SlideShare a Scribd company logo
1 of 24
Download to read offline
Some interesting examples of
field experiments with social
networks.
Sharique Hasan
Fuqua School of Business, Duke University
Field: Real people; real meaningful outcomes.
Experiment: Randomization into conditions, done by
experimenter or naturally in field setting.
There are hundreds of questions that we can try to
answer about networks using field experiments.
I will focus on three.
Peer effects: Does j influence the behavior/outcomes of i?
Network Formation: What affects whether i forms a network
tie with j?
Designing networks: Which network structures maximize
network-level outcomes?
There are hundreds of questions that we can try to
answer about networks using field experiments.
Peer effects: Does j influence the behavior/outcomes of i?
Alice Bob
Alice has good grades.
By interacting with
Alice, will Bob also get
good grades?
Influence
A B A’s
score
B’s
score
Alice Bob 90 80
Bob Alice 80 90
Raj Sam 70 75
Sam Raj 75 70
Y(i) = b0 + b1*(Y(j)) + e
Selection: Similar people are more likely to interact.
We are picking up homophily, not influence.
Reflection: The regression specifies the influence of A on B.
We are picking up the influence of B on A.
There are at least three problems with this approach:
Common shocks: People who are interacting have common
contexts and experiences.
We are picking up the effect of common
experiences (e.g., noisy hallways or extra coffee
on the dorm floor).
In essence, there is imbalance between the treatment and control groups.
peer influence peer influence
peer influence
Something
Else
Entirely
Something
Else
Something
Else
The identification problem:
How much of b1 is actually peer influence?
Selection: Similar people are more likely to interact.
Include controls that account for dimensions
on which people may decide to form a
connection.
Reflection: The regression specifies the influence of A on B.
Lag the independent variable.
The standard approach to dealing with this identification
problem:
Common shocks: People who are interacting have common
contexts and experiences.
Include features of the context that may
influence the performance of both A and B.
Y(i,t) = b0 + b1*(Y(j,t-1)) + Controls + e
This seems like a reasonable strategy, but:
How many other factors can you actually account for with “controls?”
Y(i,t) = b0 + b1*(Y(j,t-1)) + e
Why randomization?:
1. Creates balance between treatment and control groups.
2. Reduces the likelihood that unobserved factors of
selection or context are causing the observed effects.
3. This is because, treatment condition and the
characteristics of pairs are now uncorrelated.
Y(i,t) = b0 + b1*(Y(j,t-1)) + Controls + e
No evidence for a causal peer effect.
The coefficient is basically “0.”
Alice Bob
Alice has good grades.
By interacting with
Alice, will Bob also get
good grades?
Influence
Much of this was driven by two thing: (1) subject
specific learning; (2) peer effects were driven
primarily by students who actually studied
together.
“the messages not only influenced the users who
received them but also the users’ friends, and friends of
friends. The effect of social transmission on real-world
voting was greater than the direct effect of the messages
themselves, and nearly all the transmission occurred
between ‘close friends’ who were more likely to have a
face-to-face relationship. These results suggest that
strong ties are instrumental for spreading both online
and real-world behaviour in human social networks”
Alice Bob
I encourage Alice to
vote by showing an
online message.
Does Bob, who is
connected to Alice
online, also vote?
Influence
Our estimates show that peer influence causes
more than a 60% increase in odds of buying the
service due to the influence coming from an
adopting friend. In addition, we find that users
with a smaller number of friends experience
stronger relative increase in the adoption
likelihood due to influence from their peers as
compared to the users with a larger number of
friends.
Alice Bob
I encourage Alice to
buy an online product.
Does Bob, who is
connected to Alice
online, also buy it?
Influence
Founders who received advice from peers who
actively managed their employees---with regular
meetings, goal setting, and feedback---grew their
firms to be 28% larger and were 10% less likely to fail
as compared to those who got advice from peers with
a passive people-management approach. However,
entrepreneurs with MBAs or accelerator experience did
not respond to the advice of either active or passive
peers, suggesting that formal training can limit the
spread of informal management advice from peers.
Network Formation: What affects whether i form a network
tie with j?
Alice Bob
What encourages Alice and Bob to
form a tie?
We run a randomized field experiment on a major North American online dating
website, where 50,000 of 100,000 randomly selected new users are gifted the ability
to anonymously view profiles of other users. Compared with the control group, the
users treated with anonymity become disinhibited, in that they view more profiles
and are more likely to view same-sex and interracial mates.
Anonymous users, who lose the ability to leave a weak signal, end
up having fewer matches compared with their nonanonymous
counterparts. This effect of anonymity is particularly strong for
women, who tend not to make the first move and instead rely on
the counterparty to initiate the communication.
“I was looking back to see if you
were looking back at me to see
me looking back at you”
Vary search costs for pairs of potential
collaborators by randomly assigning individuals
to 90-minute structured information-sharing
sessions as part of a grant funding opportunity.
We estimate that the treatment increases the
probability of grant co-application of a given
pair of researchers by 75%. The findings
suggest that matching between scientists is
subject to considerable friction, even in the
case of geographically proximate scientists
working in the same institutional context.
Alice Bob
Alice Cal
Alice Bob
Cam
Dev
Does Alice’s network grow in
proportion to her connections?
We find strong evidence that interacting with
random, but well-connected, roommates causes
significant growth of a focal student’s network.
Further, we find that this growth also implies an
increase in how close an actor moves to a
network’s center and whether that actor is
likely to serve as a network bridge.
Designing networks: Which network structures maximize
network-level outcomes?
“behavior spread farther and faster across
clustered-lattice networks than across
corresponding random networks.”
In order to induce farmers to adopt a productive new
agricultural technology, we apply simple and complex
contagion diffusion models on rich social network data
from 200 villages in Malawi to identify seed farmers to
target and train on the new technology
Alice Bob
Alice has good grades.
By interacting with
Alice, will Bob also get
good grades?
Influence
Y(i,t) = b0 + b1*(Y(j,t-1)) + b2*(Y(i,t-1)) +b3*(Y(j,t-1)*Y(i,t-1)) + e
We provide evidence that within our “optimally”
designed peer groups, students avoided the peers with
whom we intended them to interact and instead
formed more homogeneous subgroups.
These results illustrate how policies that manipulate
peer groups for a desired social outcome can be
confounded by changes in the endogenous patterns of
social interactions within the group.
Three types of network field experiments.
Peer effects: Does j influence the behavior/outcomes of i?
Network Formation: What affects whether i forms a network
tie with j?
Designing networks: Which network structures maximize
network-level outcomes?

