![Man ultramarathon runner in the mountains he trains at sunset](https://d2csxpduxe849s.cloudfront.net/media/E32629C6-9347-4F84-81FEAEF7BFA342B3/0B4B1380-42EB-4FD5-9D7E2DBC603E79F8/webimage-C4875379-1478-416F-B03DF68FE3D8DBB5.png)
94% of researchers rate our articles as excellent or good
Learn more about the work of our research integrity team to safeguard the quality of each article we publish.
Find out more
ORIGINAL RESEARCH article
Front. Phys. , 12 June 2024
Sec. Social Physics
Volume 12 - 2024 | https://doi.org/10.3389/fphy.2024.1406403
This article is part of the Research Topic Network Learning and Propagation Dynamics Analysis View all 13 articles
In the spreading dynamics of previous fashion trends, adoption researchers have neglected to consider that some individuals may behave differently from popular tendencies, which is called opposite-trend adoption behavior. To explore the dissemination mechanisms of the behavior, we first establish the adoption-against-trend model. Additionally, an edge division theory based on the adoption of opposite trends was proposed to quantitatively analyze this unique dissemination mechanism. This study presents three different degrees of opposite trends, each highlighting unique spreading scenarios. In the case of a strong opposite trend, no spreading occurs. In the case of a weak opposite trend, limited contact will accelerate information spreading, but it will not alter the mode of spreading. Nevertheless, in the case of a moderately opposite trend, the degree of the opposite trend alters the mode of spreading. Meanwhile, a cross-phase transition occurs. The findings of this paper can be applied to various areas, including social media and commercial trades.
The theory of spreading dynamics can be used to analyze many aspects of life, including healthy behaviors [1-3], social recommendations [4-9], advertising and promotion [10-11], and fashion trends. The adoption of popular trends is strengthened by the reinforcement effect, which can lead to further expansion. Furthermore, investigators have found that due to the reinforcement effect, individuals showing a higher adoption trend toward certain behaviors are more likely to adopt those behaviors [12]. Additionally, there appears to be a connection between the reinforcement and memory effects. Upon receiving information, individuals accumulate pieces of information, leading to either a full or partial memory effect, as there are accumulative messages present. Moreover, the memory effect is characterized by being non-Markovian [13-15]. Apart from the features mentioned above, investigators discover a lot of elements that affect the infection region, including group heterogeneity [16], network structure [17], and node preference for connection [18].
To harness information spreading, certain researchers have introduced the threshold model [19-20]. Individuals only accept information once they have received messages exceeding a certain threshold. Subsequent studies have proposed the use of a truncated normal distribution due to the varying adoption probabilities of individuals impacted by factors such as age and education level [21-22]. Leng et al. discovered that the acceptance of information by individuals is not only related to the level of intimacy with their neighbors but also to the degree of nodes in the social network [23]. Similarly, Cui et al. proved that the adoption of behavior is influenced by individual interest and not merely by the behavior itself [24]. Some studies have demonstrated that the acceptance and adoption of information and behavior are governed by various influential factors in social networks. Ruan et al. examined the process by which nodes provide inverse feedback upon the receipt of messages, influencing vulnerable nodes [25]. Otherwise, group behaviors should also be observed beyond individual actions. Investigators have grouped networks into two categories: positive and negative [26-27]. Researchers have identified imitative behaviors in society and are studying information propagation laws in double-layered networks by establishing gate-like adoption functions [28]. To comprehend the information dissemination process precisely, Zhu et al. suggested that an individual can only obtain limited information from their finite neighbors due to time and energy constraints [29-34].
Hence, it is crucial to establish a network with limited contact. To date, researchers have rarely studied the dissemination of information against the fashionable trend, which is called the adoption of behavior against the trend. People refrain from adopting their neighbors’ behavior when they lack sufficient information. However, if a few nodes adopt the behavior, individuals are much more likely to adopt it as well. As the number of individuals displaying the behavior increases, the likelihood of additional individuals adopting the behavior decreases significantly. For example, new clothing brands do not immediately form a trend. Initially, only a few unique individuals will purchase them. As the clothing becomes more popular, more people will buy it. However, some individuals may choose to avoid the trend.
