Information Spread in a Social Media Age: Modeling and Control


Expressions of InformationWhy Information Spread Matters?Modern Information Spread ScenariosGlobal Communication During a PandemicGovernments and Mass PanicShopping and AdvertisingSocial or Political CampaigningMisinformation, Disinformation, and Fake NewsControllable Information SpreadHow to Read This BookExercisesI. Understanding Social Networking SystemsSocial Media in Popular CultureThe Topology of Social MediaSocial Networking SitesTwitterFacebookLinkedInContent Sharing SitesDiscussion ForumsNews and BlogsShopping and ReviewsGames and MusicHybrid Social MediaInternet MemesExercisesSocial Theory and NetworksPhilosophy, Science, and Information SpreadThe Ancient WorldThe Medieval WorldThe Early Modern WorldThe Contemporary WorldSocial Theory and Social NetworksSocial Exchange TheoryExercisesSocial Network Relationships and StructuresSocial Network Relationship OverviewCore Social Network RelationshipsSymmetryDirectionalityIntermediary RelationshipsComplex NetworksHomophily and Filter BubblesDyadic Relationships and ReciprocityTriads and Balanced RelationshipsSocial Network Analysis SoftwareExercisesSocial Network AnalysisDensity and Structural HolesWeak and Strong TiesCentrality and DistanceSmall World NetworksClusters, Cohesion, and PolarizationThe Adjacency MatrixExample: A Fencing Club SociogramExercisesII. Macroscopic Modeling and Information SpreadModeling BasicsWhat is a Model?Models in Decision MakingStandard ModelsModels, Assumptions, and ApproximationsMathematical Systems ModelingMicroscopic and Macroscopic ModelsBasic Steps to Develop a Mathematical ModelModel ValidationModeling and the State-Space RepresentationExample 1: A Spring-Mass SystemExample 2: A Predator-Prey SystemExample 3: An RLC CircuitExample 4: An Epidemic ModelExample 5: Vehicular Tra c ModelingLWR and Greenshields' Models for Tra cODE Approximation of LWR ModelExercisesEpidemiology-Based Models for Information SpreadEpidemiology ModelsThe SIR Disease Spread ModelThe SEIR Disease Spread ModelHerd Immunity in EpidemiologyFlattening the Curve"Information Spread Models: Overview and ConventionsThe Ignorant-Spreader ModelThe Ignorant-Spreader-Ignorant (ISI) ModelThe Ignorant-Spreader-Recovered (ISR) ModelReproductive Number and Herd ImmunityISR Model for Social MediaISR Model for Social Media with DecayISCR Model for Contentious Information SpreadHybrid ISCR ModelISSRR Model for Contentious InformationExercisesStochastic Modeling of Information SpreadBrownian MotionDeterministic and Stochastic Realizations of ProcessesStochastic Modeling Considerations for Social Media SystemsStochastic ISI Information ModelStochastic ISR Information Modeling and Social MediaExercisesSocial Marketing-Based Models for Information SpreadVidale-Wolfe ModelBass ModelSethi ModelEvent-triggered Social Media Chatter ModelSocio-Equilibrium ThresholdSimulation and DiscussionExercisesCase StudiesSelecting Case StudiesCase Study-1: 2017. Mass ShootingsData AcquisitionParameter EstimationResults and DiscussionCase Study-2: The #MeToo Social MovementData AcquisitionParameter EstimationResults and DiscussionCase Study-3: 2018. Golden Globe AwardsData AcquisitionParameter EstimationResults and DiscussionCase Study-4: Viral Internet DebatesData AcquisitionParameter EstimationResults and DiscussionExercisesIII. Control Methods For Information SpreadControl BasicsIntroductionOpen-loop and Closed-loop Control SystemsSISO and MIMO Control SystemsContinuous-time and Discrete-time Control SystemsControl System DesignControl MethodsState Variable Feedback ControllerFull-state Feedback Control DesignObserver DesignFull-state Feedback Controller and ObserverPID ControllerOptimal ControlPerformance MeasureDynamic Programming and Principle of OptimalityPontryagin's Minimization PrincipleIllustrative ExampleExercisesInformation Spread and ControlControlling Socio-technical SystemsThe Control Action and Social Media SystemsOptimal Control and Social MediaExercisesControl Application 1: Advertisements and Social CrazesScenario DescriptionProblem FormulationDynamic Programming ApproachPontryagin's ApproachNumerical Solution and DiscussionControl Application 2: Stopping a Fake News OutbreakScenario DescriptionProblem FormulationPontryagin's ApproachNumerical Solution and DiscussionConcluding ThoughtsWhat Have We Learned?But Now What?The Future and Beyond
 
Next >