SlideShare a Scribd company logo
1 of 20
“Ordinary Influencers” on Twitter Eytan Bakshy1	Jake M. Hofman2 Winter A. Mason2	Duncan J. Watts2 1 University of Michigan 2 Yahoo! Research
“Influentials” and Word-Of-Mouth Marketing Research in 1950’s emphasized importance of personal influence Trusted ties more important than media influence in determining individual opinions Also found that not all people are equally influential A minority of “opinion leaders” or “influentials” are responsible for influencing everyone else Call this the “influentials hypothesis” “One in ten Americans tells the other nine how to vote, where to eat, and what to buy.” (Keller and Berry, 2003)
Twitter Well Suited For Identifying Influencers Well-defined, fully-observable network of individuals who explicitly opt-in to follow each other  Twitter users are expressly motivated to be heard Includes many types of potential influencers Formal organizations (media, government, brands) Celebrities (Ashton, Shaq, Oprah) Public and Semi-Public Figures (bloggers, authors, journalists, public intellectuals) Private Individuals Many “tweets” include unique URLs which Can originate from multiple sources (“seeds”)  Can be tracked over multiple hops (“cascades”)
Computing Influence on Twitter An individual “seed” user tweets a URL (here we consider only bit.ly) For every follower who subsequently posts same URL (whether explicit “retweet” or not), seed accrues 1 pt Repeat for followers-of-followers, etc. to obtain total influence score for that “cascade” Where multiple predecessors exist, credit first poster Can also split credit or credit last poster (no big changes) Average individual influence score over all cascades Highly conservative measure of influence, as it requires not only seeing but acting on a tweet Click-through would be good, but not available to us
Data Crawl of Twitter follower graph: 56M unique twitter users 1.7B edges Twitter “firehose” tweet stream: 15 Sept 2009 – 15 Nov 2009 ~1B tweets Focus on bit.ly URLs 87M tweets 1.6M “seed” users 74M diffusion events
Take-home points In general, nothing goes viral Attributes of the user & content are related to larger cascades Number of followers, size of average past cascade Interestingness & positive feelings But these are not sufficient conditions for large cascades Depending on the cost function of targeting users, casting a wide net may be more efficient than targeting “influencers”
Cascades on Twitter 1.6M distinct “seeds” Each seed posts average of 46.3 bit.ly URL’s  74M cascades total Mean cascade size 1.14 Median cascade size 1  Mean influence score 0.14
Most Tweets Don’t Spread Almost all cascades are small and shallow A tiny fraction are large and propagate up to 8 hops Even large cascades only reach thousands
Predicting Influence  Objective is to predict influence score for future cascades as function of # Followers, # Friends, # Reciprocated Ties # Tweets, Time of joining Past influence score Fit data using regression tree Recursively partitions feature space Piecewise constant function fit to mean of training data in each partition Nonlinear, non-parametric Better calibrated than ordinary linear regression Use five-fold cross-validation For each fold, estimate model on training data, then evaluate on test data Every user gets included in one test set
Results Only two features matter Past local influence # Followers Surprisingly, neither # tweets nor # following matter
Results Model is well calibrated average predicted close to average actual within partitions But fit is poor (R2 = 0.34) Reflects individual scatter
Who are the Influencers? Circles represent individual seeds (sized by influence)
The Role of Content Sampled 1000 URLs, had workers on AMT classify URLs ,[object Object]
 Type of URL
 General Category
 Interestingness
 Positive feeling towards URL,[object Object]
The Role of Content Surprisingly, content does not matter relative to user features Even with content, fit is poor (R2 = 0.31) Much smaller subset
Necessary but not sufficient Seeds of large cascades share certain features (e.g., high degree, past influence) However, many small cascades share those features, making “success” hard to predict at individual level Common problem for rare events School shootings, Plane crashes, etc. Tempting to infer causality from “events,” but causality disappears once non-events accounted for Lesson for marketers:  Individual level predictions are unreliable, even given “perfect” information Fortunately, can target many seeds, thereby harnessing average effects
Cost-effectiveness of targeting strategies On average, some types of influencers are more influential than others Many of them are highly visible celebrities, etc. with millions of followers But these individuals may also be very expensive Assume the following cost function ci = ca +fi*cf, where ca = acquisition cost; cf = per-follower cost Also ca = a*cf, where a expresses cost of acquiring individual users relative to sponsoring individual tweets Should you target: A small # of highly influential seeds? A large # of ordinary seeds with few followers? Somewhere in between?