Focusing on the aforementioned situation, this paper studies the spreading mechanism among single-layer network neighbors with limited contact. A comparable adoption threshold model is constructed to characterize the spreading characters since the quasi-right triangle is associated with the adoption qualities against neighbors, which have a rapidly increasing character at first and a slowly decreasing character thereafter. Afterward, we propose a general edge compartmental to quantitatively analyze the mechanism of propagation. In addition, our acceptable model has been confirmed through simulations that coincide with theoretical calculations. We note that there is a phase transition present, regardless of whether the network is random or scale-free. In cases of strong opposition, we observe that information is not transmitted. In the weak scenario, limited contact hastens transmission but does not convert the spreading mode. In both networks, the mode of spreading continuously grows with a second-order transition. In the moderate scenario, the dissemination mode changes due to the influence of the opposite adaptive parameter.
The remainder of this paper is divided into five sections. Section 2 introduces a model of opposite trend acceptance with limited contact ability. Section 3 presents evidence to support the validity of the model. Section 4 examines the process of information dissemination across two distinct networks, using both inference and simulation. Section 5 offers a conclusion about the study as a whole.
To investigate the mechanism of individual information sharing within a single-layer social network under the influence of opposite trend adoption and limited contact heterogeneity, a network containing N nodes was designed. The social network is comparable to platforms such as WeChat, Microblog, and Facebook, and thus, a distribution of node degrees p(k) was obtained.
According to the above description of a single-layer network model, we use the traditional SAR model to research information-spreading mechanisms, as shown in Figure 1. In the SAR model, individuals can be in three different stages. Susceptible individuals have the zest to receive information. Adopted nodes have already received information and subsequently transmit it to their neighbors. On the other hand, recovered nodes have received information but have no interest in the message, so they will not participate in the propagation of information.
Figure 1. (A) Dissemination of information in a complex network comprising a single layer. Individual 1 has embraced the information, while individuals 2, 3, and 4 are still prone to it. Individual 5 has already regained information. Information was effectively disseminated through the blue dashed line, and node 1 that has received the information has conveyed it to its neighbors through this route. To represent the impact of limited contact, the paper sets the parameters of limited contact at 5 and 20. This means that each node can receive either 5 or 20 pieces of information from its neighbors. (B) Nodes that have embraced the information disseminate it to susceptible nodes with a likelihood of λ. When state nodes transition from adopted to recovered, the probability is represented by γ. (C) Each color represents a dissemination state—red for adopted nodes, blue for susceptible nodes, and green for recovered nodes. (D) Probability of neighbors adopting the opposite trend. Adoption probability is 0 when 0 < x < b, but as soon as b ≤ x < 1, individuals will adopt behavior with a probability of
We introduced limited contact to represent the contact ability of each node.
We define m as the accumulation of information by nodes. Information is not transmitted initially, but when a susceptible node receives information, m increases by 1. We present an adoption threshold model that exhibits the characteristic of information spread against trends in a similar manner to a right triangle as Eq. 1.
Here, x represents the ratio of received information to the degree of a susceptible node and b denotes the degree parameter of opposite trend adoption.
• The process of information spreading in a single-layer network with limited contact is outlined as follows: prior to transmission, we randomly select the proportion of ρ0 adopted nodes. The remaining nodes are deemed susceptible.
• Adopted nodes, which are stochastically chosen f(kj) times from susceptible nodes, transmit messages along edges with a probability of
• As susceptible nodes receive messages, the number of susceptible nodes decreases by 1.
• The node will reject duplicate information that has been previously received.
• During a unit of time, the adopted nodes have a probability of transitioning into recovered nodes. However, if there are no adopted nodes left, the process will terminate within that time frame.
In accordance with the hole theorem in a single-layer network with limited contact, we assume the random selection of node i as the hole state. In this state, node i can merely receive information from its adopted neighbors. The probability of nodes not delivering information to their neighbors is determined as
At time t, the likelihood of the hole-state node receiving information from multiple neighbors can be represented by Eq. 3.
