Computer Science ›› 2023, Vol. 50 ›› Issue (7): 376-385.doi: 10.11896/jsjkx.220900084

• Interdiscipline & Frontier • Previous Articles    

Modeling and Simulation of Point-to-Point Propagation of False Information Based on Information Risk Perception

YU Kai1, SU Tianrui2   

  1. 1 School of Public Administration,Xinjiang University of Finance and Economics,Urumqi 830012,China
    2 School of Information Management,Xinjiang University of Finance and Economics,Urumqi 830012,China
  • Received:2022-09-09 Revised:2023-03-10 Online:2023-07-15 Published:2023-07-05
  • About author:YU Kai,born in 1974,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include data mining and knowledge graph,emergencies and online public opinion.SU Tianrui,born in 1997,postgraduate,is a member of China Computer Federation.His main research interests include social network and data mining.
  • Supported by:
    Social Science Foundation of Xinjiang Uygur Autonomous Region(21BTQ162),Natural Science Foundation of Xinjiang Uygur Autonomous Region,China(2019D01A22) and Natural Science Foundation of Henan Province,China(202300410301).

Abstract: In the study of computational social science,the propagation model inspired by infectious diseases is widely used to simulate the spread of false information.However,the traditional infectious disease model does not distinguish the differences among individuals.In the real world,the difference between individuals helps to understand how false information spreads between individuals ,which is of great significance for exploring the propagation law of false information in social networks and suppressing the spread of false information.Based on the information risk perception theory,this paper makes use of online social users’ emotion,knowledge level,trust and the number of media contacts to distinguish the differences of communication indivi-duals,and builds a more realistic point-to-point communication model of false information.In the process of communication,the differences between individuals are manifested in different communication probabilities.Individuals with high communication probabilities are more likely to be transformed into communication states.This paper uses the manually annotated Facebook data set to conduct simulation to study the propagation laws of false information.The results show that,compared with the average probability propagation system,the time span of spreading false information in the point-to-point propagation mode will be longer and the coverage will be wider.In addition,by controlling the nodes with high propagation probability,it is possible to control the propagation of false information in advance,and it has achieved better results than the methods of random control and controlling the nodes with high influence.However,increasing the control proportion of nodes in turn can not achieve better control results as expected,and the characteristics of “anti common sense” appear.

Key words: Information risk perception, False information, Point-to-Point propagation, Dissemination control, Comparative analysis

CLC Number: 

