Publication Type
Conference Proceeding Article
Version
publishedVersion
Publication Date
7-2017
Abstract
The study of information flow typically does not distinguish the choices of tie strength on which the information flows. All receivers of the information are assumed to have the same potential to pass on the information. Modifying the SEIZ (susceptible, exposed, infected, skeptic) model, we discover that people choose to retweet strong or weak ties based on the topic. We made two modifications in the model. In the first modification (Model I), we assume that the contact rates of agents in different compartment and the probability of an agent transitioning from one compartment to another are different for strong ties and weak ties. In the second modification (Model II), we assume that only the probability of transitioning is different for strong ties and weak ties. We discover that people do not discriminate strong ties and weak ties when retweeting controversial topic, perhaps because this topic can both be personal and breaking news. On the other hand, people discriminate strong ties and weak ties when retweeting non-controversial topic. They prefer to retweet strong ties when the topic is donation, and kids, and weak ties when the topic is news on hurricane and music. Meanwhile, SEIZ model and its modifications are found to be inadequate to model tweets on event promotion.
Discipline
Databases and Information Systems | Social Media
Research Areas
Data Science and Engineering
Publication
ASONAM '17: Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Sydney, Australia, July 31 - August 3
First Page
203
Last Page
207
ISBN
9781450349932
Identifier
10.1145/3110025.3110130
Publisher
ACM
City or Country
New York
Citation
NATALI, Felicia; CARLEY, Kathleen M.; ZHU, Feida; and HUANG, Binxuan.
The role of different tie strength in disseminating different topics on a microblog. (2017). ASONAM '17: Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Sydney, Australia, July 31 - August 3. 203-207.
Available at: https://ink.library.smu.edu.sg/sis_research/3927
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1145/3110025.3110130