More Related Content

What's hot

Measuring Virality in a SaaS Business
Measuring Virality in a SaaS BusinessMeasuring Virality in a SaaS Business
Measuring Virality in a SaaS BusinessRyan Withop
 
Social Media and Audience Engagement
Social Media and Audience EngagementSocial Media and Audience Engagement
Social Media and Audience EngagementAnthony Adornato
 
From Social to Networked 2012
From Social to Networked 2012From Social to Networked 2012
From Social to Networked 2012Cameron Kruger
 
5 attention zones in the age of the internet
5 attention zones in the age of the internet 5 attention zones in the age of the internet
5 attention zones in the age of the internet Emily Hean
 
Social Network Analysis for Healthcare
Social Network Analysis for HealthcareSocial Network Analysis for Healthcare
Social Network Analysis for HealthcareJohn Liu
 

What's hot (6)

Measuring Virality in a SaaS Business
Measuring Virality in a SaaS BusinessMeasuring Virality in a SaaS Business
Measuring Virality in a SaaS Business
 
Social Media and Audience Engagement
Social Media and Audience EngagementSocial Media and Audience Engagement
Social Media and Audience Engagement
 
From Social to Networked 2012
From Social to Networked 2012From Social to Networked 2012
From Social to Networked 2012
 
Ask Us Anything: Automation
Ask Us Anything: AutomationAsk Us Anything: Automation
Ask Us Anything: Automation
 
5 attention zones in the age of the internet
5 attention zones in the age of the internet 5 attention zones in the age of the internet
5 attention zones in the age of the internet
 
Social Network Analysis for Healthcare
Social Network Analysis for HealthcareSocial Network Analysis for Healthcare
Social Network Analysis for Healthcare
 

Similar to Ordinary Influencers on Twitter

Peer influence & social media
Peer influence & social mediaPeer influence & social media
Peer influence & social mediaAlexandra Watson
 
Week 8 Laurent Pfertzel/Dominique Lahaix Presentation
Week 8 Laurent Pfertzel/Dominique Lahaix PresentationWeek 8 Laurent Pfertzel/Dominique Lahaix Presentation
Week 8 Laurent Pfertzel/Dominique Lahaix PresentationMediabistro
 
The Marketing Value of Influencers
The Marketing Value of InfluencersThe Marketing Value of Influencers
The Marketing Value of InfluencersKeller Fay Group
 
Measuring Value of a Social Media Customer
Measuring Value of a Social Media CustomerMeasuring Value of a Social Media Customer
Measuring Value of a Social Media CustomerVikram Bhaskaran
 
{White Paper} Measuring Global Attention | Appinions
{White Paper} Measuring Global Attention | Appinions{White Paper} Measuring Global Attention | Appinions
{White Paper} Measuring Global Attention | AppinionsAppinions
 
Understand and Unleash the Power of Word of Mouth Marketing
Understand and Unleash the Power of Word of Mouth MarketingUnderstand and Unleash the Power of Word of Mouth Marketing
Understand and Unleash the Power of Word of Mouth MarketingRipple6, Inc.
 