More Related Content

What's hot

What's hot (20)

Java presentation
Java presentation Java presentation
Java presentation
 
Final keyword in java
Final keyword in javaFinal keyword in java
Final keyword in java
 
inheritance
inheritanceinheritance
inheritance
 
Oops in Java
Oops in JavaOops in Java
Oops in Java
 
Parameterized Constructor
Parameterized ConstructorParameterized Constructor
Parameterized Constructor
 
Object Oriented Programming : A Brief History and its significance
Object Oriented Programming : A Brief History and its significanceObject Oriented Programming : A Brief History and its significance
Object Oriented Programming : A Brief History and its significance
 
Test Driven Development (TDD)
Test Driven Development (TDD)Test Driven Development (TDD)
Test Driven Development (TDD)
 
Karate DSL
Karate DSLKarate DSL
Karate DSL
 
Iterator
IteratorIterator
Iterator
 
OWASP Zed Attack Proxy
OWASP Zed Attack ProxyOWASP Zed Attack Proxy
OWASP Zed Attack Proxy
 
What is OOP?
What is OOP?What is OOP?
What is OOP?
 
JAVA Training Syllabus Course
JAVA Training Syllabus CourseJAVA Training Syllabus Course
JAVA Training Syllabus Course
 
Hacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdfHacking and Defending APIs - Red and Blue make Purple.pdf
Hacking and Defending APIs - Red and Blue make Purple.pdf
 
Arrays in Java
Arrays in JavaArrays in Java
Arrays in Java
 
Test Automation Using Python | Edureka
Test Automation Using Python | EdurekaTest Automation Using Python | Edureka
Test Automation Using Python | Edureka
 
Accessibility Testing 101
Accessibility Testing 101Accessibility Testing 101
Accessibility Testing 101
 
Oops concepts || Object Oriented Programming Concepts in Java
Oops concepts || Object Oriented Programming Concepts in JavaOops concepts || Object Oriented Programming Concepts in Java
Oops concepts || Object Oriented Programming Concepts in Java
 
Java history 01
Java history 01Java history 01
Java history 01
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Monad Laws Must be Checked
Monad Laws Must be CheckedMonad Laws Must be Checked
Monad Laws Must be Checked
 

Similar to 10 Network Experiments

1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx
1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx
1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx
RAJU852744
 
1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx
1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx
1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx
jesusamckone
 
Running head DISCUSSION ESSAY1DISCUSSION ESSAY4Di.docx
Running head DISCUSSION ESSAY1DISCUSSION ESSAY4Di.docxRunning head DISCUSSION ESSAY1DISCUSSION ESSAY4Di.docx
Running head DISCUSSION ESSAY1DISCUSSION ESSAY4Di.docx
todd271
 
