{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:19:58Z","timestamp":1761581998097,"version":"build-2065373602"},"reference-count":26,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["JP19H02135, 19H04096"],"award-info":[{"award-number":["JP19H02135, 19H04096"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>This paper investigates the dynamics of information spread across social network services (SNSs) such as Twitter using the susceptible-infected-recovered (SIR) model. In the analysis, the non-responsiveness of individual users is taken into account; a user probabilistically spreads the received information, where not spreading (not responding) is equivalent to that the received information is not noticed. In most practical applications, an exact analytic solution is not available for the SIR model, so previous studies have largely been based on the assumption that the probability of an SNS user having the target information is independent of whether or not its neighbors have that information. In contrast, we propose a different approach based on a \u201cstrong correlation assumption\u201d, in which the probability of an SNS user having the target information is strongly correlated with whether its neighboring users have that information. To account for the non-responsiveness of individual users, we also propose the \u201crepresentative-response-based analysis\u201d, in which some information spreading patterns are first obtained assuming representative response patterns of each user and then the results are averaged. Through simulation experiments, we show that the combination of this strong correlation assumption and the representative-response-based analysis makes it possible to analyze the spread of information with far greater accuracy than the traditional approach.<\/jats:p>","DOI":"10.3390\/computers9030065","type":"journal-article","created":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T09:23:44Z","timestamp":1597310624000},"page":"65","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Information Spread across Social Network Services with Non-Responsiveness of Individual Users"],"prefix":"10.3390","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5112-4933","authenticated-orcid":false,"given":"Shigeo","family":"Shioda","sequence":"first","affiliation":[{"name":"Graduate School of Engineering, Chiba University, 1-33 Yayoi, Inage, Chiba 263-8522, Japan"},{"name":"Graduate School of Science and Engineering, Chiba University, 1-33 Yayoi, Inage, Chiba 263-8522, Japan"}]},{"given":"Keisuke","family":"Nakajima","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Engineering, Chiba University, 1-33 Yayoi, Inage, Chiba 263-8522, Japan"}]},{"given":"Masato","family":"Minamikawa","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Engineering, Chiba University, 1-33 Yayoi, Inage, Chiba 263-8522, Japan"}]}],"member":"1968","published-online":{"date-parts":[[2020,8,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Shioda, S., and Minamikawa, M. (2019, January 22\u201325). Features Found in Twitter Data and Examination of Retweeting Behavior. Proceedings of the 2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS), Granada, Spain.","DOI":"10.1109\/SNAMS.2019.8931861"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"700","DOI":"10.1098\/rspa.1927.0118","article-title":"A contribution to the mathematical theory of epidemics","volume":"115","author":"Kermack","year":"1927","journal-title":"Proc. R. Soc. Lond. Ser. A"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"925","DOI":"10.1103\/RevModPhys.87.925","article-title":"Epidemic processes in complex networks","volume":"87","author":"Castellano","year":"2015","journal-title":"Rev. Mod. Phys."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1007\/s00285-008-0161-7","article-title":"Deterministic epidemiological models at the individual level","volume":"57","author":"Sharkey","year":"2008","journal-title":"J. Math. Biol."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.tpb.2011.01.004","article-title":"Deterministic epidemic models on contact networks: Correlations and unbiological terms","volume":"79","author":"Sharkey","year":"2011","journal-title":"Theor. Popul. Biol."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"042815","DOI":"10.1103\/PhysRevE.87.042815","article-title":"Exact epidemic analysis for the star topology","volume":"87","author":"Schwartz","year":"2013","journal-title":"Phys. Rev. E"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Van Mieghem, P. (2014). Performance Analysis of Complex Networks and Systems, Cambridge University Press.","DOI":"10.1017\/CBO9781107415874"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.jtbi.2011.05.029","article-title":"An individual-based approach to SIR epidemics in contact networks","volume":"283","author":"Youssef","year":"2011","journal-title":"J. Theor. Biol."