2013 Johns Hopkins School of Public Health Lecture
2013 Johns Hopkins School of Public Health Lecture2013 Johns Hopkins School of Public Health Lecture
2013 Johns Hopkins School of Public Health LectureDouglas Joubert
 
The Future of Influence, Northern Voice 2009
The Future of Influence, Northern Voice 2009The Future of Influence, Northern Voice 2009
The Future of Influence, Northern Voice 2009nate_elliott
 
How not to measure Twitter Influence
How not to measure Twitter InfluenceHow not to measure Twitter Influence
How not to measure Twitter InfluenceFarida Vis
 
Gearing Up for Web 3.0 and Social Media Update
Gearing Up for Web 3.0 and Social Media UpdateGearing Up for Web 3.0 and Social Media Update
Gearing Up for Web 3.0 and Social Media UpdateCosmetic Social Media
 
SIEM Security: 2018 Media & Influencer Analysis
SIEM Security: 2018 Media & Influencer AnalysisSIEM Security: 2018 Media & Influencer Analysis
SIEM Security: 2018 Media & Influencer AnalysisZeno Group
 
Social media influencers
Social media influencersSocial media influencers
Social media influencersRED Brand Media
 
Fresh networks social media influencers report
Fresh networks   social media influencers reportFresh networks   social media influencers report
Fresh networks social media influencers reportswaipnew
 
100 MARKETING INFLUENCERS TOP based on 2 million mentions
100 MARKETING INFLUENCERS TOP based on 2 million mentions100 MARKETING INFLUENCERS TOP based on 2 million mentions
100 MARKETING INFLUENCERS TOP based on 2 million mentionsHarsha MV
 
Casey Markee - EmMeCon Seattle 2013
Casey Markee - EmMeCon Seattle 2013Casey Markee - EmMeCon Seattle 2013
Casey Markee - EmMeCon Seattle 2013Wappow
 
Digging for data: opportunities and challenges in an open research landscape_...
Digging for data: opportunities and challenges in an open research landscape_...Digging for data: opportunities and challenges in an open research landscape_...
Digging for data: opportunities and challenges in an open research landscape_...Platforma Otwartej Nauki
 
Social Media Metrics & Analytics
Social Media Metrics & AnalyticsSocial Media Metrics & Analytics
Social Media Metrics & AnalyticsJessica Torres
 
Measuring Social Media Prsa Digital Impact
Measuring Social Media     Prsa Digital ImpactMeasuring Social Media     Prsa Digital Impact
Measuring Social Media Prsa Digital ImpactAlan Chumley
 
EventTech Social Currency Jenn Maffeo
EventTech Social Currency Jenn MaffeoEventTech Social Currency Jenn Maffeo
EventTech Social Currency Jenn MaffeoJenn Maffeo
 

Similar to Ordinary Influencers on Twitter (20)

Peer influence & social media
Peer influence & social mediaPeer influence & social media
Peer influence & social media
 
Week 8 Laurent Pfertzel/Dominique Lahaix Presentation
Week 8 Laurent Pfertzel/Dominique Lahaix PresentationWeek 8 Laurent Pfertzel/Dominique Lahaix Presentation
Week 8 Laurent Pfertzel/Dominique Lahaix Presentation
 
The Marketing Value of Influencers
The Marketing Value of InfluencersThe Marketing Value of Influencers
The Marketing Value of Influencers
 
Measuring Value of a Social Media Customer
Measuring Value of a Social Media CustomerMeasuring Value of a Social Media Customer
Measuring Value of a Social Media Customer
 
Big seed marketing
Big seed marketingBig seed marketing
Big seed marketing
 
{White Paper} Measuring Global Attention | Appinions
{White Paper} Measuring Global Attention | Appinions{White Paper} Measuring Global Attention | Appinions
{White Paper} Measuring Global Attention | Appinions
 
Understand and Unleash the Power of Word of Mouth Marketing
Understand and Unleash the Power of Word of Mouth MarketingUnderstand and Unleash the Power of Word of Mouth Marketing
Understand and Unleash the Power of Word of Mouth Marketing
 
