role of copy-influence in online social networks. First, we find that naive estimates of copy-influence do over - estimate it, often substantially , and that the degree of overes- timation varies widely across datasets and kinds of actions. W e argue that this variation is likely due to differences be- tween sharing networks in characteristics such as the ease of consumption of items, the specific design of the feed, and its role in people’ s use of a site. Second, we find wide individual variation in susceptibility to copy-influence. Such variation extends past work on identify- ing differences in susceptibility [18, 43, 3], and points to the potential of using individual-le vel susceptibility estimates for modeling dif fusion and making more informativ e, persuasive recommendations using social information [43, 31]. Third, we find that the extent of copy-influence is small. Across all domains, less than 1% of people’ s actions can be attributed to copy-influence. Contrary to the popular narra- tiv e on influence, our results join other work in questioning the extent of influence or virality in these networks [27, 24], at least as con veyed through copying others’ observ ed behav- iors in activity feeds. This paper also contributes a way to estimate copy-influence in any network where network connections and timestamped activity data are visible, as well as a large Last.fm dataset. More generally , we see this work as demonstrating the need for sharper definitions of influence that account for both per- sonal preferences and specific mechanisms of influence. RELA TED WORK Mimicry of others’ actions has been demonstrated in con- trolled e xperiments. This can happen at a population lev el, as with Sagalnik et al. ’ s demonstration that making popularity visible causes different songs to become popular compared to the case when no such information is shown [40]. It may be ev en stronger at the individual lev el; Sharma and Cosley showed that trusted friends’ opinions ha ve more influence on people’ s willingness to try unknown items than item popular- ity [43]. Similar results have been sho wn in experiments on online social networks: a user is more likely to share a link on Facebook if it appears in her social feed [9] and to click on an ad if it is endorsed by her friends [6]. Outside of controlled experiments around information con- sumption in real social networks—which may be infeasible, costly , or potentially unethical—identification of influence is not straightforward. Naive measures such as simply count- ing the number of common actions between friends within a giv en time period likely ov erestimate influence [7, 25, 48], as any observed data is simultaneously affected by both influ- ence and homophily . In addition, people may be externally exposed to the same item through forces outside of the social network [19]. For example, two friends may like the same item after watching an advertisement for it. Such e xternal exposure also creates confounds for estimating influence. In line with Shalizi and Thomas’ argument for the need for assumptions about mechanism [42], work on estimating in- fluence from observational data generally makes assumptions about the nature of influence and/or homophily , then uses sta- tistical or computational procedures on those data to simulate contexts where those assumptions don’ t hold. Controlling f or influence The first general strategy is to compare the observ ed data with an alternativ e world with no influence and attribute the dif fer- ences to influence. A core part of such an estimation proce- dure is to obtain, or create, data and network structures for the alternativ e world. Christakis et al. presented an edge-re versal test, where if per - son A has an edge to B but not vice-versa, then comparing B’ s influence on A with that of A on B would giv e us a measure of influence due to the directed edge [15]. This is based on the intuition that influence should flow only one way on directed edges; it also has the adv antage of strongly addressing the effect of homophily . This test was used to examine whether becoming obese is contagious and found that influence is sig- nificantly higher in the direction of the directed edge than the opposite direction. In online contexts like T witter with asym- metric information flows, this could fit well, but in networks with undirected edges, it is not so useful. Another approach by Anagnostopoulos et al. randomizes the order of people’ s actions to remove causal links due to tem- porality between A ’ s and B’ s actions [1]. In the absence of influence, the expected probability of a user acting upon an item given that some number of their friends hav e already done so—called k -exposure [39, 19]—should be the same in the observed data and the time-shuffled data. If it is statis- tically dif ferent, influence is in play . The method was used on a Flickr dataset and showed no significant difference be- tween the two worlds. Still, the authors do not rule out in- fluence, giving examples from their dataset that demonstrate influence effects, and note that their method is unable to make individual-le vel influence estimates. Controlling f or homophily Instead of removing influence, the other main strategy is to control for homophily . For instance, La Fond and Neville use shuffling of social network edges to estimate influence giv en snapshots of people’ s network and activity data at two points in time [32]. They first calculate the a verage ov erlap in activ- ity between friends. T o control for homophily , they subtract the ov erlap in friends’ activity after randomizing the edges between people. T o control for external exposure, they also subtract out the overlap among friends when both edges and actions are randomized. Any difference that one finds then, must be due to influence. Using data on Facebook groups joined by people at two timestamps a year apart, they found that the relativ e ef fect of influence varies: some groups ex- hibited a significant influence effect, while others exhibited a significant homophily effect. Another way to control for homophily is to directly account for its indicators. If we are able to observe attributes such as demographics or other characteristics that affect people’ s preferences, then we can identify influence by controlling for these attributes. Based on this intuition, Aral et al. esti- mated influence effects by comparing adoption rates for pairs of similar users where only one of them had a friend who had adopted the item [2]. Using data from Y ahoo on adoption of a web service and 46 attributes based on personal and network characteristics, they found that most adoption was indepen- dent of influence. A fundamental problem, howe ver , is that their method depends heavily on the careful choice and a vail- ability of attributes that predict similarity . PRELIMINARIES: B ASIS FOR INFLUENCE ESTIMA TION Combining ideas from the above two lines of work, we pro- pose a broadly applicable statistical procedure for estimating the extent of copy-influence in social networks. W e control for homophily using activity data while limiting the time du- ration of exposure to friends’ actions to closely model the mechanism of copy-influence through a feed interface. In this, we make the follo wing key assumptions. Preference as a pr o xy for homophil y T o control for homophily , we borrow from the recommender systems literature [46] and assume that similarity metrics based on past activity are good indicators of underlying ho- mophily . Past acti vity data implicitly captures f actors such as demographics, prior external and social influence, and other hidden factors that determine people’ s preferences on items [30, 41]; it can also be a direct indicator of their current per- sonal preference. In principle, any two people with identical activity histories hav e the same probability of acting on an item in the future, minus any social influence. Using commonly av ailable streams of activity data av oids cost and methodological issues around using panel data col- lected at fixed interv als [34, 45, 32] and allo ws broader appli- cation of the matching technique from Aral et al. [2], which required additional person-lev el and network attributes. Figure 1. A r everse chronological