Abstract
Healthcare social networks have a significant role in providing connected and personalized healthcare environment with real-time capabilities. However, building resilient, robust and technology-driven healthcare 5.0 has its own barriers. Especially with social media’s high susceptibility to rumors and fake news, these networks can harm the society. Many researchers have been investigating the process of information diffusion, and it has been one of the most intriguing issues in network analysis. Modeling rumor propagation is one of the prominent researched topics in recent years. Traditional models assume that rumor propagation happens only in one direction, where only supporters are supposed to be active, whereas, in a real-life situation, both supporters and deniers of the information operate simultaneously. In this paper, we introduce a model for the recovery of nodes in a setting where rumor propagation and rumor control happen simultaneously. We propose the Susceptible-Infected-Recovered-Anti-spreader model based on the notion of spreading of epidemics and also its applications to modeling the propagation of rumors and control of rumor. Our model assumes people have multiple forms of reactions to rumor, either posting it, deleting it or announcing the rumor as fake. This paper also suggests how the model can act as a simulation method to compare two node centrality algorithms where spreaders chosen from one centrality algorithm try to spread the rumor, and the anti-spreaders chosen from other centrality try to dispel the rumor and vice versa. We simulate the proposed algorithm on different weighted and unweighted real-world network datasets and establish that the experimental results agrees with the proposed model.
Keywords: Complex network, Healthcare social networks, Information diffusion, Node centrality, Rumor control, Rumor propagation
Introduction
The 5.0 revolution in healthcare is eventually digitally transforming society, plummeting the overload on emergency and critical care, and letting people to reinforce their resilience and health with a faster response time. The use of AI, the Internet of Medical Things (IoMT) and social media is offering number of advantages over traditional analytic and clinical decision-making techniques. In this view, many healthcare social networks (HSN) are evolving with the intent to augment patient care and awareness enticing the interest of clinical professionals and of the whole healthcare industry. Technological developments and digital platforms foster information diffusion possibilities to keep people safe, informed and connected. However, the same tools also expose possible perils of misinformation for patients. As the world combats with the outrageous and perilous coronavirus, the pandemic has demonstrated how the spread of misinformation, amplified on social media and other digital platforms, is proving to be as much a threat jeopardizing measures to control the pandemic.
Typically, rumors are information pieces that are unreliable, incorrect and spread on the network due to limited knowledge of the recipient nodes or wrong intentions (Qiu et al. 2021; Spohr 2017; Sivasankari and Vadivu 2021). Rumors are the unverified spread of societal concerns, issues by different methods, and create misunderstandings between individuals. Rumors on the Internet spread quicker and have a more extensive scope of an impact than word-of-mouth rumors. These rumors spread by word of mouth over a small area and in vast geographical regions like a forest fire on social networks (Pfeffer et al. 2013), generally with malicious intent. Rumors alter and shape public opinion adversely affecting human behavior, causing multiple confusions (Lai et al. 2020) and instability. Many researchers have been investigating the process of information diffusion, and it has been one of the most intriguing issues in network analysis. Modeling rumor propagation is one of the prominent researched topics in recent years. The SIR (Harko et al. 2014) model is a traditional model that simulates information diffusion due to similarity in the field of epidemiology and social networks. It has been utilized by numerous researchers to model the process of information diffusion in social networks. A susceptible individual spreads data when influenced by a spreader and turns into a spreader. After some time, the spreader quits spreading the data and turns into a recovered node. The transformation parameters and in the process are network characteristics-based probabilities, and the state transformation of all nodes is equivalent. While the SIR model serves as an excellent benchmark for information propagation, it does not generalize well to rumor propagation. A notable difference arises because individuals may also be immunizing other nodes regarding the rumor and preventing them from getting infected. This phenomenon is very different from actual epidemics modeling because, in an epidemiologic setting, it is unlikely that a large portion of people who recover from the epidemic, make other people immune as well. However, in a social network, when a person propagated fake news intentionally or due to a lack of knowledge and after getting the truth, other persons can disseminate the fact about the misinformation. This makes their susceptible neighbors, directly recovered and immune to the rumor. We consider the above recovery aspects of information propagation in our paper and propose the Susceptible-Infected-Recovered-Anti-spreader () model based on the notion of spreading of epidemics and its applications to modeling the propagation of rumors and control of rumor. Our model assumes people have multiple forms of reactions to rumor, either posting it, deleting it or announcing the rumor as fake. The contribution of our papers are as follows:
We establish mathematical model for the rumor propagation, rumor control and analyzing its equilibrium parameters and reproduction rate.
The proposed model introduces the notion of anti-spreaders that immune its susceptible neighbors from the rumors to minimize the effect of rumors in the network.
We consider the case where the information is not a rumor, and the proposed model simplifies to information propagation model for the influence maximization.
We discuss the novel approach of directly comparing two different node centrality algorithms for the selection of spreaders and anti-spreaders. The spreaders, chosen from one centrality algorithm, try to spread the rumor, and the others try to dispel the rumor and vice versa.