Strategies to accelerate organization change- Newell
Strategies to accelerate organization change- NewellStrategies to accelerate organization change- Newell
Strategies to accelerate organization change- Newell
Cenewell
 
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
Steven Wardell
 

Similar to 10 Network Experiments (20)

1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx
1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx
1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx
 
1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx
1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx
1RUNNING HEAD PROBLEM IDENTIFICATIONJohnston-Taylor.docx
 
Review on Identify Kin Relationship Technique in Image
Review on Identify Kin Relationship Technique in ImageReview on Identify Kin Relationship Technique in Image
Review on Identify Kin Relationship Technique in Image
 
Scalable
ScalableScalable
Scalable
 
De Vaus ch 1
De Vaus ch 1De Vaus ch 1
De Vaus ch 1
 
Research Design
Research DesignResearch Design
Research Design
 
005847ch1
005847ch1005847ch1
005847ch1
 
Research notes
Research notesResearch notes
Research notes
 
Research notes 2
Research notes 2Research notes 2
Research notes 2
 
Quantitative Methods for Lawyers - Class #5 - Research Design Part V - Profes...
Quantitative Methods for Lawyers - Class #5 - Research Design Part V - Profes...Quantitative Methods for Lawyers - Class #5 - Research Design Part V - Profes...
Quantitative Methods for Lawyers - Class #5 - Research Design Part V - Profes...
 
Predicting tie strength with ego network structures
Predicting tie strength with ego network structuresPredicting tie strength with ego network structures
Predicting tie strength with ego network structures
 
Running head DISCUSSION ESSAY1DISCUSSION ESSAY4Di.docx
Running head DISCUSSION ESSAY1DISCUSSION ESSAY4Di.docxRunning head DISCUSSION ESSAY1DISCUSSION ESSAY4Di.docx
Running head DISCUSSION ESSAY1DISCUSSION ESSAY4Di.docx
 
Summer 2011 presentation1
Summer 2011 presentation1Summer 2011 presentation1
Summer 2011 presentation1
 
Social Recommender Systems
Social Recommender SystemsSocial Recommender Systems
Social Recommender Systems
 
Narrative Essay Title Examples
Narrative Essay Title ExamplesNarrative Essay Title Examples
Narrative Essay Title Examples
 
Organizational justice employee engagement
Organizational justice employee engagementOrganizational justice employee engagement
Organizational justice employee engagement
 
Strategies to accelerate organization change- Newell
Strategies to accelerate organization change- NewellStrategies to accelerate organization change- Newell
Strategies to accelerate organization change- Newell
 
The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015The Role of Social Influence In Security Feature Adoption, at CSCW 2015
The Role of Social Influence In Security Feature Adoption, at CSCW 2015
 
32 Santa Writing Paper For Kindergarteners Inspiration
32 Santa Writing Paper For Kindergarteners Inspiration32 Santa Writing Paper For Kindergarteners Inspiration
32 Santa Writing Paper For Kindergarteners Inspiration
 
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
CISummit 2013: Chris Newell, Strategies for Re-Balancing Your Network to Acce...
 

More from Duke Network Analysis Center

More from Duke Network Analysis Center (20)

01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security Issues01 Add Health Network Data Challenges: IRB and Security Issues
01 Add Health Network Data Challenges: IRB and Security Issues
 
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...
00 Social Networks of Youth and Young People Who Misuse Prescription Opiods a...
 
24 The Evolution of Network Thinking
24 The Evolution of Network Thinking24 The Evolution of Network Thinking
24 The Evolution of Network Thinking
 
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)
22 An Introduction to Stochastic Actor-Oriented Models (SAOM or Siena)
 
20 Network Experiments
20 Network Experiments20 Network Experiments
20 Network Experiments
 
19 Electronic Medical Records
19 Electronic Medical Records19 Electronic Medical Records
19 Electronic Medical Records
 
18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence18 Diffusion Models and Peer Influence
18 Diffusion Models and Peer Influence
 
17 Statistical Models for Networks
17 Statistical Models for Networks17 Statistical Models for Networks
17 Statistical Models for Networks
 
15 Network Visualization and Communities
15 Network Visualization and Communities15 Network Visualization and Communities
15 Network Visualization and Communities
 
13 Community Detection
13 Community Detection13 Community Detection
13 Community Detection
 
11 Respondent Driven Sampling
11 Respondent Driven Sampling11 Respondent Driven Sampling
11 Respondent Driven Sampling
 
09 Ego Network Analysis
09 Ego Network Analysis09 Ego Network Analysis
09 Ego Network Analysis
 
07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics07 Whole Network Descriptive Statistics
07 Whole Network Descriptive Statistics
 