2013 Johns Hopkins School of Public Health Lecture
2013 Johns Hopkins School of Public Health Lecture2013 Johns Hopkins School of Public Health Lecture
2013 Johns Hopkins School of Public Health Lecture
 
The Future of Influence, Northern Voice 2009
The Future of Influence, Northern Voice 2009The Future of Influence, Northern Voice 2009
The Future of Influence, Northern Voice 2009
 
How not to measure Twitter Influence
How not to measure Twitter InfluenceHow not to measure Twitter Influence
How not to measure Twitter Influence
 
Gearing Up for Web 3.0 and Social Media Update
Gearing Up for Web 3.0 and Social Media UpdateGearing Up for Web 3.0 and Social Media Update
Gearing Up for Web 3.0 and Social Media Update
 
SIEM Security: 2018 Media & Influencer Analysis
SIEM Security: 2018 Media & Influencer AnalysisSIEM Security: 2018 Media & Influencer Analysis
SIEM Security: 2018 Media & Influencer Analysis
 
Social media influencers
Social media influencersSocial media influencers
Social media influencers
 
Fresh networks social media influencers report
Fresh networks   social media influencers reportFresh networks   social media influencers report
Fresh networks social media influencers report
 
100 MARKETING INFLUENCERS TOP based on 2 million mentions
100 MARKETING INFLUENCERS TOP based on 2 million mentions100 MARKETING INFLUENCERS TOP based on 2 million mentions
100 MARKETING INFLUENCERS TOP based on 2 million mentions
 
Casey Markee - EmMeCon Seattle 2013
Casey Markee - EmMeCon Seattle 2013Casey Markee - EmMeCon Seattle 2013
Casey Markee - EmMeCon Seattle 2013
 
Digging for data: opportunities and challenges in an open research landscape_...
Digging for data: opportunities and challenges in an open research landscape_...Digging for data: opportunities and challenges in an open research landscape_...
Digging for data: opportunities and challenges in an open research landscape_...
 
Social Media Metrics & Analytics
Social Media Metrics & AnalyticsSocial Media Metrics & Analytics
Social Media Metrics & Analytics
 
Measuring Social Media Prsa Digital Impact
Measuring Social Media     Prsa Digital ImpactMeasuring Social Media     Prsa Digital Impact
Measuring Social Media Prsa Digital Impact
 
EventTech Social Currency Jenn Maffeo
EventTech Social Currency Jenn MaffeoEventTech Social Currency Jenn Maffeo
EventTech Social Currency Jenn Maffeo
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Ordinary Influencers on Twitter