feed of songs loved by friends of a user on Last.fm. For each love action, the name of the song, its artist, and the friend who loved it are shown. This interface is shown as a widget on the home page for each logged-in user , along with a similar widget f or r ecent songs listened to by friends. Limited attention to a rever se chr onological feed T o specify the influence mechanism, we focus on copy- influence from feeds. Feeds are not the only interface ele- ments that might conv ey social influence: profile pages, col- laborativ e filtering or popularity-based lists of items, social explanations of presented content, and out-of-system interac- tion may all conv ey information and perhaps influence from friends. Howe ver , feeds are ubiquitous and commonly stud- ied as con veyors of influence [47, 33, 7]; we argue that they are the dominant feature through which people see and learn from their friends’ behavior in social networks [10, 12], and thus a dominant feature through which influence from spe- cific friends might flow . Further , we assume that the feeds show an unfiltered, re- verse chronological aggregation of friends’ activities. For many networks such as Last.fm, Goodreads, and Flickr , this closely resembles the feed seen by users. For example, Fig- ure 1 sho ws a reverse chronological feed of songs loved by the friends of a user on Last.fm. Still, this is an approximation: feeds can contain advertisements or content from non-friends (e.g., sometimes Facebook presents actions from friends of friends), while algorithmic filtering can hide or reorder items shown in the feed. W e discuss w ays to deal with such filtered feeds later . A simple model for user s’ interaction with feeds The above assumptions lead to a simple model for users’ in- teraction with an acti vity feed. Let us start by formally defin- ing what we mean by a feed within a social network. The term friend refers to anyone whose acti vities are sho wn to the user; these are typically social connections of an individual, such as Facebook friends or T witter followees. W e define the feed to be the aggregated activity of all of a user u ’ s friends presented in rev erse chronological order . W e assume that at the time a user performs an action, she has seen some number M of the friends’ most recent actions in the feed. In contrast to k-e xposure models that implicitly assume people attend to all of their friends’ actions [1, 5], the param- eter M represents a user’ s attention budget for friends’ actions and we argue this more realistically models cop y-influence. Finally , we define copy-actions as actions by a user on itmes that appear in the last M items in her feed (e.g., loving one of the songs in Figure 1 if M > = 3 ). A baseline measure of copy-influence would be the fraction of actions by a user that are copy-actions, as reported in some studies [25, 48, 7]. Howe ver , as argued earlier , that is likely to ov erestimate copy-influence because of underlying homophily and external exposure. ESTIMA TING COPY-INFLUENCE FROM FEEDS T o address these possible confounds, let us now consider a hypothetical feed constructed from users who are not friends with the user . When a user’ s actions are copies of a feed based on non-friends, that is most likely due to following their own preferences or common external exposure. Copy-influence is ruled out because within our model, a user does not see the non-friends’ actions in her feed 1 . This intuition driv es our procedure for estimating copy-influence: if we can find non- friends who are as similar to a user as that user’ s friends, we may use them to approximate the effects of homophily and some kinds of external exposure. Thus, copy-influence can be estimated as the number of copy-actions from the friends’ feed, over and abov e the observed overlap between a user’ s actions and the matched non-friends’ feed. T o compute similarity between users, we consider their past actions on items as a representation of their preferences. This allows us to use similarity metrics on past actions to find non- friends who are as similar in preferences to a user as her ac- tual friends. Note that our selection of non-friends is similar to La Fond and Neville [32], except that instead of choosing non-friends randomly , we use preference similarity to better control for homophily . In addition to controlling for homophily , using matched non- friends also controls for some kinds of external exposure. These would include mass advertisements or widely popular items where an y two users with the same personal preference would be expected to have an equal probability of acting on the item, regardless of the distance between them in the net- work 2 . Preference-based Matched Estimation (PME) Pr ocedure The procedure proceeds in two phases: Matching and Esti- mation . W e divide the data into two parts at a fixed time T , 1 Although direct copy-influence is ruled out, there may still be in- direct, algorithmically mediated influence, such as through recom- mendations or tar geted advertisements as described earlier . Such influence may be important, but our focus here is on the extent of copy-influence. 2 Like other methods, using matched non-friends cannot control for external exposure due to shared context (e.g., when two friends at- tend the same music concert); such o verlap is much harder to distin- guish from activity data alone. performing the matching phase on data before T and the esti- mation phase on data after T . In the matching phase, for each user u we generate a set of non-friends (“similar strangers”) who at time T are as close in preferences to the user as her friends. In the estimation phase, we compute Friends- Overlap, the fraction of u ’ s actions that are copy-actions of a feed based on friends ( F ), and Strangers-Ov erlap, the fraction that are copy-actions of a feed based on the similar strangers ( S ). The extent by which Friends-Overlap is greater than Strangers-Overlap gi ves us a measure of copy-influence. Matching Phase For each friend f of a user u , we find a matching non-friend s using activity data before time T , such that both of the fol- lowing conditions are satisfied: • The similarity between the non-friend s and u is approxi- mately equal to the similarity between f and u . W e com- pute similarity between two users by using the Jaccard measure between their acti vity sets up to time T 3 . Let A ( u ) 0 , T denote the activity set of a user u consisting of all the items she has acted on until time T . Then, we compute the simi- larity between two users u and v as: S im ( u , v ) = J ( A ( u ) 0 , T , A ( v ) 0 , T ) = | A ( u ) 0 , T T A ( v ) 0 , T | | A ( u ) 0 , T S A ( v ) 0 , T | • The number of actions by the non-friend | A ( s ) | is approxi- mately equal to the number of actions by the friend | A ( f ) | , up to time T . Assuming that the rate of acti vity stays the same before and after T , this condition ensures the non- friend and friend are expected to have an equal number of actions that will appear in u ’ s feed after T . T o implement the matching phase, we sample a non-friend randomly without replacement and check whether it matches with an unmatched friend until there are no more unmatched friends left or no more non-friends to choose. W e allow matches to be approximately equal: s is the allowed percent- age difference in similarity and a is the allowed percentage difference in the number of actions between non-friends and friends. Estimation Phase For the data after time T , we compute the percentage of ac- tions taken by u that copied recent actions by either the set of friends ( F ) or similar strangers ( S ) that we computed in the matching phase. Because we assume that people have a finite amount of attention for their feed, we only consider the M most recent actions by the set before each action of u . More formally , let A ( u ) T , ∞ denote u ’ s activity set after time T , and F eed ( u , W ) M denote the most recent M actions taken by a set of users W before u acts on a given item. W e define the 3 W e also tried cosine similarity , which gav e comparable results; in principle, any reasonably efficient and unbiased similarity metric could be used. Overlap between u and the users in W as: Overla p ( u , W ) M = P a ∈ A ( u ) T , ∞ 1 { a ∈ F eed ( u , W ) M } | A ( u ) T , ∞ | where 1 { x } represents the indicator function which is 1 when- ev er x is true and 0 otherwise. The difference in Over la p between a user and her friends (Friends-Overlap) versus the similar strangers (Strangers- Overlap) should give us an estimate of the cop y-influence due to the friends’ activity feed, o ver and above the homophily effects captured by similarity in preferences with the non- friends and any external influences that affect both friends and non-friends. C o py I n f luence u = Overla p ( u , F ) M − Overla p ( u , S ) M The mean of this per -user copy-influence estimate gi ves us an estimate of the extent of copy-influence in a social netw ork. Inter pretation An estimate close to 1 implies that copy-influence is the dom- inant force driving people’ s actions, while an estimate close to zero implies that most of Friends-Ov erlap can be explained by underlying preference similarity . T o measure uncertainty in the mean estimate, we compute the standard error using the bootstrap technique from resampling statistics [23]. 