{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T01:20:18Z","timestamp":1767144018351,"version":"build-2238731810"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T00:00:00Z","timestamp":1716854400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T00:00:00Z","timestamp":1716854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100009057","name":"University of Graz","doi-asserted-by":"crossref","award":["Not applicable"],"award-info":[{"award-number":["Not applicable"]}],"id":[{"id":"10.13039\/501100009057","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100009057","name":"University of Graz","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100009057","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Soc Sc"],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Contagions refer to the spread or transmission of diseases, behaviors, beliefs, or emotions. While some contagions easily propagate throughout entire populations, others seem to be more constrained and propagate only within specific parts of the population. This arises not just because of different transmission rates but because of qualitative differences in the mechanisms with which contagions propagate throughout a network. Diseases typically propagate through single connections, while behaviors and beliefs often necessitate multiple connections for further propagation, termed complex contagions. In this paper, we propose a graph reduction method to reduce a network to include only connections immediately relevant to the propagation of a complex contagion. Through repeated application, we obtain structures that remain stable under the reduction, allowing us to define and measure for any given network, (i) strongly contagious components, (ii) weakly contagious components, and (iii) bridge components. Information about the size and location of these components can be used as a meaningful basis to assess and prevent the potential spread of harmful contagions as well as incentivize the spread of beneficial contagions.<\/jats:p>","DOI":"10.1007\/s42001-024-00294-3","type":"journal-article","created":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T14:53:35Z","timestamp":1717167215000},"page":"1895-1911","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Patterns of stability in complex contagions"],"prefix":"10.1007","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2541-4467","authenticated-orcid":false,"given":"Daniel","family":"Reisinger","sequence":"first","affiliation":[]},{"given":"Fabian","family":"Tschofenig","sequence":"additional","affiliation":[]},{"given":"Raven","family":"Adam","sequence":"additional","affiliation":[]},{"given":"Marie Lisa","family":"Kogler","sequence":"additional","affiliation":[]},{"given":"Manfred","family":"F\u00fcllsack","sequence":"additional","affiliation":[]},{"given":"Fabian","family":"Veider","sequence":"additional","affiliation":[]},{"given":"Georg","family":"J\u00e4ger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,28]]},"reference":[{"issue":"5996","key":"294_CR1","doi-asserted-by":"publisher","first-page":"1194","DOI":"10.1126\/science.1185231","volume":"329","author":"D Centola","year":"2010","unstructured":"Centola, D. (2010). The spread of behavior in an online social network experiment. Science, 329(5996), 1194\u20131197.","journal-title":"Science"},{"issue":"6060","key":"294_CR2","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1126\/science.1207055","volume":"334","author":"D Centola","year":"2011","unstructured":"Centola, D. (2011). An experimental study of homophily in the adoption of health behavior. Science, 334(6060), 1269\u20131272.","journal-title":"Science"},{"key":"294_CR3","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvc7758p","volume-title":"How Behavior Spreads: The Science of Complex Contagions","author":"D Centola","year":"2018","unstructured":"Centola, D. (2018). How Behavior Spreads: The Science of Complex Contagions. Princeton, NJ: Princeton University Press."},{"issue":"3","key":"294_CR4","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1086\/521848","volume":"113","author":"D Centola","year":"2007","unstructured":"Centola, D., & Macy, M. (2007). Complex contagions and the weakness of long ties. American Journal of Sociology, 113(3), 702\u2013734.","journal-title":"American Journal of Sociology"},{"key":"294_CR5","doi-asserted-by":"crossref","unstructured":"State, B., & Adamic, L. (2015).The diffusion of support in an online social movement: Evidence from the adoption of equal-sign profile pictures. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 1741\u20131750","DOI":"10.1145\/2675133.2675290"},{"issue":"9","key":"294_CR6","doi-asserted-by":"publisher","first-page":"0184148","DOI":"10.1371\/journal.pone.0184148","volume":"12","author":"B M\u00f8nsted","year":"2017","unstructured":"M\u00f8nsted, B., Sapie\u017cy\u0144ski, P., Ferrara, E., & Lehmann, S. (2017). Evidence of complex contagion of information in social media: An experiment using twitter bots. PLoS ONE, 12(9), 0184148.","journal-title":"PLoS ONE"},{"issue":"6","key":"294_CR7","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1086\/225469","volume":"78","author":"MS Granovetter","year":"1973","unstructured":"Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78(6), 1360\u20131380.","journal-title":"American Journal of Sociology"},{"issue":"6","key":"294_CR8","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter, M. (1978). Threshold models of collective behavior. American Journal of Sociology, 83(6), 1420\u20131443.","journal-title":"American Journal of Sociology"},{"key":"294_CR9","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1146\/annurev-soc-073117-041421","volume":"45","author":"J Zhang","year":"2019","unstructured":"Zhang, J., & Centola, D. (2019). Social networks and health: New developments in diffusion, online and offline. Annual Review of Sociology, 45, 91\u2013109.","journal-title":"Annual Review of Sociology"},{"issue":"8","key":"294_CR10","doi-asserted-by":"publisher","first-page":"69162","DOI":"10.1371\/journal.pone.0069162","volume":"8","author":"JC Miller","year":"2013","unstructured":"Miller, J. C., & Volz, E. M. (2013). Incorporating disease and population structure into models of sir disease in contact networks. PLoS ONE, 8(8), 69162.","journal-title":"PLoS ONE"},{"issue":"11","key":"294_CR11","doi-asserted-by":"publisher","first-page":"1000968","DOI":"10.1371\/journal.pcbi.1000968","volume":"6","author":"AL Hill","year":"2010","unstructured":"Hill, A. L., Rand, D. G., Nowak, M. A., & Christakis, N. A. (2010). Infectious disease modeling of social contagion in networks. PLoS Computational Biology, 6(11), 1000968.","journal-title":"PLoS Computational Biology"},{"issue":"3","key":"294_CR12","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.ecocom.2005.04.005","volume":"2","author":"MD Shirley","year":"2005","unstructured":"Shirley, M. D., & Rushton, S. P. (2005). The impacts of network topology on disease spread. Ecological Complexity, 2(3), 287\u2013299.","journal-title":"Ecological Complexity"},{"issue":"4","key":"294_CR13","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1056\/NEJMsa066082","volume":"357","author":"NA Christakis","year":"2007","unstructured":"Christakis, N. A., & Fowler, J. H. (2007). The spread of obesity in a large social network over 32 years. New England Journal of Medicine, 357(4), 370\u2013379.","journal-title":"New England Journal of Medicine"},{"issue":"33","key":"294_CR14","doi-asserted-by":"publisher","first-page":"10551","DOI":"10.1073\/pnas.1507820112","volume":"112","author":"L H\u00e9bert-Dufresne","year":"2015","unstructured":"H\u00e9bert-Dufresne, L., & Althouse, B. M. (2015). Complex dynamics of synergistic coinfections on realistically clustered networks. Proceedings of the National Academy of Sciences, 112(33), 10551\u201310556.","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"294_CR15","doi-asserted-by":"crossref","unstructured":"Guilbeault, D., Becker, J., & Centola, D. (2018). Complex contagions: A decade in review. Complex spreading phenomena in social systems: Influence and contagion in real-world social networks, 3\u201325","DOI":"10.1007\/978-3-319-77332-2_1"},{"issue":"1","key":"294_CR16","doi-asserted-by":"publisher","first-page":"4430","DOI":"10.1038\/s41467-021-24704-6","volume":"12","author":"D Guilbeault","year":"2021","unstructured":"Guilbeault, D., & Centola, D. (2021). Topological measures for identifying and predicting the spread of complex contagions. Nature Communications, 12(1), 4430.","journal-title":"Nature Communications"},{"key":"294_CR17","first-page":"71","volume":"3","author":"DJ O\u2019Sullivan","year":"2015","unstructured":"O\u2019Sullivan, D. J., O\u2019Keeffe, G. J., Fennell, P. G., & Gleeson, J. P. (2015). Mathematical modeling of complex contagion on clustered networks. Frontiers in Physics, 3, 71.","journal-title":"Frontiers in Physics"},{"key":"294_CR18","unstructured":"Tschofenig, F., Reisinger, D., & J\u00e4ger, G. (2023). Exploring complex contagions on progressively sparse networks: A study of non-linear graph reduction. In: Proceedings of the Scientific Computing Conference, 126\u2013132"},{"issue":"1","key":"294_CR19","doi-asserted-by":"publisher","first-page":"2485","DOI":"10.1038\/s41467-019-10431-6","volume":"10","author":"I Iacopini","year":"2019","unstructured":"Iacopini, I., Petri, G., Barrat, A., & Latora, V. (2019). Simplicial models of social contagion. Nature Communications, 10(1), 2485.","journal-title":"Nature Communications"},{"issue":"1","key":"294_CR20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.5.013201","volume":"5","author":"M Lucas","year":"2023","unstructured":"Lucas, M., Iacopini, I., Robiglio, T., Barrat, A., & Petri, G. (2023). Simplicially