  • 1. “Ordinary Influencers” on Twitter Eytan Bakshy1 Jake M. Hofman2 Winter A. Mason2 Duncan J. Watts2 1 University of Michigan 2 Yahoo! Research
  • 2. “Influentials” and Word-Of-Mouth Marketing Research in 1950’s emphasized importance of personal influence Trusted ties more important than media influence in determining individual opinions Also found that not all people are equally influential A minority of “opinion leaders” or “influentials” are responsible for influencing everyone else Call this the “influentials hypothesis” “One in ten Americans tells the other nine how to vote, where to eat, and what to buy.” (Keller and Berry, 2003)
  • 3. Twitter Well Suited For Identifying Influencers Well-defined, fully-observable network of individuals who explicitly opt-in to follow each other Twitter users are expressly motivated to be heard Includes many types of potential influencers Formal organizations (media, government, brands) Celebrities (Ashton, Shaq, Oprah) Public and Semi-Public Figures (bloggers, authors, journalists, public intellectuals) Private Individuals Many “tweets” include unique URLs which Can originate from multiple sources (“seeds”) Can be tracked over multiple hops (“cascades”)
  • 4. Computing Influence on Twitter An individual “seed” user tweets a URL (here we consider only bit.ly) For every follower who subsequently posts same URL (whether explicit “retweet” or not), seed accrues 1 pt Repeat for followers-of-followers, etc. to obtain total influence score for that “cascade” Where multiple predecessors exist, credit first poster Can also split credit or credit last poster (no big changes) Average individual influence score over all cascades Highly conservative measure of influence, as it requires not only seeing but acting on a tweet Click-through would be good, but not available to us
  • 5. Data Crawl of Twitter follower graph: 56M unique twitter users 1.7B edges Twitter “firehose” tweet stream: 15 Sept 2009 – 15 Nov 2009 ~1B tweets Focus on bit.ly URLs 87M tweets 1.6M “seed” users 74M diffusion events
  • 6. Take-home points In general, nothing goes viral Attributes of the user & content are related to larger cascades Number of followers, size of average past cascade Interestingness & positive feelings But these are not sufficient conditions for large cascades Depending on the cost function of targeting users, casting a wide net may be more efficient than targeting “influencers”
  • 7. Cascades on Twitter 1.6M distinct “seeds” Each seed posts average of 46.3 bit.ly URL’s 74M cascades total Mean cascade size 1.14 Median cascade size 1 Mean influence score 0.14
  • 8. Most Tweets Don’t Spread Almost all cascades are small and shallow A tiny fraction are large and propagate up to 8 hops Even large cascades only reach thousands
  • 9. Predicting Influence Objective is to predict influence score for future cascades as function of # Followers, # Friends, # Reciprocated Ties # Tweets, Time of joining Past influence score Fit data using regression tree Recursively partitions feature space Piecewise constant function fit to mean of training data in each partition Nonlinear, non-parametric Better calibrated than ordinary linear regression Use five-fold cross-validation For each fold, estimate model on training data, then evaluate on test data Every user gets included in one test set
  • 10. Results Only two features matter Past local influence # Followers Surprisingly, neither # tweets nor # following matter
  • 11. Results Model is well calibrated average predicted close to average actual within partitions But fit is poor (R2 = 0.34) Reflects individual scatter
  • 12. Who are the Influencers? Circles represent individual seeds (sized by influence)
  • 13.
  • 14. Type of URL
  • 17.
  • 18. The Role of Content Surprisingly, content does not matter relative to user features Even with content, fit is poor (R2 = 0.31) Much smaller subset
  • 19. Necessary but not sufficient Seeds of large cascades share certain features (e.g., high degree, past influence) However, many small cascades share those features, making “success” hard to predict at individual level Common problem for rare events School shootings, Plane crashes, etc. Tempting to infer causality from “events,” but causality disappears once non-events accounted for Lesson for marketers: Individual level predictions are unreliable, even given “perfect” information Fortunately, can target many seeds, thereby harnessing average effects
  • 20. Cost-effectiveness of targeting strategies On average, some types of influencers are more influential than others Many of them are highly visible celebrities, etc. with millions of followers But these individuals may also be very expensive Assume the following cost function ci = ca +fi*cf, where ca = acquisition cost; cf = per-follower cost Also ca = a*cf, where a expresses cost of acquiring individual users relative to sponsoring individual tweets Should you target: A small # of highly influential seeds? A large # of ordinary seeds with few followers? Somewhere in between?
  • 21. “Ordinary Influencers” Dominate Assume cf = $0.01 Equivalent to paying $10K per tweet for user with 1M followers When ca = $1,000, (a = 100,000) highly influential users are most cost effective When ca ≤ $100, (a = 10,000), most efficient choice are low-influence users Influence per Follower
  • 22. Broader Implications Twitter is a special case So need to apply same method to other cases Nevertheless, result that large cascades are rare is probably general “Social epidemics” are extremely rare Difficult to predict them or how they will start “Big seed” approach is more reliable “Ordinary Influencers” seem unexciting Only influence one other person on average But average influence is close to zero (0.28); so they’re still more influential than average Combined with mass media could be very powerful.