DEVELOPING GAME THEORY-BASED METHODS FOR MODELING INFORMATION CONFRONTATION IN SOCIAL NETWORKS
DOI:
https://doi.org/10.37943/18FONX7380Keywords:
game theory; strategy adaptation; social networks; information conflict; simulation algorithm; probabilistic approach; analytical systems.Abstract
This paper explores the essential dynamics of social networks, specifically examining the phenomenon of information confrontation among users. The goal of the research is the development of a novel simulation methodology that integrates game-theoretic principles with probabilistic techniques to provide a robust model for these interactions. The theoretical framework of the study is founded on the conceptualization of user conflicts as a strategic game between two players. The primary objective for each player in this game is to exert influence and control over as many nodes within the network as possible. To capture the essence of these strategic interactions, we have introduced an innovative algorithm that facilitates dynamic strategy adaptation. This algorithm is pivotal in allowing players to modify their decision-making processes in real-time, based on the continually changing conditions of the network. For practical implementation and validation of the methodology, we used the Facebook Researcher open dataset, with a particular focus on its Kazakhstani segment. This dataset provides a rich source of empirical data, reflecting diverse user interactions and network configurations, which are essential for testing the model. This approach stands out by offering significant improvements in computational efficiency and resource management. By dynamically tracking and updating the network's status, the proposed method reduces the computational resources required, thereby enhancing the scalability of the simulation. In comparing our methodology with other existing models in the field, it becomes evident that it not only matches but in several respects surpasses these methodologies in terms of flexibility. This study makes substantial contributions to the field of social network analysis by providing a sophisticated tool that can be effectively employed to navigate and analyze the complexities of information confrontation in digital social spaces.
References
in Influencer Marketing on Weibo and WeChat. IEEE Transactions on Computational Social Systems, 10, 3228-3240. https://doi.org/10.1109/TCSS.2022.3204177.
Sun, B., Al-Bayaty, R., Huang, Q., & Wu, D.O. (2019). Game Theoretical Approach for Non-Overlapping Community Detection. 2019 5th International Conference on Big Data Computing and Communications, 222-230. https://doi.org/10.26599/TST.2020.9010017.
Bruning, P. F., Alge, B. J., & Lin, H.-C. (2020). Social networks and social media: Understanding and managing influence vulnerability in a connected society. Business Horizons, 63(6), 749-761. https://doi.org/10.1016/j.bushor.2020.07.007.
Huang, D., Tan, X., Chen, N., & Fan, Z. (2022). A Memetic Algorithm for Solving the Robust Influence Maximization Problem on Complex Networks against Structural Failures. Sensors, 22(6), 2191. https://doi.org/10.3390/s22062191.
Peng, Y., & Bai, X. (2024). Identifying social tipping point through perceived peer effect. Environmental Innovation and Societal Transitions, 51, pp.2367-2382. https://doi.org/10.1016/j.eist.2024.100847.
Liu, Y., Bao, Z., Zhang, Z., Tang, D., & Xiong, F. (2020). Information cascades prediction with attention neural network. Human-centric Computing and Information Sciences, 10. https://doi.org/10.1186/s13673-020-00218-w.
Rangnani, S., & Devi, V. S. (2016). Predicting potential retweeters for a microblog on Twitter. In Proceedings of Intelligent and Evolutionary Systems (Vol. 5, pp. 1-5). Springer. https://doi.org/10.1007/978-3-319-27000-5_14.
Qiang, Z., Pasiliao, E., & Zheng, Q. (2019). Model-based learning of information diffusion in social media networks. Applied Network Science, 4(1), 1-16. https://doi.org/10.1007/s41109-019-0215-3.
Zhang, L., Li, K., & Liu, J. (2021). An information diffusion model based on explosion shock wave theory on online social networks. Applied Sciences, 11, 9996. https://doi.org/10.3390/app11219996.
Bourigault, S., Lagnier, C., Lamprier, S., Denoyer, L., & Gallinari, P. (2014). Learning social network embeddings for predicting information diffusion. In Proceedings of the 7th ACM International Conference on Web Search and Data Mining (WSDM '14) (pp. 393-402). ACM. https://doi.org/10.1145/2556195.2556216.