driven simple contagion. Physical Review Research, 5(1), 013201.","journal-title":"Physical Review Research"},{"key":"294_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111307","volume":"152","author":"Z Li","year":"2021","unstructured":"Li, Z., Deng, Z., Han, Z., Alfaro-Bittner, K., Barzel, B., & Boccaletti, S. (2021). Contagion in simplicial complexes. Chaos, Solitons & Fractals, 152, 111307.","journal-title":"Chaos, Solitons & Fractals"},{"issue":"2261","key":"294_CR22","doi-asserted-by":"publisher","first-page":"20220059","DOI":"10.1098\/rspa.2022.0059","volume":"478","author":"J Fan","year":"2022","unstructured":"Fan, J., Yin, Q., Xia, C., & Perc, M. (2022). Epidemics on multilayer simplicial complexes. Proceedings of the Royal Society A, 478(2261), 20220059.","journal-title":"Proceedings of the Royal Society A"},{"issue":"1","key":"294_CR23","doi-asserted-by":"publisher","first-page":"2313171120","DOI":"10.1073\/pnas.2313171120","volume":"121","author":"Y Chen","year":"2024","unstructured":"Chen, Y., Gel, Y. R., Marathe, M. V., & Poor, H. V. (2024). A simplicial epidemic model for covid-19 spread analysis. Proceedings of the National Academy of Sciences, 121(1), 2313171120.","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"294_CR24","doi-asserted-by":"crossref","unstructured":"Rozemberczki, B., Davies, R., Sarkar, R., &Sutton, C. (2019). Gemsec: Graph embedding with self clustering. In: Proceedings of the 2019 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, 65\u201372.","DOI":"10.1145\/3341161.3342890"},{"key":"294_CR25","doi-asserted-by":"crossref","unstructured":"Rossi, R.A., & Ahmed, N.K.(2015). The network data repository with interactive graph analytics and visualization. In: AAAI . https:\/\/networkrepository.com","DOI":"10.1609\/aaai.v29i1.9277"},{"key":"294_CR26","doi-asserted-by":"crossref","unstructured":"Hagberg, A., Swart, P., & S\u00a0Chult, D. (2008). Exploring network structure, dynamics, and function using NetworkX . https:\/\/networkx.org\/","DOI":"10.25080\/TCWV9851"},{"key":"294_CR27","unstructured":"Barab\u00e1si, A.-L. (2016). Network Science. Cambridge University Press"},{"key":"294_CR28","doi-asserted-by":"crossref","unstructured":"Erd\u0151s, P., & R\u00e9nyi, A. (1959). On random graphs. Publ. math. debrecen,6(290\u2013297), 18.","DOI":"10.5486\/PMD.1959.6.3-4.12"},{"issue":"6684","key":"294_CR29","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts, D. J., & Strogatz, S. H. (1998). Collective dynamics of small-world networks. Nature, 393(6684), 440\u2013442.","journal-title":"Nature"},{"key":"294_CR30","doi-asserted-by":"crossref","unstructured":"Barab\u00e1si, A.-L., & Albert, R. (1999). Emergence of scaling in random networks. Science, 286(5439), 509\u2013512.","DOI":"10.1126\/science.286.5439.509"},{"issue":"2","key":"294_CR31","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.026107","volume":"65","author":"P Holme","year":"2002","unstructured":"Holme, P., & Kim, B. J. (2002). Growing scale-free networks with tunable clustering. Physical Review E, 65(2), 026107.","journal-title":"Physical Review E"},{"issue":"3","key":"294_CR32","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.105.034306","volume":"105","author":"LA Keating","year":"2022","unstructured":"Keating, L. A., Gleeson, J. P., & O\u2019Sullivan, D. J. (2022). Multitype branching process method for modeling complex contagion on clustered networks. Physical Review E, 105(3), 034306.","journal-title":"Physical Review E"}],"updated-by":[{"DOI":"10.1007\/s42001-025-00389-5","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T00:00:00Z","timestamp":1749513600000}}],"container-title":["Journal of Computational Social Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-024-00294-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42001-024-00294-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-024-00294-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T03:25:59Z","timestamp":1749525959000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42001-024-00294-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,28]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["294"],"URL":"https:\/\/doi.org\/10.1007\/s42001-024-00294-3","relation":{},"ISSN":["2432-2717","2432-2725"],"issn-type":[{"value":"2432-2717","type":"print"},{"value":"2432-2725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,28]]},"assertion":[{"value":"10 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2025","order":4,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":5,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s42001-025-00389-5","URL":"https:\/\/doi.org\/10.1007\/s42001-025-00389-5","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The code is available in the appendix.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}