4 The same procedure also provides us per -user estimates for susceptibility to copy-influence. The standard error for the per-user estimate can be calculated by repeating the estima- tion procedure with a ne w selection of non-friends each time. Note that the copy-influence estimate can range between − 1 and 1 . When a user tends to adopt items that are popular outside their ego-network and fe w items from within the net- work, the estimate can be negati ve; we take this as an indi- cator that copy-influence is not present and thus should be considered as zero for that user . V ALID A TION ON SEMI-SYNTHETIC D A T A T o check the efficacy of the procedure in identifying copy- influence, we first run it on simulated worlds based on data from Last.fm where we fix the relativ e effects of copy- influence, personal preference, and external exposure. W e use actual data in the matching phase and activity data sim- ulated by these processes in the estimation phase, similar to the ev aluation strategy used by La F ond and Neville [32]. Describing the Last.fm dataset Last.fm is a music service that records the songs that its users listen to on its website or supported desktop/mobile devices. Users can listen to, love, or ban songs. It also allows users to add other users as friends; both parties have to agree, so these links are undirected. Each user sees the songs listened to and explicitly loved by her friends on the Last.fm homepage, al- lowing us to study the influence effects of both implicit and explicit actions on items. These actions are aggregated and 4 Per-user mean copy-influence estimates are not independent be- cause of how we sample non-friends; thus it may not be appropriate to use the formula for standard error . presented in two rev erse chronologically ordered widgets— one for friends’ lov es and one for listens—in the way our model of copy-influence assumes (see Figure 1). W e used Last.fm’ s API to collect listens, loves, and network data for users. Because the API does not provide timestamps for the creation of friendship links, we run the risk of incor- rectly considering someone as a friend of a user before the actual link was made. T o reduce this problem, we randomly selected 1000 user ids of people who joined before 2010, with the thought that these older members of the system would tend to hav e more stable friend networks. Starting with this seed set, we followed a weighted breadth- first search to obtain other users, adding friends to the search queue weighted by the number of already-found users they were friends with. This weighting resulted in a reasonably well-connected component of the Last.fm social graph. The crawl was completed o ver the months of April-June 2014. 5 In addition to the social network, we collected users’ time- stamped actions on items through February 2014. For loves, we collected the user’ s entire history since they joined; for listening, which is much more frequent, we collected songs they had listened to starting in Nov ember 2013 to keep the dataset size reasonable. The data crawl and subsequent anal- ysis w as judged by Cornell’ s institutional re view board (IRB) as an ex empt research protocol. For both listens and lov es, we filtered out any users with less than 10 actions. T able 1 sho ws some statistics for the data we collected. Although listening is a more frequent activity , the number of users with at least 10 listen actions is fewer than the corresponding number for the love action (T able 1). This is because we collected listening data for only 3 months, so users who were inactiv e during the period will not appear in the listening dataset. Since we collected a sample of the network, some users are missing friends in the dataset. W e fetched the actual number of friends for each user and labeled users that have at least 75% 6 of their friends in the dataset as cor e users . W e apply the PME procedure to only such core users, for whom we hav e a reasonable sample of their total friends. Generating semi-synthetic data The three processes are operationalized as follows: • Copy-influence : Analogous to a re verse chronological feed, a user selects an item at random from a set containing the last M items acted upon by her friends. • Personal preference : First, we select the k most similar users to the current user by comparing the Jaccard simi- larity of their current activity sets. A user then selects an item at random from the last M items acted upon by these k most similar users. W e choose a low value of k = 10 to find a narrow neighborhood of high-similarity users. 5 The full dataset can be accessed at http://www.amitsharma. in/data/lastfm- social- activity.html . 6 W e chose the threshold percentage 75% as a tradeoff between hav- ing a representativ e sample of friends and being too restricti ve for filtering. Results were similar at thresholds of 50, 90 and 100. Process FrOverlap Copy-Inf. Std. Err . Ext. Exposure (EE) 0 . 0001 2 . 4 ∗ 10 − 5 8 . 1 ∗ 10 − 6 Personal Pref. (PP) 0 . 04 0 . 001 0 . 0001 Copy-influence (CI) 1 . 00 0 . 95 0 . 0004 CI-PP (50%-50%) 0 . 53 0 . 51 0 . 0001 CI-PP (10%-90%) 0 . 16 0 . 12 0 . 0001 CI-PP (1%-99%) 0 . 05 0 . 02 0 . 0002 T able 2. Sanity check on the proposed PME procedur e using loves on songs, showing Friends-Overlap, the copy-influence estimate, and the standard error of the estimate for each process. Each dataset simulates either external exposure, personal preference, copy-influence, or a mix- ture of personal prefer ence and copy-influence. The PME procedure correctly does not ascribe most of the copy-actions in the homophily and external exposure processes to copy-influence. For mixtures in volv- ing copy-influence, the procedur e retrieves the true probability of copy- influence with a lower error than Friends-Ov erlap. • External exposure : W e model such e xposure by assuming that a user randomly selects the next item to act upon from the set of all items, weighted by their current popularity . T o generate synthetic data, we start from the state of the Last.fm loves dataset at time T , after which we replace the songs that users actually loved with songs generated by either the copy-influence, personal preference, or external e xposure process, while maintaining the original social network and timestamps of actions. W e also consider cases with a mixture of personal preference and copy-influence. For these cases, we fix the relati ve probability of selecting copy-influence o ver personal preference and each user decides which process to use for his next action based on this probability . For our experiments, we set M = 10 and selected time T at three equally-spaced timestamps: 2014/01/01, 2013/10/01 and 2013/07/01. W e choose values closer to our crawl date so the friend set that we use for estimation is close to the actual friend set. Both s and a were set to 0 . 