Advertisement

Who Influences Who?

A goal in social science is how to assess people's influence over one. Aral and Walker (p. 337, published online 21 June) describe a generalized method for identifying influential and susceptible members of social networks based on large-scale in vivo randomized experimentation. The method was used to estimate peer effects in consumer demand for a commercial Facebook application in a representative sample of 12 million Facebook users. Older users were more influential than younger users, women were more influential over men than men over women, and married individuals were the least susceptible to influence in the decision to adopt the product studied.

Abstract

Identifying social influence in networks is critical to understanding how behaviors spread. We present a method that uses in vivo randomized experimentation to identify influence and susceptibility in networks while avoiding the biases inherent in traditional estimates of social contagion. Estimation in a representative sample of 1.3 million Facebook users showed that younger users are more susceptible to influence than older users, men are more influential than women, women influence men more than they influence other women, and married individuals are the least susceptible to influence in the decision to adopt the product offered. Analysis of influence and susceptibility together with network structure revealed that influential individuals are less susceptible to influence than noninfluential individuals and that they cluster in the network while susceptible individuals do not, which suggests that influential people with influential friends may be instrumental in the spread of this product in the network.

Get full access to this article

View all available purchase options and get full access to this article.

Supplementary Material

Summary

Materials and Methods
Figs. S1 to S12
Tables S1 to S9

Resources

File (1215842.mp3)
File (aral.sm.pdf)

References and Notes

1
Aral S., Identifying social influence: A comment on opinion leadership and social contagion in new product diffusion. Mark. Sci. 30, 217 (2011).
2
Aral S., Walker D., Identifying social influence in networks using randomized experiments. IEEE Intell. Syst. 26, 91 (2011).
3
Kossinets G., Watts D. J., Empirical analysis of an evolving social network. Science 311, 88 (2006).
4
Lazer D., et al., Computational social science. Science 323, 721 (2009).
5
Eagle N., Macy M., Claxton R., Network diversity and economic development. Science 328, 1029 (2010).
6
Golder S. A., Macy M. W., Diurnal and seasonal mood vary with work, sleep, and daylength across diverse cultures. Science 333, 1878 (2011).
7
Aral S., Van Alstyne M. W., The diversity-bandwidth trade-off. Am. J. Sociol. 117, 90 (2011).
8
E. Sun, I. Rosenn, C. Marlow, T. Lento, in Proceedings of the Third International Conference on Weblogs and Social Media (AAAI Press, Menlo Park, CA, 2009).
9
J. Leskovec, L. A. Adamic, B. A. Huberman, The dynamics of viral marketing. ACM Trans. Web 10.1145/1232722.1232727 (2007).
10
McPherson M., Smith-Lovin L., Cook J. M., Birds of a feather: Homophily in social networks. Annu. Rev. Sociol. 27, 415 (2001).
11
Aral S., Muchnik L., Sundararajan A., Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proc. Natl. Acad. Sci. U.S.A. 106, 21544 (2009).
12
Manski C. F., Identification problems in the social sciences. Soc. Methodol. 23, 1 (1993).
13
Currarini S., Jackson M. O., Pin P., Identifying the roles of race-based choice and chance in high school friendship network formation. Proc. Natl. Acad. Sci. U.S.A. 107, 4857 (2010).
14
Noel H., Nyhan B., The “unfriending” problem: The consequences of homophily in friendship retention for causal estimates of social influence. Soc. Networks 33, 211 (2011).
15
Hartmann W., et al., Modeling social interactions: Identification, empirical methods and policy implications. Mark. Lett. 19, 287 (2008).
16
Christakis N. A., Fowler J. H., The spread of obesity in a large social network over 32 years. N. Engl. J. Med. 357, 370 (2007).
17
Lyons R., The spread of evidence-poor medicine via flawed social-network analysis. Stat. Polit. Policy 10.2202/2151-7509.1024 (2011).
18
Shalizi C. R., Thomas A. C., Homophily and contagion are generically confounded in observational social network studies. Sociol. Methods Res. 40, 211 (2011).
19
Aral S., Walker D., Creating social contagion through viral product design: A randomized trial of peer influence in networks. Manage. Sci. 57, 1623 (2011).
20
Centola D., The spread of behavior in an online social network experiment. Science 329, 1194 (2010).
21
Leider S., Möbius M. M., Rosenblat T., Do Q.-A., Directed altruism and enforced reciprocity in social networks. Q. J. Econ. 124, 1815 (2009).
22
E. Bakshy, I. Rosenn, C. Marlow, L. Adamic, in WWW ’12 Proceedings of the 21st International Conference on World Wide Web (ACM, New York, 2012), pp. 519–528.
23
Katz E., The two-step flow of communication: An up-to-date report on an hypothesis. Public Opin. Q. 21, 61 (1957).
24
T. W. Valente, Network Models of the Diffusion of Innovations (Hampton, Cresskill, NJ, 1995).
25
D. Kempe, J. Kleinberg, É. Tardos, in Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Association for Computing Machinery, New York, 2003), pp. 137–146.
26
Granovetter M., Threshold models of collective behavior. Am. J. Sociol. 83, 1420 (1978).
27
Watts D. J., Dodds P. S., Influentials, networks, and public opinion formation. J. Consum. Res. 34, 441 (2007).
28
Dodds P. S., Watts D. J., Universal behavior in a generalized model of contagion. Phys. Rev. Lett. 92, 218701 (2004).
29
Centola D., Macy M., Complex contagions and the weakness of long ties. Am. J. Sociol. 113, 702 (2007).
30
Godes D., et al., Mark. Lett. 16, 415 (2005).
31
Heath C., Bell C., Sternberg E., Emotional selection in memes: The case of urban legends. J. Pers. Soc. Psychol. 81, 1028 (2001).
32
Iyengar R., Van den Bulte C., Valente T. W., Opinion leadership and social contagion in new product diffusion. Marketing Sci. 30, 195 (2011).