  • TP391.9
[1]ZHANG L,LI S L.The transformation of public livelihood risk perception under the background of ICT popularization[J].Studies in Science of Science,2023,41(2):276-285.
[2]ANNELIESE D,SAM M,E,ILIE K,et al.The pandemic of social media panic travels faster than the COVID-19 outbreak[J].Journal of Travel Medicine,2020,27(3):1-2.
[3]VOSOUGHI S,ROY D,ARAL S.The spread of true and falsenews online[J].Science,2018,359(6380):1146-1151.
[4]WANG C C,CHEN C.Rumor propgtion model based on complex network[J].Systems Engineering Theory and Practice,2012,32(1):203-210.
[5]SHARAD G,ASHTON A,JAKE M.et al.The Structural Virality of Online Diffusion[J].Management Science,2015,62(1):180-196.
[6]DALEY D J,KENDALL D G.Epidemics and Rumours [J].Nature,1965,204(4963):1118.
[7]ROMUALDO P S,ALESSANDRO V.Epidemic dynamics and endemic states in complex networks[J].Physical Review E,2001,63(6):066117.
[8]LIU C Y,HU X F,SI G Y.Public Opinion Propagation Model Based on Small World Networks[J].Journal of System Simulation,2006(12):3608-3610.
[9]ZENG F.A Model Study of Crisis Information Transmittingbased on Small World Networks[D].Hefei:University of Science and Technology of China,2009.
[10]PEI S,MUCHNIK L,TANG S T,et al.Exploring the complex pattern of information spreading in online blog communities[J].PloS one,2015,10(5):e0126894.
[11]TAN Z H,SHI Y C,SHI N X,et al.Rumor Propagation Analysis Model Inspired by Gravity Theory for Online Social Networks[J].Journal of Computer Research and Development,2017,54(11):2586-2599.
[12]SHAO C C,CIAMPAGLIA G L,VAROL O,et al.The spread of low-credibility content by social bots.[J].Nature Communications,2018,9(1):1-9.
[13]GLENSKI M,WENINGER T,VOLKOVA S.Propagation from Deceptive News Sources Who Shares,How Much,How Evenly,and How Quickly?[J].IEEE Transactions on Computational Social Systems,2018,5(4):1071-1082.
[14]SUN L T,LI C F,TAO J Q.Simulation of False Public Opinion Dissemination Based on Multi-Agent [J].Journal of Information,2017,36(4):162-169.
[15]ZHOU B,PEI S,MUCHNIK L,et al.Realistic modelling of information spread using peer-to-peer diffusion patterns[J].Nature Human Behaviour,2020,4(11):1-10.
[16]HUO Y J,GUO N S,YAN J Q.Time-lag and Sentiment Correlation Analysis in the Diffusion of Misinformation in Public Health Emergencies[J].Information Science,2021,39(5):62-69.
[17]ZHANG Z Y,JING J C,LI F,et al.Survey on Fake Information Detection,Propagation and Control in Online Social Networks from the Perspective of Artificial Intelligenceand[J].Chinese Journal of Computers,2021,44(11):2261-2282.
[18]CHEN T Z,GUO Y C,NIU B,et al.Research progress of access control model and policy in online social networks[J].Chinese Journal of Network and Information Security,2016,2(8):1-9.
[19]WANG Y G,CAI F Z,LUA E K,et al.A Duffusion ControlMethod of Fake Information in Social Networks [J].Journal of Computer Research and Development,2012,49(S2):131-137.
[20]YU K,BAI X K,GUO Y J.Traceability of Network PublicOpinion Information Sources Based on Multicentric Analysis[J].Journal of Information,2022,41(3):166-172.
[21]HE Z B,CAI Z P,YU J G,et al.Cost-efficient strategies for restraining rumor spreading in mobile social networks[J].IEEE Transactions on Vehicular Technology,2017,66(3):2789-2800.
[22]SONG H Y.A summary of the research on the risk perception characteristics of public crisis events[J].PSY,2021,16(21):223-224,227.
[23]LIU S,HUANG J C,BROWN G L.Information and risk perception:a dynamic adjustment process.[J].Risk Analysis:An Official Publication of the Society for Risk Analysis,1998,18(6):689-699.
[24]ZHANG W D,LUAN B Y,LI S T.Research on InfluencingFactors of Network False Information Transmission Behavior Based on Information Risk Perception[J].Information Studies:Theory & Application,2019,42(9):93-98,110.
[25]LI G X,YANG X,LI M X,et al.Influencing Factors of theUsers’ Information Dissemination Behavior in Real-Name SNS Websites[J].Journal of Information,2014,33(3):176-181,121.
[26]TANG X B,LUO Y L.Integrating Emotional Divergence and User Interests into the Prediction of Microblog Retweeting[J].Library and Information Service,2017,61(9):102-110.
[27]KIMBLE C,GRENIER C,GOGLIO-PRIMARD K.Innovationand Knowledge Sharing Across Professional Boundaries:Political Interplay between Boundary Objects and Brokers[J].Post-Print,2010,30(5):437-444.
[28]ROSENKRAN Z,CHRISTOP H,VRANESI C,et al.Boundary Interactions and Motors of Change in Requirements Elicitation:A Dynamic Perspective on Knowledge Sharing[J].Journal of the Association for Information Systems,2014,15(6):306-345.
[29]WU F,LI R,HUANG L,et al.Theme evolution analysis ofelectrochemical energy storage research based on CitNet Explo-rer[J].Scientometrics,2016,110(1):1-27.
[30]TRUMBO C W,MCCOMAS K A.The Function of Credibility in Information Processing for Risk Perception[J].Risk Analysis,2010,23(2):343-353.
[31]DUAN H,ZHANG H.Research on the Causative Factors ofDisinformation towards Internet Users[J].Journal of Information,2022,41(4):160-165.
[32]SHARAD G,ASHTON A,JAKE M.H,et al.The Structural Virality of Online Diffusion.[J].Management Science,2016,62(1):180-196.
[33]MONSTED B,SAPIEZYNSKI P,FERRARA E,et al.Evidence of complex contagion of information in social media:An experiment using Twitter bots[J].PloS one,2017,12(9):e0184148.
[34]LÜ L Y,CHEN D B,ZHOU T.The small world yields the most effective information spreading[J].New Journal of Physics,2011,13(12):123005.
[35]DAMON C.The Spread of Behavior in an Online Social Network Experiment[J].Science,2010,329(5996):1194-1197.
[36]ZHANG Y M,HE X,DU C C,et al.IESR Model of Emotional Transmission of Netizens under the Effect of Negative Emotions[J].Information Science,2020,38(10):29-34.
[37]MCAULEY J J,LESKOVEC J.Learning to discover social circles in ego networks[C]//Proceedings of the 25th International Conference on Neural Information Processing Systems.Curran Associates Inc.,2012:539-547.
[38]China Internet Network Information Center(CNNIC).The 48th statistical report on China’s Internet development [R].[2021-08-27].
[39]DICKERSON J P,KAGAN V,SUBRAHMANIA V S.Using sentiment to detect bots on twitter:are humans more opiniona-ted than bots? [C]//ACM International Conference on Advances in Social Networks Analysis and Mining.Beijing,China,ACM Press,2014:620-627.
[40]JONHNSON N F,LEAHY R,RESTREPO N J.et al.Hidden resilience and adaptive dynamics of the global online hate ecology[J].Nature,2019,573:261-265.
[41]QI K,PENG C,YANG Z,et al.Research on Network PublicOpinion Governance of Emergent Crisis Events Based on the SEIR Evolutionary Game Model[J].Journal of Modern Information,2022,42(4):120-133.
[1] WANG Jian, WANG Yu-cui, HUANG Meng-jie. False Information in Social Networks:Definition,Detection and Control [J]. Computer Science, 2021, 48(8): 263-277.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!