1 , ensuring that non-friends are within 10% of the corresponding similarity and acti vity for friends of a user . T o get reliable estimates for similarity and copy-influence, we consider only those users who have at least 5 actions both before and after T . Finally , we generated data 100 times using each process and ran the PME procedure for determining the extent of copy-influence in each. Results shown are av eraged across the 100 runs and across all three timestamps. PME procedure reco vers simulated cop y-influence As T able 2 shows, our copy-influence estimate is able to cor- rectly rule out most correlated actions in the external exposure and personal preference processes, while it still shows a high copy-influence estimate for the copy-influence process. Like wise, when there is a mixture of personal preference and copy-influence, copy-influence estimates using the PME procedure are closer to actual copy-influence than Friends- Overlap. It is still slightly higher than the true extent of copy- influence that we fixed for generating the data. The reason is that our matching may be inexact: for the personal prefer- ence process, a user should hav e the same overlap with the matched non-friends’ feed as with the friends’ feed, but in practice, our measure of preference similarity may not cap- Action on song FrOverlap Copy-Inf. Std. Err . Listen-Listen 0 . 004 0 . 001 2 . 5 ∗ 10 − 5 Lov e-Love 0 . 015 0 . 003 7 . 8 ∗ 10 − 5 Lov e-Listen 0 . 004 0 . 0007 4 . 9 ∗ 10 − 5 T able 3. A comparison of copy-actions from the friends’ feed (Friends- Overlap) with the copy-influence estimate computed using the PME pro- cedure on Last.fm. W e look at the influence of friends’ listen actions on a user’s listen actions, love actions on love, and friends’ love actions on a user’s listen actions. F or all three actions, Friends-Overlap overesti- mates copy-influence. ture people’ s preferences completely . These estimates are also noisy , especially for users with relatively little data. Nev- ertheless, the observed error is much lo wer than that obtained with Friends-Overlap, showing that accounting for preference similarity is helpful in estimating copy-influence. EXTENT OF COPY-INFLUENCE ON LAST .FM W e no w apply the PME procedure to the actual activity of users on Last.fm for both love and listen actions. W e use the same parameters as we did before, setting M = 10 and s = a = 0 . 1 . Since we hav e listen data only for three months, we set T differently for listen and love actions. For love actions, we set T = 2013 / 07 / 01 as before, while for listen actions, we set T = 2014 / 01 / 01 . A user may listen to the same song more than once, raising the question of ho w to treat repeated activity . One option would be to only look at the first time a user heard a song, on the assumption that copy-influence plays a minimal role in re-experiencing the song versus a user’ s o wn preferences about the song after listening to it. On the other hand, a user might be influenced to re-listen to a song they like by seeing it in their feed; in this case, we would want to measure copy- influence on all actions. For our copy-influence estimates, we consider all actions taken by users, including re-listens. Friends-Overlap overestimates cop y-influence Our first major observation is that for both listens and lov es, Friends-Overlap overestimates copy-influence. T able 3 shows the mean effect of copy-influence, along with Friends- Overlap, for listening to or loving songs. On average, only 0 . 3% of a user’ s actions can be attributed to influence for lov es, and fe wer still for listens—and in both cases, the copy- influence estimate is less than one-fourth of the naive Friends- Overlap. 7 T o test whether explicit endorsement of a song by friends in- fluences a user’ s implicit listening activity , we next compute copy-influence on listen actions of a user due to love actions in her feed. As for the previous two scenarios, we find that Friends-Overlap for listens overestimates copy-influence and the actual extent of that influence is belo w 0 . 1% . Friends-Overlap and copy-influence for exposure to lov es is higher than those for listens, indicating first, that a higher 7 In practice, to make the feed manageable, Last.fm’ s listen feed de- viates from our rev erse chronological assumption and instead shows one most recent song per friend. When we modify our feed model to include only the most recently listened song by each friend in the feed, we find that the copy-influence increases (from 0.001 to 0.0018), but is still less than half of Friends-Ov erlap. Figure 2. Per -user variation of Friends-Overlap (left panel) and copy- influence (right panel) for loves on songs among users with non-zero Friends-Overlap. Even among these users, copy-influence is zero or neg- ative f or a third of the users. fraction of love actions are common among friends than lis- tens, and second, a higher fraction of lov e actions are also copied from friends than listens. A possible reason could be that loves by other users might be considered as stronger en- dorsements than the implicit listens, and thus, have higher copy-influence. Further, there might be less user choice in which songs to listen to versus loves, for instance, when a playlist or recommendation algorithm is choosing which songs are played. W e will come back to how intentionality , along with algorithm and interface design, are important for modeling influence in the discussion. Most users sho w no influence effects In addition to estimating network-lev el copy-influence, it could be useful to estimate copy-influence on individual users. One way to interpret indi vidual estimates is that we are measuring the susceptibility to copy-influence for an indi- vidual [3]. Such an estimate can be used in diffusion models to set personalized transmission probabilities or thresholds. Looking at per-user copy-influence for the love action on songs shows a wide variation in the ef fect of copy-influence among users, as shown in Figure 2. Note that strikingly , Friends-Overlap is zero for a majority of users. The high number of zeros makes visual inspection of the distribu- tions difficult, so Figure 2 includes only users with non-zero Friends-Overlap. Among users with non-zero Friends-Overlap, about a third hav e their copy-influence estimate less than or equal to zero, which indicates that all of their Friends-Overlap can be ex- plained by preference similarity alone; overall, the copy- influence estimate is zero or negativ e for more than 75% of core users. This helps to explain the lo w overall effect we see for copy-influence and provides additional empirical evi- dence of a wide range of susceptibility among users [1, 3]. Less active users are more susceptible W e also wondered whether users’ activity lev els affect how susceptible they are to copy-influence. T o do this, we com- pare copy-influence estimates for users with dif ferent num- bers of loves on Last.fm during the Estimation phase. Fig- ure 3 shows the v ariation of copy-influence on songs with activity (love) rate of users. The extent of copy-influence is higher for users with fewer loves, who are also the majority Figure 3. V ariation of copy-influence with activity rates of Last.fm users during the Estimation phase. W e filtered out bins with less than 5 users towards the right end of the plot. The effect of copy-influence decreases as the activity level of a user incr eases. Error bars con vey standard err or of the mean estimates. Figure 4. V ariation of copy-influence and Friends-Overlap estimates with change in M . Both estimates increase; however , the ratio between the two remains appr oximately equal. of users in the dataset; as the acti vity level increases, copy- influence estimates decrease. Robustness with c hange in parameters The parameters we use in the influence test are T , M and the two error thresholds, s and a . T o check whether our results are robust to changes in parameters, we tried a range of values for each. While we do find changes in the influence estimate (increasing s and a , for example, decreases the extent to which we can account for homophily), the high-lev el finding that copy-influence could be ruled out for most copy-actions stays consistent. Figure 4 shows that both Friends-Overlap and estimated copy-influence increase with M . The fact that both increase is not surprising, since as M increases, each of a user’ s ac- tions might match with a larger pool of actions from either the friends or non-friends feed. Ho we ver , the ratio between the two remains the same. COPY-INFLUENCE ON O THER SOCIAL NETWORKS W e have