Although node i may receive information, it will not transition immediately to the adopted state upon gaining such information. The probability of node i remaining susceptible is defined as
In addition, the probability of all the susceptible nodes at time t can be represented by Eq. 5.
The probability of susceptible nodes maintaining their current status is represented by Eq. 6.
Until time t, the ratio of susceptible nodes in the single-layer network is observed to be as represented by Eq. 7.
The probability of node j being in one of the three states and not acquiring any information from its neighboring nodes is represented by Eq. 8.
However, the probability of node j gaining information as of time t is represented by Eq. 9.
Susceptible nodes will not transition to adopted state nodes until they receive a certain quantity of messages. Therefore, we define the probability of a node receiving n messages and remaining in the susceptible state as ς(kj − 1, t). At time t, the probability of a node j with degree kj remaining in the susceptible state is calculated.
where the likelihood of nodes connecting to neighbors via an edge is determined as
Since the impact is limited by contact, the probabilities of an adopted node j delivering information to its neighbors and transmitting through edges are determined as
Due to the adopted nodes being converted to a recovered state with a certain probability γ, it is possible to require the function about
By combining Eqs 10, 11, we can derive
By applying Eqs 11, 14 along with Eq. 10, we derive the following result:
At the same time, the network does not have any recovered nodes, providing us with the knowledge that
Overwriting function
When t → ∞, on the basis of Eq. 20, we obtain
Substituting Eq. 18 into Eq. 2, we obtain Eq. 19
In order to simplify the process, we consider
When Eq. 16 is in tangency with Eq. 17, it can be observed that a value abruptly changes into another value. The implication is that R(∞) increases discontinuously with λ. When θ(∞) < 1, the critical condition for information spreading can be obtained as Eq. 21:
In this study, the network comprised a set number of total nodes of 2 × 104 and an average degree of 10. To demonstrate the parameter, experiments were conducted on both the random networks (ER) and scale-free networks (SF). The ER network adheres to a Poisson distribution
The limited contact that is heterogeneous in nature is observed to impact the ultimate range of propagation for both Figures 2A, B. Additionally, variations in the mode of dissemination are uncovered. The data suggest that the increase in λ eventually leads to universal acceptance
Figure 2. Impact of final spreading scope
Figures 2C, D indicate the ratio of critical dissemination of information, including relative errors. The highest point of relative errors χ, known as the critical point, demonstrates global adoption. The theoretical (lines) and simulated (symbols) results coincide.
The growth mode about
Figure 3. It can be inferred that there is a shared impact
Figures 4A, B demonstrate the relationship between heterogeneous degree distribution and b influence on global adoption
Figure 4. Impact b and heterogeneous limited contact on
In Figure 5, the combination effect of
Figure 5. It can be inferred that there is a shared impact
In this paper, we analyze the mechanism of information spreading in relation to the adoption of opposing views within neighboring communities. We investigate the impact of opposite trend adoption among neighbors in a single-layer network and find that this behavior influences information dissemination to varying degrees. Meanwhile, we propose an adoption threshold function that takes the form of a right triangle with limited contacts.
The results demonstrate that under a strong opposite trend condition (b = 0.15), information will not be disseminated. Moreover, limited contact promotes the dissemination process, and with the increase in
In future research, researchers could investigate the prevalence of counter-trend adoption in new settings. For instance, investigators can study counter-trend adoption in multi-layer networks and even discover information heterogeneity among individuals.
The original contributions presented in the study are included in the article/Supplementary Material; further inquiries can be directed to the corresponding author.
JH: Conceptualization, methodology, software, writing–original draft, writing–review and editing. JM: Conceptualization, methodology, software and writing-review and editing. SL: Validation, writing–review and editing. YT: Validation, writing–review and editing.
The author(s) declare that no financial support was received for the research, authorship, and/or publication of this article.
