skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Blocking Social Contagions via Dominating Sets Using a Modified Integer Linear Program Formulation
Researchers have modeled contagion processes on social networks for wide ranging applications, including spreading of epidemics, financial defaults, actions such as joining social media sites, and rumors. So, too, researchers have developed a host of intervention methods to control harmful contagions on networks; among these approaches are node and edge removal, separating network communities, altering contagion properties, and introducing a second competing contagion. In this work, minimum dominating sets are used to identify blocking nodes—nodes that do not contract a contagion and therefore also do not assist in transmitting it. A novel, generalized method that utilizes integer linear programming to determine exact minimum dominating sets (which is an NP-hard problem) has been developed for a subgraph of any social network for any combination of covering distance and coverage requirement. Three social networks are used to understand and evaluate (i) the method itself and (ii) the efficacy of the blocking nodes that the method produces to stop contagion spread.  more » « less
Award ID(s):
2428625
PAR ID:
10561405
Author(s) / Creator(s):
; ;
Publisher / Repository:
IEEE
Date Published:
Subject(s) / Keyword(s):
Social networks Contagion Blocking Dominating sets Integer linear programs
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract—There are myriad real-life examples of contagion processes on human social networks, e.g., spread of viruses, information, and social unrest. Also, there are many methods to control or block contagion spread. In this work, we introduce a novel method of blocking contagions that uses nodes from dominating sets (DSs). To our knowledge, this is the first use of DS nodes to block contagions. Finding minimum dominating sets of graphs is an NP-Complete problem, so we generalize a well-known heuristic, enabling us to customize its execution. Our method produces a prioritized list of dominating nodes, which is, in turn, a prioritized list of blocking nodes. Thus, for a given network, we compute this list of blocking nodes and we use it to block contagions for all blocking node budgets, contagion seed sets, and parameter values of the contagion model. We report on computational experiments of the blocking efficacy of our approach using two mined networks. We also demonstrate the effectiveness of our approach by comparing blocking results with those from the high degree heuristic, which is a common standard in blocking studies. Index Terms—contagion blocking, dominating sets, threshold models, social networks, simulation, high degree heuristic 
    more » « less
  2. There are myriad real-life examples of contagion processes on human social networks, e.g., spread of viruses, information, and social unrest. Also, there are many methods to control or block contagion spread. In this work, we introduce a novel method of blocking contagions that uses nodes from dominating sets (DSs). To our knowledge, this is the first use of DS nodes to block contagions. Finding minimum dominating sets of graphs is an NP-Complete problem, so we generalize a well-known heuristic, enabling us to customize its execution. Our method produces a prioritized list of dominating nodes, which is, in turn, a prioritized list of blocking nodes. Thus, for a given network, we compute this list of blocking nodes and we use it to block contagions for all blocking node budgets, contagion seed sets, and parameter values of the contagion model. We report on computational experiments of the blocking efficacy of our approach using two mined networks. We also demonstrate the effectiveness of our approach by comparing blocking results with those from the high degree heuristic, which is a common standard in blocking studies. 
    more » « less
  3. null (Ed.)
    Many contagion processes evolving on populations do so simultaneously, interacting over time. Examples are co-evolution of human social processes and diseases, such as the uptake of mask wearing and disease spreading. Commensurately, multi-contagion agent-based simulations (ABSs) that represent populations as networks in order to capture interactions between pairs of nodes are becoming more popular. In this work, we present a new ABS system that simulates any number of contagions co-evolving on any number of networked populations. Individual (interacting) contagion models and individual networks are speci ed, and the system computes multi-contagion dynamics over time. This is a signi cant improvement over simulation frameworks that require union graphs to handle multiple networks, and/or additional code to orchestrate the computations of multiple contagions. We provide a formal model for the simulation system, an overview of the software, and case studies that illustrate applications of interacting contagions. 
    more » « less
  4. Many contagion processes evolving on populations do so simultaneously, interacting over time. Examples are co-evolution of human social processes and diseases, such as the uptake of mask wearing and disease spreading. Commensurately, multi-contagion agent-based simulations (ABSs) that represent populations as networks in order to capture interactions between pairs of nodes are becoming more popular. In this work, we present a new ABS system that simulates any number of contagions co-evolving on any number of networked populations. Individual (interacting) contagion models and individual networks are specified, and the system computes multi-contagion dynamics over time. This is a significant improvement over simulation frameworks that require union graphs to handle multiple networks, and/or additional code to orchestrate the computations of multiple contagions. We provide a formal model for the simulation system, an overview of the software, and case studies that illustrate applications of interacting contagions. 
    more » « less
  5. Abstract Many types of civil unrest, including protest, violent conflict, and rebellion, have been found to be subject to both inter- and intra-state contagion. These spillover effects are conventionally tested through the application of parametric structural models that are estimated using observational data. Drawing on research in methods for network analysis, we note important challenges in conducting causal inference on contagion effects in observational data. We review a recently developed non-parametric test—the “split-halves test”—that is robust to confounding and apply the test to replication data from several recent studies in which researchers tested for contagion in civil unrest. We find that about half the time findings in the published literature fail to replicate with the split-halves test. Across ten total replications, we do not see strong patterns in terms of which results do and do not replicate. We do, however, find evidence for general contagion in six of the replications, indicating that contagion is a prevalent phenomenon in civil unrest. As such, we recommend that researchers (1) use the split-halves test as a general-purpose robustness check for parametric models of contagion in the study of civil unrest, and (2) consider modeling contagion in research on civil unrest. 
    more » « less