focused so far on Last.fm as a running example for explaining and exploring the PME procedure. W e now apply it to compute copy-influence estimates on other so- cial networks and see how our results generalize to different item domains, feed interfaces, and system designs. T able 4 presents aggregate data for three existing datasets we use from Goodreads [28], Flixster [29], and Flickr [14]. These datasets cover a div erse set of item domains: Goodreads is a social network for books, Flixster for movies, and Flickr for photos. More details about each dataset can be found in the papers that introduced them [28, 29, 14]. Describing the datasets As on Last.fm, users on each of these websites can act upon items and form undirected connections with other users. Goodreads and Flixster allo w users to rate books and movies respectiv ely . Flickr allows users to favorite photos that other users post on the website. In addition, each social network has a feed interface that shows friends’ rating or fa voriting acti vi- ties, aggre gated and presented in a loosely re verse chronolog- ically order in the way our model of copy-influence assumes 8 . The number of items av ailable to act on among the three datasets varies widely . On av erage, an item is acted on 3 times on Flickr, 21 times on Goodreads, and 163 times on Flixster . For comparison, the same average was 10 loves per song on Last.fm (in this section, we report only loves on Last.fm be- cause they are more similar to rating or fav oriting actions in these websites). In contrast to per-item activity , per-user ac- tivity is similar across all three datasets, with users acting on ov er 100 items on average. Since on Goodreads and Flixster a friend’ s rating is shown in a user’ s feed irrespectiv e of whether it was high or low , we consider all ratings by users for our analysis 9 . Since we do not kno w the real number of friends for each user in these datasets, we consider an y user with non-zero friends as a core user . All friend relations are still without timestamps, so we assume a static social network and set T for each dataset so that only 10% of the actions are after time T . For consistency , we use the same values for all other parameters as for Last.fm. V ast majority of actions are due to personal preference Figure 5 shows the Friends-Overlap and copy-influence es- timates for all four datasets, along with standard error . W e find varying estimates for Friends-Overlap on these datasets, from 0 . 019 on Flixster to 0 . 008 on Flickr . The amount of Friends-Overlap e xplained by preference similarity also varies widely; the copy-influence estimate is less than 15% of Friends-Overlap for Flixster and over 85% of Friends- Overlap for Flickr . Such differences are plausible, and in fact, 8 Flixster moved away from being a social network for movies after 2010, but the current dataset was collected before the change and satisfies our assumptions. 9 T o better account for preference similarity , we also tried a v ariation where we filtered out any rating below 3 or 4 on a scale of 0.5-5. The pattern of results is the same. Figure 5. Friends-Overlap and copy-influence estimates on different so- cial networks. While both Friends-Overlap and the ratio of Friends- Overlap to copy-influence varies, the copy-influence estimate for all web- sites is below 1% of users’ actions on items. expected: except for the fact that they are all online social net- works, these websites dif fer from each other in many charac- teristics: their item domains, types of actions, popularity of items, user interfaces, and use cases. Howe ver , after controlling for preference similarity between friends, we find that the copy-influence estimates for all four domains fall into a range from 0.002–0.007. Interpreting the copy-influence estimate as the average fraction of user actions due to cop y-influence, these results imply that less than 1% of the total user actions in these sites can be attributed to copy- influence from the feed. DISCUSSION W e present PME, a broadly applicable estimation procedure for separating social influence from preference behavior in online social networks. Unlike past work on identifying in- fluence [1, 2, 15], our procedure does not need any additional person-lev el attributes, relies on data that is often publicly av ailable, does not depend on the directionality of edges, and provides both overall and person-lev el estimates of not just the presence but the amount of cop y-influence. Applying this procedure to data from a broad range of websites shows that simple correlational estimates between friends greatly over - estimate the extent of copy-influence and that accounting for preference similarity can lead to more accurate estimates. Our results add depth to studies that found that a majority of actions common between friends can be attributed to ho- mophily instead of influence [2, 34], both showing that it oc- curs in a number of contexts and that the extent of ov eresti- mation varies widely with both users and systems. W e begin by placing our results in context with scholarly work on dif fusion and influence in online social networks, questioning whether the ef fects of copy-influence are over - rated. W e then discuss plausible reasons for differences in the ov erestimation of actual copy-influence that we saw for different social networks. Finally , we revisit assumptions of the PME procedure that should be kept in mind before using it in other settings. Copy-influence is o verrated (?) Our results indicate a subdued picture of the role of copy- influence in online sharing networks. In all four datasets, more than 99% of people’ s actions on items can be explained without copy-influence, and most users are not at all influ- enced by the activity feed. Even without controlling for homophily , Friends-Overlap—an upper bound on the actual copy-influence—is lo w: less than 2% of users’ actions are copy-actions (Figure 5). These results are at odds with both popular perception and much scholarly work on social influence. The idea of a par- ticular item or opinion starting from a few sources and spread- ing virally to a large component of a social netw ork is riveting and often highlighted in popular discourse. Further , social in- fluence on online networks has been shown to be present for a number of acti vities, as we pointed out earlier . Thus, we are not arguing that influence is not important. Howe ver , we do think that in many contexts it is likely over - stated. In particular, our results call attention to the tiny role of copy-influence in affecting people’ s routine acti vity around items. Most discussion of influence focuses on the unusual: ev ents where people do adopt their friends’ behaviors and items spread widely . Howe ver , the mundane reality is that most people’ s actions are driv en by their own preferences. Recent empirical work on the spread of items through social media provide further support for this claim. Flaxman et al. show that only about 2% of online news consumption is re- ferred through social media [24]. This is essentially an upper bound on the fraction of news articles read due to influence from others in a social network. This study , like our work, is able to put the effect of social media on news consump- tion in perspective by comparing it against the total number of news articles visited by users and not just focusing on the ones shared within social netw orks. Likewise, the v ast major- ity of tweets nev er breach the sender’ s ego network [27]. Still, a small ef fect today could turn into a big one tomorrow: 1% of all actions seems tiny , b ut 1 influenced action out of 100 may aggregate ov er time to be a significant effect on peo- ple’ s decisions. This might be especially true if those influ- ences happen earlier in a user’ s lifetime, which Figure 3 sug- gests is true, since lower -activity users appear to hav e higher copy-influence estimates. Studying the temporal variation in copy-influence estimates and ev olution of people’ s personal preferences ov er time will be interesting future work. Factor s that affect the extent of copy-influence W e also observe variations in the degree of over -estimation for copy-influence between different actions (listen and love on Last.fm) and between