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
1. Ji P, Ye J, Mu Y, Lin W, Tian Y, Hens C, et al. Signal propagation in complex networks. Phys Rep (2023) 1017:1–96. doi:10.1016/j.physrep.2023.03.005
2. Wang H, Ma C, Chen H-S, Zhang H-F. Effects of asymptomatic infection and self-initiated awareness on the coupled disease-awareness dynamics in multiplex networks. Appl Math Comput (2021) 400:126084. doi:10.1016/j.amc.2021.126084
3. Chen X, Gong K, Wang R, Cai S, Wang W. Effects of heterogeneous self-protection awareness on resource-epidemic coevolution dynamics. Appl Math Comput (2020) 385:125428. doi:10.1016/j.amc.2020.125428
4. Ni Q, Guo J, Wu W, Wang H, Wu J. Continuous influence-based community partition for social networks. IEEE Trans Netw Sci Eng (2021) 9:1187–97. doi:10.1109/tnse.2021.3137353
5. Liu S, Yu J, Deng X, Wan S. Fedcpf: an efficient-communication federated learning approach for vehicular edge computing in 6g communication networks. IEEE Trans Intell Transportation Syst (2021) 23:1616–29. doi:10.1109/tits.2021.3099368
6. Hu Y, Xiong F, Pan S, Xiong X, Wang L, Chen H. Bayesian personalized ranking based on multiple-layer neighborhoods. Inf Sci (2021) 542:156–76. doi:10.1016/j.ins.2020.06.067
7. Zhong C, Xiong F, Pan S, Wang L, Xiong X. Hierarchical attention neural network for information cascade prediction. Inf Sci (2023) 622:1109–27. doi:10.1016/j.ins.2022.11.163
8. Ni X, Xiong F, Pan S, Wu J, Wang L, Chen H. Community preserving social recommendation with cyclic transfer learning. ACM Trans Inf Syst (2023) 42:1–36. doi:10.1145/3631115
9. Zhu H, Xiong F, Chen H, Xiong X, Wang L. Incorporating a triple graph neural network with multiple implicit feedback for social recommendation. ACM Trans Web (2024) 18:1–26. doi:10.1145/3580517
10. Ren Z-M, Zeng A, Zhang Y-C. Structure-oriented prediction in complex networks. Phys Rep (2018) 750:1–51. doi:10.1016/j.physrep.2018.05.002
11. Yin H, Wang Q, Zheng K, Li Z, Yang J, Zhou X. Social influence-based group representation learning for group recommendation. In: 2019 IEEE 35th International Conference on Data Engineering (ICDE). IEEE (2019). p. 566–77.
12. Zheng M, Lü L, Zhao M. Spreading in online social networks: the role of social reinforcement. Phys Rev E (2013) 88:012818. doi:10.1103/physreve.88.012818
13. Wang W, Liu Q-H, Cai S-M, Tang M, Braunstein LA, Stanley HE. Suppressing disease spreading by using information diffusion on multiplex networks. Scientific Rep (2016) 6:29259. doi:10.1038/srep29259
14. Wang W, Liu Q-H, Liang J, Hu Y, Zhou T. Coevolution spreading in complex networks. Phys Rep (2019) 820:1–51. doi:10.1016/j.physrep.2019.07.001
15. Juul JS, Porter MA. Hipsters on networks: how a minority group of individuals can lead to an antiestablishment majority. Phys Rev E (2019) 99:022313. doi:10.1103/physreve.99.022313
16. Tian Y, Tian H, Cui Y, Zhu X, Cui Q. Influence of behavioral adoption preference based on heterogeneous population on multiple weighted networks. Appl Math Comput (2023) 446:127880. doi:10.1016/j.amc.2023.127880
17. Yang M, Wu C, Xie T. Information propagation dynamics model based on implicit cluster structure network. In: 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC). IEEE (2020). p. 1253–7.