(0)eLetters

eLetters is a forum for ongoing peer review. eLetters are not edited, proofread, or indexed, but they are screened. eLetters should provide substantive and scholarly commentary on the article. Embedded figures cannot be submitted, and we discourage the use of figures within eLetters in general. If a figure is essential, please include a link to the figure within the text of the eLetter. Please read our Terms of Service before submitting an eLetter.

Log In to Submit a Response

No eLetters have been published for this article yet.

Information & Authors

Information

Published In

Science
Volume 337 | Issue 6092
20 July 2012

Article versions

You are viewing the most recent version of this article.

Submission history

Received: 26 October 2011
Accepted: 30 May 2012
Published in print: 20 July 2012

Permissions

Request permissions for this article.

Acknowledgments

We thank S. Aral, H. Frydman, C. Hurvich, P. Perry, J. Simonoff, and M. Sternberg for invaluable discussions. Supported by a Microsoft research faculty fellowship (S.A.) and by NSF Career Award 0953832 (S.A.). The research was approved by the NYU institutional review board. There are legal obstacles to making the data available, but code is available upon request. The requests for data and randomization of message targets we used are standard ways in which applications request and use user data on Facebook. They are covered by the Facebook privacy policy and terms of service. Opt-in permissions were granted by the user to the application developer on a per-application basis when the user installed the application, via Facebook application authentication dialogs. In the dialogs we asked for all the categories of data we used in the study, and all of these requests were in line with the Facebook terms of service. Users saw these requests and opted in to them before installing the app.

Authors

Affiliations

Sinan Aral* [email protected]
Stern School of Business, New York University, New York, NY 10012, USA.
Dylan Walker* [email protected]
Stern School of Business, New York University, New York, NY 10012, USA.

Notes

*
To whom correspondence should be addressed. E-mail: [email protected] (S.A.); [email protected] (D.W.)

Metrics & Citations

Metrics

Article Usage

Altmetrics

Citations

Cite as

Export citation

Select the format you want to export the citation of this publication.

Cited by

  1. Finding influential subjects in a network using a causal framework, Biometrics, (2023).https://doi.org/10.1111/biom.13841
    Crossref
  2. Neurocomputational mechanism of real-time distributed learning on social networks, Nature Neuroscience, (2023).https://doi.org/10.1038/s41593-023-01258-y
    Crossref
  3. How Digital Platforms Organize Immaturity: A Sociosymbolic Framework of Platform Power, Business Ethics Quarterly, (1-33), (2023).https://doi.org/10.1017/beq.2022.40
    Crossref
  4. Targeted influence maximization in complex networks, Physica D: Nonlinear Phenomena, 446, (133677), (2023).https://doi.org/10.1016/j.physd.2023.133677
    Crossref
  5. Influence maximization considering fairness: A multi-objective optimization approach with prior knowledge, Expert Systems with Applications, 214, (119138), (2023).https://doi.org/10.1016/j.eswa.2022.119138
    Crossref
  6. Grouped spatial autoregressive model, Computational Statistics & Data Analysis, 178, (107601), (2023).https://doi.org/10.1016/j.csda.2022.107601
    Crossref
  7. AOGC: An improved gravity centrality based on an adaptive truncation radius and omni-channel paths for identifying key nodes in complex networks, Chaos, Solitons & Fractals, 166, (112974), (2023).https://doi.org/10.1016/j.chaos.2022.112974
    Crossref
  8. Social influence or risk perception? A mathematical model of self-protection against asymptomatic infection in multilayer network, Chaos, Solitons & Fractals, 166, (112925), (2023).https://doi.org/10.1016/j.chaos.2022.112925
    Crossref
  9. Regulating clustering and assortativity affects node centrality in complex networks, Chaos, Solitons & Fractals, 166, (112880), (2023).https://doi.org/10.1016/j.chaos.2022.112880
    Crossref
  10. Medical Crowdfunding Campaign Sharing Behaviour on Mobile Social Media, Journal of Organizational and End User Computing, 34, 1, (1-35), (2022).https://doi.org/10.4018/JOEUC.309988
    Crossref
  11. See more
Loading...

View Options

Check Access

Log in to view the full text

AAAS ID LOGIN

AAAS login provides access to Science for AAAS Members, and access to other journals in the Science family to users who have purchased individual subscriptions.

Log in via OpenAthens.
Log in via Shibboleth.

More options

Register for free to read this article

As a service to the community, this article is available for free. Login or register for free to read this article.

Purchase this issue in print

Buy a single issue of Science for just $15 USD.

View options

PDF format

Download this article as a PDF file

Download PDF

Full Text

FULL TEXT

Media

Figures

Multimedia

Tables

Share

Share

Share article link

Share on social media