04 Network Data Collection
04 Network Data Collection04 Network Data Collection
04 Network Data Collection
 
02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview02 Introduction to Social Networks and Health: Key Concepts and Overview
02 Introduction to Social Networks and Health: Key Concepts and Overview
 
00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network Function00 Differentiating Between Network Structure and Network Function
00 Differentiating Between Network Structure and Network Function
 
00 Arrest Networks and the Spread of Violent Victimization
00 Arrest Networks and the Spread of Violent Victimization00 Arrest Networks and the Spread of Violent Victimization
00 Arrest Networks and the Spread of Violent Victimization
 
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...
00 Networks of People Who Use Opiods Nonmedically: Reports from Rural Souther...
 
00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...00 Automatic Mental Health Classification in Online Settings and Language Emb...
00 Automatic Mental Health Classification in Online Settings and Language Emb...
 
12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC12 SN&H Keynote: Thomas Valente, USC
12 SN&H Keynote: Thomas Valente, USC
 

Recently uploaded

Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Sérgio Sacani
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptx
Silpa
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Sérgio Sacani
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
Silpa
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.
Silpa
 

Recently uploaded (20)

Chemistry 5th semester paper 1st Notes.pdf
Chemistry 5th semester paper 1st Notes.pdfChemistry 5th semester paper 1st Notes.pdf
Chemistry 5th semester paper 1st Notes.pdf
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
 
Exploring Criminology and Criminal Behaviour.pdf
Exploring Criminology and Criminal Behaviour.pdfExploring Criminology and Criminal Behaviour.pdf
Exploring Criminology and Criminal Behaviour.pdf
 
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.Molecular markers- RFLP, RAPD, AFLP, SNP etc.
Molecular markers- RFLP, RAPD, AFLP, SNP etc.
 
Grade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsGrade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its Functions
 
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Clean In Place(CIP).pptx .
Clean In Place(CIP).pptx                 .Clean In Place(CIP).pptx                 .
Clean In Place(CIP).pptx .
 
Velocity and Acceleration PowerPoint.ppt
Velocity and Acceleration PowerPoint.pptVelocity and Acceleration PowerPoint.ppt
Velocity and Acceleration PowerPoint.ppt
 
Human genetics..........................pptx
Human genetics..........................pptxHuman genetics..........................pptx
Human genetics..........................pptx
 
GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)GBSN - Biochemistry (Unit 1)
GBSN - Biochemistry (Unit 1)
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptxClimate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
Climate Change Impacts on Terrestrial and Aquatic Ecosystems.pptx
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.
 
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and SpectrometryFAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
FAIRSpectra - Enabling the FAIRification of Spectroscopy and Spectrometry
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
 