different websites, and it will be useful to understand the reasons for these differences. W e see two factors as playing a prominent role in affecting the potential influence of friends’ actions: characteristics of the item space and the design of the feed. Our goal here is not to present an exhausti ve account of reasons why copy-influence might dif fer between domains and individuals (in particular, network f actors such as tie strength and kno wledge of friends also affect people’ s copying decisions [43, 4, 9, 11]), but in- Item properties Flickr Goodreads Last.fm Flixster No external e xistence Y es No No No Sparse actions/item Y es Y es Y es No Quick consumption Y es No Y es No T able 5. Item properties for the four datasets. Flickr , which has the highest copy-influence estimate, has each of the properties that we ar- gue promote copy-influence. Meanwhile, Flixster does not satisfy any of these properties and has the lowest copy-influence estimate despite having the highest Friends-Ov erlap among the four websites. stead to call attention to the need for nuance in thinking about the mechanisms by which influence flows. Characteristics of the item space One set of factors that might af fect the e xtent of copy- influence has to do with properties of the items and domain. • The distribution of attention to items likely matters. For example, photos on Flickr, being user-generated items, are numerous compared to relativ ely mass-consumed items such as movies, music, and books. This leads to the lo w mean popularity of 3 for a photo that we see in T able 4. Consequently , the likelihood that people are exposed a par- ticular photo through their friends rather than other mecha- nisms is higher . There could be a similar effect for explicit lov es on Last.fm, which are rarer than listens and signal stronger interest from others. • Further , items like books, movies, and songs have a well- defined existence outside of the social networks we study that might lead to more external exposure. Photos, on the other hand, often exist only on Flickr and thus are hard to discov er from outside the system itself. • Finally , photos, like songs, are quick consumption items and thus are more amenable to mimicry on exposure from friends’ feeds than a book or a movie. A user may fav orite a photo right after vie wing it in her feed or love a song after listening to it for a few minutes. For domains like books or movies which tak e hours to consume, we w ould e xpect less such spontaneous mimicry . These characteristics of the item space can af fect both the amount of ov erlap in activity between friends and the ac- tual copy-influence flowing between them. T able 5 summa- rizes these factors for the four websites we studied. The col- umn for Flixster in the table suggests why movie ratings on Flixster hav e low copy-influence: the dataset does not possess any of the three factors that promote the likelihood of copy- influence. On the other hand, Flickr , where preference simi- larity could rule out only a small fraction of Friends-Overlap, satisfies all these criteria. Last.fm and Goodreads lie the mid- dle. Proper ties of the f eed These websites also differ in ho w the y show friends’ activities to a user . Since users are typically exposed to their friends’ activity through the feed, both the design of the feed interface and ranking algorithms that perturb the feed lik ely impact the extent of copy-influence in a netw ork. Figure 1 shows the feed for lov e actions on Last.fm; in the grand scheme of the interface, howe ver , it is a small widget. Moreov er, the interf ace is often in the background while peo- ple listen to music and attend to other tasks, likely reducing the feed’ s influence relativ e to other sites. The interface for Flickr lies on the other side of the spectrum: most of the av ail- able space is de voted to a feed of others’ photos, so using the interface is a focal activity that concentrates attention on the photos shown in the feed. Feeds might also make acting on an item possible without having to consume it. For instance, a user might not read a book or w atch a movie right away , b ut if the interface lets her put it in a queue, this might reasonably be considered copy- influence on the queuing action. Note that in this case, the design of the feed and the actions afforded to users compen- sates for the item property of slow consumption. This discussion underscores the importance of precise defini- tions and explicit mechanisms for interpreting the influence estimates we obtain. System design and characteristics of the item space both impact people’ s e xposure to and abil ity to act on items from their friends, thus impacting what we measure as copy-influence in these social networks. Even though the PME procedure is broadly applicable to social networks— requiring only social network edges and timestamped prefer- ence data—it is important to interpret the resultant influence estimates with respect to the design and context of the specific network. Assumptions and Generalizability W e no w return to the assumptions behind the PME procedure and discuss how it may be adapted to estimate copy-influence from feeds in other social networks. In particular , we assume limited attention to a reverse chronological feed, focus only on influence con ve yed by the feed, consider similarity in ac- tions as a proxy for homophily , assume a static network, and equally weight activites by all of a user’ s friends. Limited attention to a re verse chronological f eed Although the feed interfaces of the four websites differ some- what, at heart they are based on a re verse chronological feed, leading to our assumption of such a feed, cut off by a thresh- old M number of actions that users attend to. When applying the influence estimation procedure to a new website, it is im- portant to think about whether the specific feed ranking and interface of a website are amenable to such a formulation. For example, the reverse chronological assumption is less ap- propriate for networks with opaque feed ranking algorithms such as Facebook. In such cases it would be important to capture data about which items are actually shown to a user or use knowledge about the algorithm to approximate the real feed from the timestamped activity data. In addition, future work on estimating personalized values of M for each user might lead to more fine-grained estimates of susceptibility and copy-influence. Cop y-influence, not all influence Our definition of copy-influence means that we are only cap- turing kinds of influence that directly lead to the consump- tion of an item shortly after being exposed to it by a friend. In the context of narrativ es around information diffusion and virality , it is a reasonable choice: to propagate through the network, users must continue to interact with it in ways their friends will see (and copy). Further, we argue that this def- inition, by providing a concrete mechanism and measure for specific aspects of influence, is useful for carving the broad notion of “influence” into pieces that support better modeling, theorizing, and design. But it does mean that we are not talking about all mechanisms or methods of influence. Focusing on the feed means we are not studying influence that flows through other interface fea- tures; focusing on copying of specific actions means that we are not looking at indirect or cumulativ e notions of influence (e.g., k-exposure models). Thus, it is important to remember that although the PME procedure does its job in identifying copy-influence and shows the importance of personal prefer- ences, it does not capture all aspects of influence in a system. Pref erence and matching as a pro xy f or homophily W e use preference similarity as a proxy for modeling under- lying homophily between people. T o do this, one needs to hav e sufficient data to make reasonable preference models; this appears to be the case in man y online social networks in which users generate large volumes of acti vity . Since the effecti veness of the PME procedure hinges on the ability to match non-friends to friends, larger networks, higher activity lev els, and context-appropriate metrics of similarity are likely to improv e the reliability of copy-influence estimates. W e also chose to