Limitations of link deletion for suppressing real information diffusion on social media

Although beneficial information abounds on social media, the dissemination of harmful information such as so-called "fake news" has become a serious issue. Therefore, many researchers have devoted considerable effort to limiting the diffusion of harmful information. A promising approach to limiting diffusion of such information is link deletion methods in social networks. Link deletion methods have been shown to be effective in reducing the size of information diffusion cascades generated by synthetic models on a given social network. In this study, we evaluate the effectiveness of link deletion methods on Twitter by using actual logs of retweet cascades, rather than by using synthetic diffusion models. Our results show that even after deleting 50% of links detected by the NetMelt method from a Twitter social network, the size of tweet cascades after link deletion is estimated to be only 50% the original size, which suggests that the effectiveness of the link deletion strategy for suppressing information diffusion on Twitter is limited. Moreover, our results also show that there is a considerable number of cascades with many seed users, which renders link deletion methods inefficient.

[1]  Sho Tsugawa,et al.  Empirical Analysis of the Relation between Community Structure and Cascading Retweet Diffusion , 2019, ICWSM.

[2]  Divyakant Agrawal,et al.  Limiting the spread of misinformation in social networks , 2011, WWW.

[3]  Weili Wu,et al.  Least Cost Rumor Blocking in Social Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[4]  Masahiro Kimura,et al.  Minimizing the Spread of Contamination by Blocking Links in a Network , 2008, AAAI.

[5]  Sameep Mehta,et al.  A study of rumor control strategies on social networks , 2010, CIKM.

[6]  Le Song,et al.  Scalable diffusion-aware optimization of network topology , 2014, KDD.

[7]  Deying Li,et al.  Rumor Blocking through Online Link Deletion on Social Networks , 2019, ACM Trans. Knowl. Discov. Data.

[8]  Matthew Richardson,et al.  Mining the network value of customers , 2001, KDD '01.

[9]  M. De Domenico,et al.  The Anatomy of a Scientific Rumor , 2013, Scientific Reports.

[10]  D. Jolley,et al.  Pylons ablaze: Examining the role of 5G COVID‐19 conspiracy beliefs and support for violence , 2020, The British journal of social psychology.

[11]  Fernando C. Erd,et al.  Blocking the Spread of Misinformation in a Network under Distinct Cost Models , 2020, 2020 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[12]  Michalis Faloutsos,et al.  Gelling, and melting, large graphs by edge manipulation , 2012, CIKM.