10 Network Experiments

  • 1. Some interesting examples of field experiments with social networks. Sharique Hasan Fuqua School of Business, Duke University
  • 2. Field: Real people; real meaningful outcomes. Experiment: Randomization into conditions, done by experimenter or naturally in field setting.
  • 3. There are hundreds of questions that we can try to answer about networks using field experiments. I will focus on three. Peer effects: Does j influence the behavior/outcomes of i? Network Formation: What affects whether i forms a network tie with j? Designing networks: Which network structures maximize network-level outcomes?
  • 4. There are hundreds of questions that we can try to answer about networks using field experiments. Peer effects: Does j influence the behavior/outcomes of i?
  • 5. Alice Bob Alice has good grades. By interacting with Alice, will Bob also get good grades? Influence A B A’s score B’s score Alice Bob 90 80 Bob Alice 80 90 Raj Sam 70 75 Sam Raj 75 70 Y(i) = b0 + b1*(Y(j)) + e
  • 6. Selection: Similar people are more likely to interact. We are picking up homophily, not influence. Reflection: The regression specifies the influence of A on B. We are picking up the influence of B on A. There are at least three problems with this approach: Common shocks: People who are interacting have common contexts and experiences. We are picking up the effect of common experiences (e.g., noisy hallways or extra coffee on the dorm floor). In essence, there is imbalance between the treatment and control groups.
  • 7. peer influence peer influence peer influence Something Else Entirely Something Else Something Else The identification problem: How much of b1 is actually peer influence?
  • 8. Selection: Similar people are more likely to interact. Include controls that account for dimensions on which people may decide to form a connection. Reflection: The regression specifies the influence of A on B. Lag the independent variable. The standard approach to dealing with this identification problem: Common shocks: People who are interacting have common contexts and experiences. Include features of the context that may influence the performance of both A and B. Y(i,t) = b0 + b1*(Y(j,t-1)) + Controls + e
  • 9. This seems like a reasonable strategy, but: How many other factors can you actually account for with “controls?” Y(i,t) = b0 + b1*(Y(j,t-1)) + e Why randomization?: 1. Creates balance between treatment and control groups. 2. Reduces the likelihood that unobserved factors of selection or context are causing the observed effects. 3. This is because, treatment condition and the characteristics of pairs are now uncorrelated.
  • 10. Y(i,t) = b0 + b1*(Y(j,t-1)) + Controls + e No evidence for a causal peer effect. The coefficient is basically “0.” Alice Bob Alice has good grades. By interacting with Alice, will Bob also get good grades? Influence
  • 11. Much of this was driven by two thing: (1) subject specific learning; (2) peer effects were driven primarily by students who actually studied together.
  • 12. “the messages not only influenced the users who received them but also the users’ friends, and friends of friends. The effect of social transmission on real-world voting was greater than the direct effect of the messages themselves, and nearly all the transmission occurred between ‘close friends’ who were more likely to have a face-to-face relationship. These results suggest that strong ties are instrumental for spreading both online and real-world behaviour in human social networks” Alice Bob I encourage Alice to vote by showing an online message. Does Bob, who is connected to Alice online, also vote? Influence
  • 13. Our estimates show that peer influence causes more than a 60% increase in odds of buying the service due to the influence coming from an adopting friend. In addition, we find that users with a smaller number of friends experience stronger relative increase in the adoption likelihood due to influence from their peers as compared to the users with a larger number of friends. Alice Bob I encourage Alice to buy an online product. Does Bob, who is connected to Alice online, also buy it? Influence
  • 14. Founders who received advice from peers who actively managed their employees---with regular meetings, goal setting, and feedback---grew their firms to be 28% larger and were 10% less likely to fail as compared to those who got advice from peers with a passive people-management approach. However, entrepreneurs with MBAs or accelerator experience did not respond to the advice of either active or passive peers, suggesting that formal training can limit the spread of informal management advice from peers.
  • 15. Network Formation: What affects whether i form a network tie with j?
  • 16. Alice Bob What encourages Alice and Bob to form a tie? We run a randomized field experiment on a major North American online dating website, where 50,000 of 100,000 randomly selected new users are gifted the ability to anonymously view profiles of other users. Compared with the control group, the users treated with anonymity become disinhibited, in that they view more profiles and are more likely to view same-sex and interracial mates. Anonymous users, who lose the ability to leave a weak signal, end up having fewer matches compared with their nonanonymous counterparts. This effect of anonymity is particularly strong for women, who tend not to make the first move and instead rely on the counterparty to initiate the communication. “I was looking back to see if you were looking back at me to see me looking back at you”
  • 17. Vary search costs for pairs of potential collaborators by randomly assigning individuals to 90-minute structured information-sharing sessions as part of a grant funding opportunity. We estimate that the treatment increases the probability of grant co-application of a given pair of researchers by 75%. The findings suggest that matching between scientists is subject to considerable friction, even in the case of geographically proximate scientists working in the same institutional context. Alice Bob Alice Cal
  • 18. Alice Bob Cam Dev Does Alice’s network grow in proportion to her connections? We find strong evidence that interacting with random, but well-connected, roommates causes significant growth of a focal student’s network. Further, we find that this growth also implies an increase in how close an actor moves to a network’s center and whether that actor is likely to serve as a network bridge.
  • 19. Designing networks: Which network structures maximize network-level outcomes?
  • 20. “behavior spread farther and faster across clustered-lattice networks than across corresponding random networks.”
  • 21.
  • 22. In order to induce farmers to adopt a productive new agricultural technology, we apply simple and complex contagion diffusion models on rich social network data from 200 villages in Malawi to identify seed farmers to target and train on the new technology
  • 23. Alice Bob Alice has good grades. By interacting with Alice, will Bob also get good grades? Influence Y(i,t) = b0 + b1*(Y(j,t-1)) + b2*(Y(i,t-1)) +b3*(Y(j,t-1)*Y(i,t-1)) + e We provide evidence that within our “optimally” designed peer groups, students avoided the peers with whom we intended them to interact and instead formed more homogeneous subgroups. These results illustrate how policies that manipulate peer groups for a desired social outcome can be confounded by changes in the endogenous patterns of social interactions within the group.
  • 24. Three types of network field experiments. Peer effects: Does j influence the behavior/outcomes of i? Network Formation: What affects whether i forms a network tie with j? Designing networks: Which network structures maximize network-level outcomes?