account for personal preference by matching friends with non-friends. A natural alternative would be to directly compute a user’ s affinity for an item (e.g., using a recommendation algorithm [46]) and use that to control for a user’ s own preference. Ho wever , the drawback is that the interpretation of influence estimates would depend strongly on the quality of the recommender algorithm as a proxy for personal preference, while such a recommender would not be able to account for external influences that might be evident in other users’ activities. A reasonably static netw ork The datasets we studied didn’t hav e timestamps for tie for- mation, so we assumed a static social network. When time- stamps for edge formation are available, we can make a sim- ple modification in the procedure to consider only people who became friends before time T when computing the set of sim- ilar strangers, then considering the current friends of a user when computing Friends-Overlap. Another limitation of our estimation procedure is that by con- sidering all actions in the Matching phase (before time T ) as proxy for personal preference, we miss out on the effects of copy-influence in those actions. If copy-influence is higher early on, we might underestimate it, as to the PME proce- dure the effects of early copy-influence would look like per- sonal preference at time T . Models that relax the time T as- sumption and compute both preferences and friend sets across the history of the dataset are computationally expensiv e, but possible—and would be interesting for bringing simulation- based results around contagion and network change [21, 22] tow ard real datasets. Further , better understanding how users’ susceptibility changes as a function of their time in the sys- tem and their networks is an interesting question in its o wn right. All friends being equal Finally , by comparing all friends of a user in aggregate with their matched non-friends, we do not consider possible differ - ences in how much copy-influence a particualr friend might wield. Past studies sho w that people perceiv e actions by different friends differently based on their relationship with them [4, 18, 31, 43]. In our current datasets, we did not have any principled ways to estimate tie strength. Future work would include accounting for these tie-specific variations in influence. CONCLUSION W e presented a statistical procedure for separating copy- influence from behavior rooted in personal preferences in ob- servational data. The procedure requires only acti vity and network data for users, thus making it well-suited for many online social networks. At least for the websites we studied, applying the influence-estimation procedure shows that the vast majority of people’ s actions on items in social networks can be explained without in voking copy-influence. More generally , our results suggest the importance of ha v- ing clear definitions of influence and well-defined behavior and process models. Rather than a grand unifying theory of all influence, we believe that focusing on specific processes are more likely to be useful in producing deeper understand- ing and models of influence. Our results further suggest that past user activity can be a v aluable resource for these models, requiring minimal additional data about users while giving valuable information about their underlying preferences. Accurate estimates of influence, in turn, promise to improve both models of behavior and design for online social net- works. Individual-le vel estimates can lead to better models of susceptibility for dif fusion models and better prediction of next actions of users for personalization tasks. They would also enable ev aluation of changes to feeds and interfaces and be practically useful for improving user experiences on online social networks. A CKNO WLEDGMENTS This work was support ed by the National Science Foundation under grants IIS 0910664 and IIS 1422484, and by a grant from Google for computational resources. W e thank Chenhao T an for helpful feedback on an early draft of the paper . REFERENCES 1. Aris Anagnostopoulos, Ravi K umar, and Mohammad Mahdian. 2008. Influence and Correlation in Social Networks. In Pr oceedings of the 14th ACM SIGKDD International Confer ence on Knowledge Discovery and Data Mining (KDD ’08) . A CM, New Y ork, NY , USA, 7–15. DOI: http://dx.doi.org/10.1145/1401890.1401897 2. Sinan Aral, Le v Muchnik, and Arun Sundararajan. 2009. Distinguishing influence-based contagion from homophily-driv en diffusion in dynamic networks. Pr oceedings of the National Academy of Sciences 106, 51 (2009), 21544–21549. DOI: http://dx.doi.org/10.1073/pnas.0908800106 3. Sinan Aral and Dylan W alker. 2012. Identifying Influential and Susceptible Members of Social Networks. Science 337, 6092 (2012), 337–341. DOI: http://dx.doi.org/10.1126/science.1215842 4. Sinan Aral and Dylan W alker. 2014. T ie Strength, Embeddedness, and Social Influence: A Large-Scale Networked Experiment. Mana gement Science 60, 6 (2014), 1352–1370. DOI: http://dx.doi.org/10.1287/mnsc.2014.1936 5. Lars Backstrom, Dan Huttenlocher, Jon Kleinberg, and Xiangyang Lan. 2006. Group Formation in Lar ge Social Networks: Membership, Growth, and Evolution. In Pr oceedings of the 12th ACM SIGKDD International Confer ence on Knowledge Discovery and Data Mining (KDD ’06) . A CM, New Y ork, NY , USA, 44–54. DOI: http://dx.doi.org/10.1145/1150402.1150412 6. Eytan Bakshy, Dean Eckles, Rong Y an, and Itamar Rosenn. 2012. Social Influence in Social Advertising: Evidence from Field Experiments. In Pr oceedings of the 13th A CM Conference on Electr onic Commerce (EC ’12) . A CM, New Y ork, NY , USA, 146–161. DOI: http://dx.doi.org/10.1145/2229012.2229027 7. Eytan Bakshy, Jake M. Hofman, W inter A. Mason, and Duncan J. W atts. 2011. Everyone’ s an Influencer: Quantifying Influence on T witter . In Proceedings of the F ourth ACM International Confer ence on W eb Sear ch and Data Mining (WSDM ’11) . A CM, New Y ork, NY , USA, 65–74. DOI: http://dx.doi.org/10.1145/1935826.1935845 8. Eytan Bakshy, Brian Karrer, and Lada A. Adamic. 2009. Social Influence and the Diffusion of User -created Content. In Pr oceedings of the 10th ACM Confer ence on Electr onic Commer ce (EC ’09) . A CM, New Y ork, NY , USA, 325–334. DOI: http://dx.doi.org/10.1145/1566374.1566421 9. Eytan Bakshy, Itamar Rosenn, Cameron Marlo w, and Lada Adamic. 2012. The Role of Social Networks in Information Diffusion. In Pr oceedings of the 21st International Confer ence on W orld W ide W eb (WWW ’12) . A CM, New Y ork, NY , USA, 519–528. DOI: http://dx.doi.org/10.1145/2187836.2187907 10. Michael S. Bernstein, Eytan Bakshy, Moira Burke, and Brian Karrer. 2013. Quantifying the In visible Audience in Social Networks. In Pr oceedings of the SIGCHI Confer ence on Human F actors in Computing Systems (CHI ’13) . A CM, New Y ork, NY , USA, 21–30. DOI: http://dx.doi.org/10.1145/2470654.2470658 11. Robert M Bond, Christopher J Fariss, Jason J Jones, Adam DI Kramer, Cameron Marlow, Jaime E Settle, and James H Fo wler. 2012. A 61-million-person experiment in social influence and political mobilization. Natur e 489, 7415 (2012), 295–298. 12. Moira Burke, Cameron Marlo w, and Thomas Lento. 2009. Feed Me: Motiv ating Newcomer Contrib ution in Social Network Sites. In Pr oceedings of the SIGCHI Confer ence on Human F actors in Computing Systems (CHI ’09) . A CM, New Y ork, NY , USA, 945–954. DOI: http://dx.doi.org/10.1145/1518701.1518847 13. Damon Centola. 2013. Social Media and the Science of Health Behavior . Cir culation 127, 21 (2013), 2135–2144. DOI: http: //dx.doi.org/10.1161/CIRCULATIONAHA.112.101816 14. Meeyoung Cha, Alan Mislo ve, and Krishna P . Gummadi. 2009. A Measurement-driv en Analysis of Information Propagation in the Flickr Social Network. In Pr oceedings of the 18th International Confer ence on W orld W ide W eb (WWW ’09) . A CM, New Y ork, NY , USA, 721–730. DOI: http://dx.doi.org/10.1145/1526709.1526806 15. Nicholas A. Christakis and James H. Fo wler. 2007. The Spread of Obesity in a Large Social Netw ork ov er 32 Y ears. New England J ournal of Medicine 357, 4 (2007), 370–379. DOI: http://dx.doi.org/10.1056/NEJMsa066082 PMID: 17652652. 16. Nicholas A Christakis and James H Fo wler. 2009. Connected: The surprising power of our social networks and how the y shape our lives . Little, Brown. 