Newman, M. E. J. (2003). The structure and function of complex networks. SIAM Review, 45, 167-256. https://doi.org/10.1137/S00361445034248.
Tsai, J., Nguyen, T., & Tambe, M. (2021). Security Games for Controlling Contagion. In Proceedings of the AAAI Conference on Artificial Intelligence, 26(1), 1464-1470. https://doi.org/10.1609/aaai.v26i1.8249.
Li, Q., Du, H., & Li, X.-Y. (2021). Influence of influence on social networks: Information propagation causes dynamic networks. In Proceedings of the 2021 7th International Conference on Big Data Computing and Communications (BigCom) (pp. 278-285). https://doi.org/10.1109/BigCom53800.2021.00016.
Podlipskaia, O. (2022). Determining effective strategies for information warfare in consolidated and polarized populations. In Proceedings of the IEEE Conference on Machine Learning and Systems (pp. 1-5). IEEE. https://doi.org/10.1109/MLSD55143.2022.9934658.
Li, T., Zhao, Y., & Zhu, Q. (2022). The role of information structures in game-theoretic MAL. Annual Rev. in Control, 53, 296-314. https://doi.org/10.1016/j.arcontrol.2022.03.003.
Ganai, A.H., Hashmy, R., & Khanday, H.A. (2024). Finding Information Diffusion's Seed Nodes in Online Social Networks Using a Special Degree Centrality. SN Comput. Sci., 5, 333. https://doi.org/10.1007/s42979-024-02683-x.
Genschow, O., Klomfar, S., d'Haene, I., & Brass, M. (2018). Mimicking and anticipating others' actions is linked to Social Information Processing. PLoS One, 13(3), e0193743. https://doi.org/10.1371/journal.pone.0193743.
Papadopoulou, O., Makedas, T., Apostolidis, L., Poldi, F., Papadopoulos, S., & Kompatsiaris, I. (2022). MeVer NetworkX: Network Analysis and Visualization for Tracing Disinformation. Future Internet, 14(5), 147. https://doi.org/10.3390/fi14050147.
Iqbal, S., Arif, T., Malik, M., & Sheikh, A. (2020). Browser simulation-based crawler for online social network profile extraction. International Journal of Web Based Communities, 16, 321-342. https://doi.org/10.1504/IJWBC.2020.111377.
O'Neil, D., & Petty, M. (2019). Heuristic methods for synthesizing realistic social networks based on personality compatibility. Applied Network Science, 4, 141-158. https://doi.org/10.1007/s41109-019-0117-4.
Luo, T., Cao, Z., Zeng, D., & Zhang, Q. (2021). A Dissemination Model Based on Psychological Theories in Complex Social Networks. IEEE Transactions on Cognitive and Developmental Systems, 14(2), 519–531. https://doi.org/10.1109/TCDS.2021.3052824.
Moscato, V., Picariello, A., Sperlí, G. (2019). Community detection based on Game Theory. Engineering Applications of Artificial Intelligence, 85, 773-782. https://doi.org/10.1016/j.engappai.2019.08.003.
Plekhanov, D., Franke, H., & Netland, T. H. (2023). Digital transformation: A review and research agenda. European Management Journal, 41(6), 821-844. https://doi.org/10.1016/j.emj.2022.09.007.
Cen, J., & Li, Y. (2022). A Rumor Detection Method from Social Network Based on Deep Learning in Big Data Environment. Computational Intelligence and Neuroscience, 2022, 1354233. https://doi.org/10.1155/2022/1354233.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Articles are open access under the Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish a manuscript in this journal agree to the following terms:
- The authors reserve the right to authorship of their work and transfer to the journal the right of first publication under the terms of the Creative Commons Attribution License, which allows others to freely distribute the published work with a mandatory link to the the original work and the first publication of the work in this journal.
- Authors have the right to conclude independent additional agreements that relate to the non-exclusive distribution of the work in the form in which it was published by this journal (for example, to post the work in the electronic repository of the institution or publish as part of a monograph), providing the link to the first publication of the work in this journal.
- Other terms stated in the Copyright Agreement.