An evolutionary game model for the spread of non-cooperative behavior in online social networks

We present an evolutionary game-theoretic model for the spread of non-cooperative behavior in online social networks. We formulate a two-strategy game wherein each player's behavior is classified as normal (cooperate) or abusive (defect) and pairwise interactions between adjacent players in the network graph yield a unique payoff to each according a prisoner's dilemma payoff structure. Player strategies evolve by imitation of successful behavior in observable neighborhoods. We demonstrate convergence of player behavior over time to a final strategy vector. Proof-of-concept is given for a real-world dataset collected from a popular online forum.

[1]  Herbert W. Hethcote,et al.  The Mathematics of Infectious Diseases , 2000, SIAM Rev..

[2]  Ling Huang,et al.  Robust detection of comment spam using entropy rate , 2012, AISec.

[3]  Minaxi Gupta,et al.  Twitter games: how successful spammers pick targets , 2012, ACSAC '12.

[4]  M. McPherson,et al.  Birds of a Feather: Homophily in Social Networks , 2001 .

[5]  Fabrício Benevenuto,et al.  Phi.sh/$oCiaL: the phishing landscape through short URLs , 2011, CEAS '11.

[6]  M. Jackson A Survey of Models of Network Formation: Stability and Efficiency , 2003 .

[7]  ThelwallMike,et al.  Sentiment strength detection in short informal text , 2010 .

[8]  Avner Caspi,et al.  Online Deception: Prevalence, Motivation, and Emotion , 2006, Cyberpsychology Behav. Soc. Netw..

[9]  Jun Hu,et al.  Detecting and characterizing social spam campaigns , 2010, IMC '10.

[10]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[11]  Mary Beth Rosson,et al.  journal homepage: www.elsevier.com/locate/ecra Privacy as information access and illusory control: The case of the Facebook News Feed privacy outcry , 2022 .

[12]  E. Young Contagion , 2015, New Scientist.

[13]  M. Jackson,et al.  A Strategic Model of Social and Economic Networks , 1996 .

[14]  Mike Thelwall,et al.  Sentiment in short strength detection informal text , 2010 .

[15]  Dawn Xiaodong Song,et al.  Suspended accounts in retrospect: an analysis of twitter spam , 2011, IMC '11.

[16]  Kyumin Lee,et al.  Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.

[17]  Anne van den Nouweland,et al.  Strongly Stable Networks , 2002, Games Econ. Behav..

[18]  Huan Liu,et al.  Social Spammer Detection in Microblogging , 2013, IJCAI.

[19]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[20]  M. Degroot Reaching a Consensus , 1974 .