18. Ren Y, Li L. Sar dynamical mechanism affected by diminishing marginal effect based on personal fashion psychology on multi-layer contacted network. Physica Scripta (2024) 99:035252. doi:10.1088/1402-4896/ad295f
19. Kobayashi T. Trend-driven information cascades on random networks. Phys Rev E (2015) 92:062823. doi:10.1103/physreve.92.062823
20. Juul JS, Porter MA. Synergistic effects in threshold models on networks. Chaos: Interdiscip J Nonlinear Sci (2018) 28:013115. doi:10.1063/1.5017962
21. Tian Z, Zhang G, Yu H, Liu H, Lu D. Negemotion: explore the double-edged sword effect of negative emotion on crowd evacuation. IEEE Trans Comput Soc Syst (2024) 1–14. doi:10.1109/tcss.2023.3344172
22. Huo S, Yu Y. The impact of the self-recognition ability and physical quality on coupled negative information-behavior-epidemic dynamics in multiplex networks. Chaos, Solitons and Fractals (2023) 169:113229. doi:10.1016/j.chaos.2023.113229
23. Leng H, Zhao Y, Wang D. Message passing approach for social contagions based on the trust probability with multiple influence factors. Physica A: Stat Mech its Appl (2022) 587:126510. doi:10.1016/j.physa.2021.126510
24. Cui Y, Wei R, Tian Y, Tian H, Zhu X. Information propagation influenced by individual fashion-passion trend on multi-layer weighted network. Chaos, Solitons and Fractals (2022) 160:112200. doi:10.1016/j.chaos.2022.112200
25. Ruan Z, Zhang L, Shu X, Xuan Q. Social contagion with negative feedbacks. Physica A: Stat Mech its Appl (2022) 608:128304. doi:10.1016/j.physa.2022.128304
26. Salling MC, Martinez D. Brain stimulation in addiction. Neuropsychopharmacology (2016) 41:2798–809. doi:10.1038/npp.2016.80
27. Chen X, Wang N. Rumor spreading model considering rumor credibility, correlation and crowd classification based on personality. Scientific Rep (2020) 10:5887. doi:10.1038/s41598-020-62585-9
28. Ye J, Chen Y. Social contagion influenced by active-passive psychology of college students. Front Phys (2022) 10:1019118. doi:10.3389/fphy.2022.1019118
29. Zhu Y-X, Cao Y-Y, Chen T, Qiu X-Y, Wang W, Hou R. Crossover phenomena in growth pattern of social contagions with restricted contact. Chaos, Solitons and Fractals (2018) 114:408–14. doi:10.1016/j.chaos.2018.06.010
30. Du J, Zhao D, Issa RR, Singh N. Bim for improved project communication networks: empirical evidence from email logs. J Comput Civil Eng (2020) 34:04020027. doi:10.1061/(asce)cp.1943-5487.0000912
31. Yang D, Xian J, Pan L, Wang W, Zhou T. Effective edge-based approach for promoting the spreading of information. IEEE Access (2020) 8:83745–53. doi:10.1109/access.2020.2992058
32. Lv C, Yuan Z, Si S, Duan D, Yao S. Cascading failure in networks with dynamical behavior against multi-node removal. Chaos, Solitons and Fractals (2022) 160:112270. doi:10.1016/j.chaos.2022.112270
33. Huo S, Chen S. Rumor propagation model with consideration of scientific knowledge level and social reinforcement in heterogeneous network. Physica A: Stat Mech Its Appl (2020) 559:125063. doi:10.1016/j.physa.2020.125063
Keywords: complex networks, information propagation, limited contact network, opposite-trend adoption, spreading dynamics
Citation: Hao J, Ma J, Liu S and Tian Y (2024) A novel spreading dynamic based on adoption against the trend. Front. Phys. 12:1406403. doi: 10.3389/fphy.2024.1406403
Received: 25 March 2024; Accepted: 22 April 2024;
Published: 12 June 2024.
Edited by:
Fei Xiong, Beijing Jiaotong University, ChinaReviewed by:
Wei Wang, Chongqing Medical University, ChinaCopyright © 2024 Hao, Ma, Liu and Tian. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Jinming Ma, am1tYUBidXB0LmVkdS5jbg==
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.
Research integrity at Frontiers
Learn more about the work of our research integrity team to safeguard the quality of each article we publish.