17. Robert B Cialdini. 2001. Influence: Science and practice. Boston: Allyn & Bacon (2001). 18. Dan Cosley, Shyong K. Lam, Istv an Albert, Joseph A. K onstan, and John Riedl. 2003. Is Seeing Believing?: How Recommender System Interf aces Affect Users’ Opinions. In Pr oceedings of the SIGCHI Confer ence on Human F actors in Computing Systems (CHI ’03) . A CM, New Y ork, NY , USA, 585–592. DOI: http://dx.doi.org/10.1145/642611.642713 19. David Crandall, Dan Cosle y, Daniel Huttenlocher, Jon Kleinberg, and Siddharth Suri. 2008. Feedback Ef fects Between Similarity and Social Influence in Online Communities. In Pr oceedings of the 14th ACM SIGKDD International Confer ence on Knowledge Discovery and Data Mining (KDD ’08) . A CM, New Y ork, NY , USA, 160–168. DOI: http://dx.doi.org/10.1145/1401890.1401914 20. Laura Dabbish, Colleen Stuart, Jason Tsay, and Jim Herbsleb. 2012. Social Coding in GitHub: T ransparency and Collaboration in an Open Software Repository . In Pr oceedings of the ACM 2012 Confer ence on Computer Supported Cooperative W ork (CSCW ’12) . A CM, New Y ork, NY , USA, 1277–1286. DOI: http://dx.doi.org/10.1145/2145204.2145396 21. Peter Sheridan Dodds and Duncan J W atts. 2005. A generalized model of social and biological contagion. Journal of Theor etical Biology 232, 4 (2005), 587–604. 22. Patrick Doreian and Frans Stokman. 2013. Evolution of social networks . Routledge. 23. Bradley Efron and Robert T ibshirani. 1986. Bootstrap methods for standard errors, confidence intervals, and other measures of statistical accuracy . Statistical science (1986), 54–75. 24. Seth Flaxman, Sharad Goel, and Justin M Rao. 2013. Ideological segre gation and the effects of social media on news consumption. A vailable at SSRN 2363701 . 25. Rumi Ghosh and Kristina Lerman. 2010. Predicting influential users in online social networks. In Pr oceedings of KDD workshop on social network analysis (SN A-KDD) . 26. Malcolm Gladwell. 2006. The tipping point: How little things can make a big dif fer ence . Little, Brown. 27. Sharad Goel, Duncan J. W atts, and Daniel G. Goldstein. 2012. The Structure of Online Diffusion Netw orks. In Pr oceedings of the 13th ACM Confer ence on Electronic Commer ce (EC ’12) . ACM, Ne w Y ork, NY , USA, 623–638. DOI: http://dx.doi.org/10.1145/2229012.2229058 28. Junming Huang, Xue-Qi Cheng, Hua-W ei Shen, T ao Zhou, and Xiaolong Jin. 2012. Exploring Social Influence via Posterior Effect of W ord-of-mouth Recommendations. In Pr oceedings of the F ifth ACM International Confer ence on W eb Sear ch and Data Mining (WSDM ’12) . A CM, New Y ork, NY , USA, 573–582. DOI: http://dx.doi.org/10.1145/2124295.2124365 29. Mohsen Jamali and Martin Ester. 2010. A Matrix Factorization T echnique with T rust Propagation for Recommendation in Social Networks. In Pr oceedings of the F ourth ACM Confer ence on Recommender Systems (RecSys ’10) . A CM, New Y ork, NY , USA, 135–142. DOI: http://dx.doi.org/10.1145/1864708.1864736 30. Bruce Krulwich. 1997. Lifestyle finder: Intelligent user profiling using large-scale demographic data. AI magazine 18, 2 (1997), 37. 31. Chinmay Kulkarni and Ed Chi. 2013. All the Ne ws That’ s Fit to Read: A Study of Social Annotations for News Reading. In Pr oceedings of the SIGCHI Confer ence on Human F actors in Computing Systems (CHI ’13) . A CM, New Y ork, NY , USA, 2407–2416. DOI: http://dx.doi.org/10.1145/2470654.2481334 32. T imothy La Fond and Jennifer Neville. 2010. Randomization T ests for Distinguishing Social Influence and Homophily Effects. In Pr oceedings of the 19th International Confer ence on W orld W ide W eb (WWW ’10) . A CM, New Y ork, NY , USA, 601–610. DOI: http://dx.doi.org/10.1145/1772690.1772752 33. Kristina Lerman and Rumi Ghosh. 2010. Information Contagion: An Empirical Study of the Spread of News on Digg and T witter Social Networks. In Pr oceedings of International AAAI Confer ence on W eb and Social Media . 90–97. 34. Ke vin Lewis, Marco Gonzalez, and Jason Kaufman. 2012. Social selection and peer influence in an online social network. Pr oceedings of the National Academy of Sciences 109, 1 (2012), 68–72. 35. Miller McPherson, L ynn Smith-Lovin, and James M Cook. 2001. Birds of a feather: Homophily in social networks. Annual r eview of sociolo gy (2001), 415–444. 36. Solomon Messing and Sean J W estwood. 2012. Selectiv e exposure in the age of social media: Endorsements trump partisan source affiliation when selecting news online. Communication Resear ch (2012). 37. Eli Pariser. 2011. The filter b ubble: What the Internet is hiding fr om you . Penguin UK. 38. Judea Pearl. 2009. Causality: models, r easoning and infer ence . Cambridge university press. 39. Daniel M. Romero, Brendan Meeder, and Jon Kleinberg. 2011. Differences in the Mechanics of Information Diffusion Across T opics: Idioms, Political Hashtags, and Complex Contagion on T witter . In Pr oceedings of the 20th International Confer ence on W orld W ide W eb (WWW ’11) . A CM, New Y ork, NY , USA, 695–704. DOI: http://dx.doi.org/10.1145/1963405.1963503 40. Matthew J Salg anik, Peter Sheridan Dodds, and Duncan J W atts. 2006. Experimental study of inequality and unpredictability in an artificial cultural market. Science 311, 5762 (2006), 854–856. 41. Carson J Sandy, Samuel D Gosling, and John Durant. 2013. Predicting consumer behavior and media preferences: The comparativ e validity of personality traits and demographic variables. Psychology & Marketing 30, 11 (2013), 937–949. 42. Cosma Rohilla Shalizi and Andrew C Thomas. 2011. Homophily and contagion are generically confounded in observational social netw ork studies. Sociological methods & r esearc h 40, 2 (2011), 211–239. 43. Amit Sharma and Dan Cosley. 2013. Do Social Explanations W ork?: Studying and Modeling the Effects of Social Explanations in Recommender Systems. In Pr oceedings of the 22nd International Confer ence on W orld W ide W eb (WWW ’13) . A CM, New Y ork, NY , USA, 1133–1144. http: //dl.acm.org/citation.cfm?id=2488388.2488487 44. Amit Sharma, Mevlana Gemici, and Dan Cosle y. 2013. Friends, Strangers, and the V alue of Ego Networks for Recommendation.. In Pr oceedings of International AAAI Confer ence on W eb and Social Media . 721–724. 45. Christian Steglich, T om AB Snijders, and Michael Pearson. 2010. Dynamic networks and beha vior: Separating selection from influence. Sociological methodology 40, 1 (2010), 329–393. 46. Xiaoyuan Su and T aghi M Khoshgoftaar. 2009. A surve y of collaborative filtering techniques. Advances in artificial intelligence (2009). 47. Eric Sun, Itamar Rosenn, Cameron Marlow, and Thomas M Lento. 2009. Gesundheit! Modeling Contagion through Facebook Ne ws Feed.. In Pr oceedings of International AAAI Confer ence on W eb and Social Media . 48. Jie T ang, Sen W u, and Jimeng Sun. 2013. Confluence: Conformity Influence in Large Social Netw orks. In Pr oceedings of the 19th ACM SIGKDD International Confer ence on Knowledge Discovery and Data Mining (KDD ’13) . A CM, New Y ork, NY , USA, 347–355. DOI: http://dx.doi.org/10.1145/2487575.2487691 Featur e Listen Love Users with ≥ 10 actions 312K 434K Core users 96K 140K Friends per user (mean; std. error; median) (75; 0.7; 29) (70; 0.5; 25) Actions 656M 136M Actions per user (mean; std. error; median) (2101; 5.5; 1192) (313; 1.4; 118) Songs 23M 13M Actions per song (28; 0.1; 2) (10; 0.03; 1) T able 1. Descriptive statistics for the Last.fm dataset. On average, each user listened to 2101 songs during the 3 month period and loved a total of 313 songs during his lifetime. Featur e Goodreads Flixster Flickr Users with ≥ 10 actions 252K 50.0K 183K Users with friendship data 252K 48.8K 175K Friends per user (29; 0.2; 14) (13; 0.1; 5) (74; 0.5;17) Actions 28M 7.9M 33M Actions per user (112; 0.35; 63) (158; 1.6; 44) (183; 1.5; 44) Items 1.3M 48.4K 10.9M Actions per item (21; 0.4; 2) (163; 4.0; 5) (3; 0.003; 1) T able 4. Descriptive statistics f or datasets from Goodr eads, Flixster , and Flickr . Flixster has the lowest number of items and consequently , more actions per item (163) than Goodreads (21) and Flickr (3). The average number of actions per user is abo ve 100 f or all three datasets.
Original Paper
Loading high-quality paper...
Comments & Academic Discussion
Loading comments...
Leave a Comment