Skip to main content
. 2024 Jun 21;19(6):e0304889. doi: 10.1371/journal.pone.0304889

Fig 3. Schematic diagram of the ABM logic.

Fig 3

Illustrative diagram conveying the operating principle behind the ABM. A source user is infected when they share a source post. Their followers are exposed to their infection, some of which will become infected themselves by resharing the source post. This process continues across infection layers, with a fraction mutating the infection as they transmit it by adding additional commentary to their reshare post.