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1137\/S003614450342480","article-title":"The structure and function of complex networks","volume":"45","author":"Newman","year":"2003","journal-title":"SIAM Rev."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Shioda, S., and Minamikawa, M. (2020, January 17\u201320). Analysis of Information Spread on SNSs Based on Strong Correlation Assumption. Proceedings of the 2020 International Conference on Computing, Networking and Communications (ICNC), Big Island, HI, USA.","DOI":"10.1109\/ICNC47757.2020.9049806"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Shioda, S., and Nakajima, Y. (2019, January 18\u201320). Information spread across social network services with users\u2019 information indifference behavior. Proceedings of the 2019 11th Computer Science and Electronic Engineering (CEEC), Colchester, UK.","DOI":"10.1109\/CEEC47804.2019.8974335"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Anderson, R., and May, R.M. (1992). Infectious Diseases in Humans, Oxford University Press.","DOI":"10.1093\/oso\/9780198545996.001.0001"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3200","DOI":"10.1103\/PhysRevLett.86.3200","article-title":"Epidemic Spreading in Scale-Free Networks","volume":"86","author":"Vespignani","year":"2001","journal-title":"Phys. Rev. Lett."},{"key":"ref_14","first-page":"047104","article-title":"Epidemic spreading in correlated complex networks","volume":"E66","author":"Boguna","year":"2002","journal-title":"Phys. Rev."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"13.1","DOI":"10.1145\/1284680.1284681","article-title":"Epidemic thresholds in real networks","volume":"10","author":"Chakrabarti","year":"2008","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_16","first-page":"1","article-title":"Virus Spread in Networks","volume":"17","author":"Omic","year":"2008","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Leskovec, J., McGlohon, M., Faloutsos, C., Glance, N., and Hurst, M. (2007, January 26\u201328). Patterns of Cascading Behavior in Large Blog Graphs. Proceedings of the 2007 SIAM International Conference on Data Mining, Minneapolis, MN, USA.","DOI":"10.1137\/1.9781611972771.60"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.1016\/j.comnet.2011.10.020","article-title":"Delayed information cascades in Flickr: Measurement, analysis, and modeling","volume":"56","author":"Cha","year":"2012","journal-title":"Comput. Netw."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"598","DOI":"10.20965\/jaciii.2014.p0598","article-title":"SIR-Extended Information Diffusion Model of False Rumor and its Prevention Strategy for Twitter","volume":"18","author":"Okada","year":"2014","journal-title":"J. Adv. Comput. Intell. Intell. Inform."},{"key":"ref_20","unstructured":"Bauckhage, C., Hadiji, F., and Kersting, K. (2015, January 26\u201329). How Viral Are Viral Videos?. Proceedings of the 9th International AAAI Conference on Web and Social Media, Oxford, UK."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Cheng, J., Adamic, L., Kleinberg, J., and Leskovec, J. (2016, January 11\u201315). Do Cascades Recur?. Proceedings of the 25th International World Wide Web Conference, Montreal, QC, USA.","DOI":"10.1145\/2872427.2882993"},{"key":"ref_22","unstructured":"Leskovec, J. (2019, May 04). Stanford Large Network Dataset Collection. Available online: https:\/\/snap.stanford.edu\/data\/."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"056111","DOI":"10.1103\/PhysRevE.85.056111","article-title":"Second-order mean-field susceptible-infected-susceptible epidemic threshold","volume":"85","author":"Cator","year":"2012","journal-title":"Phys. Rev. E"},{"key":"ref_24","unstructured":"Wang, Y., Chakrabarti, D., Wang, C., and Faloutsos, C. (2003, January 6\u20138). Epidemic spreading in real networks: An eigenvalue viewpoint. Proceedings of the 22nd International Symposium on Reliable Distributed Systems, Florence, Italy."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/s00285-014-0772-0","article-title":"Exact deterministic representation of Markovian SIR epidemics on networks with and without loops","volume":"70","author":"Kiss","year":"2015","journal-title":"J. Math. Biol."},{"key":"ref_26","unstructured":"Shioda, S. (2020). Analyzing the Spreading of Viral Tweets on Twitter\u2014How a Tweet Goes Viral on Twitter, IEICE. IEICE Technical Report, IN2020-4."}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/9\/3\/65\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:00:25Z","timestamp":1760176825000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/9\/3\/65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,13]]},"references-count":26,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2020,9]]}},"alternative-id":["computers9030065"],"URL":"https:\/\/doi.org\/10.3390\/computers9030065","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2020,8,13]]}}}