The paper organization is as follows. In Sect. 2, we present some traditional models used to study rumor propagation and clarify the enhancements that our model proposes. In Sect. 3, we describe the proposed SIRA model of rumor propagation and rumor control with mathematical modeling using the system of differential equations. This section also explores the analysis of the proposed model on homogeneous networks, calculation of reproduction number and how our model can be simplified to a general information diffusion model as the SEI model followed by the simulation of the model on a toy network. In Sect. 4, we discuss the different weighted and unweighted real-world datasets used in this work, and we prove the mathematical integrity of our model for information propagation, rumor propagation, rumor control and node centrality algorithm performance comparison on various datasets used. Finally, Sect. 5 concludes the paper.
Related work
Social networks are complex networks with non-trivial topology and intricate interactions between users. The effective analysis of complex systems is essential to model and comprehend the method of rumor propagation. The spreading of rumors on online social networks is very similar to epidemic spreading. Researchers from various disciplines have extensively studied models of rumor propagation in complex networks. The majority of the conventional models for investigating information diffusion depend on elementary models of epidemics, for example (Susceptible-Infected), (Susceptible-Infected-Susceptible) and (Susceptible-Infected-Recovered) (Britton 2010; Kumar et al. 2020).
Tripathy et al. Tripathy et al. (2010) claimed that the effect of rumor can be combated by injecting messages called anti-rumors, just like the rumor process. They studied two metrics, namely the belief time, which is the duration for which a person believes the rumor to be true, and point of decline, which is a point after which the anti-rumor process dominates the rumor process. Huang and Jin Huang and Jin (2011) modified the SIR model to prevent the rumor propagation by devising immunization strategies, namely the random immunization and the targeted immunization, to the rumor model on small-world networks. Wan et al. Wan et al. (2015) introduced the SIERsEs model, which is an extension of the SIR spreading model with the addition of the elimination of the rumor process. Zhu and Ma argue that certain people may not believe in the rumor and do not spread it, a different state called a hesitant state added to the traditional SIR model and proposed SHIR model (Zhu and Ma 2018). This model also takes care of the varying degree of nodes, which commonly happens in online social networks. Indu and Thampi argue that the spread of rumors in social networks is similar to the spread of fire in a forest and identified various components to model the spread of rumors in online social networks (Indu and Thampi 2019). Wang et al. Wang et al. (2019) explored the propagation of rumor using an improved energy model applicable to multilayer social networks. The model also introduces negative energy to simulate the mitigation process of rumors. Zhu et al. Zhu et al. (2020) recently proposed a SIR like an epidemic rumor propagation model by employing forced silence function, time delay and network topology. Recently, Yang et al. Yang et al. (2019) have developed an ILSR rumor propagation model based on the notion of the degree of different nodes in networks. They introduced a new type of users known as lurkers users who have heard the rumors, but temporarily not spreading rumors in the system. Kaur et al. Kaur et al. (2020) proposed a fake news detection system using multi-level voting model by exploiting various feature extraction techniques and machine learning classifiers. Qui et al. Qiu et al. (2021) introduced the SIR rumor-spreading model with an influence mechanism in social networks, named SIR-IM, by integrating the number of current spreaders into the spreading probability and time function.
Proposed methodology
model description
We propose the Susceptible-Infected-Recovered-Anti-Spreader () model for the recovery of nodes in a setting where rumor propagation and rumor control happen simultaneously. The entire population is divided into four categories: Susceptible nodes (S) that are unaware of the rumor, Infected nodes (I) that are actively spreading the rumor, Recovered nodes (R) that are not spreading the rumor and anti-spreader nodes (A) that are dispelling the rumor. We consider people have multiple forms of reactions to rumor, either posting it, deleting it or announcing the rumor as fake. We introduce the notion of anti-spreader nodes, such nodes that get to know about the irrelevance of the information, and the piece of the information is a rumor, and tend to dispel the rumor by announcing the truth. Hence, the anti-spreaders nodes are immunizing their susceptible neighbor’s nodes from false information and play a crucial role in controlling the rumor.
As evident from Fig. 1, solid lines represent direct conversion of a node from one state to another, for examples , . However, the dotted line corresponds to indirect conversion from one state to other. For example, the conversion from A to S signifies the indirect effect of anti-spreaders on their susceptible neighbors. This makes susceptible neighbors transition to the recovered state with the rate and becomes immune to the fake news. The steps of the algorithm are as follows:
Node population starts from certain infected nodes and certain anti-spreaders nodes that spread the rumor or dispel it, and all other nodes are susceptible
Infected nodes affect their susceptible neighbors and convert them into infected members that propagate the rumor. This conversion happens with a probability
Probability that the infected members recover is at a rate of
Under these conditions recovered nodes can now become anti-spreaders at the rate of
Nodes that become anti-spreaders affect fraction of their susceptible neighbors, converting them directly into recovered state and immune to the rumor. Due to the influence of anti-spreaders nodes, some of their susceptible neighbors can directly go to a recovered state, and they will not be affected by the rumor.
Also, other than the rate of conversion from , the nodes in susceptible state can only transit to an infected state, if they are direct neighbors of an infected node. Similarly, other than the rate of conversion from , the susceptible nodes can directly transition into recovered nodes if they are direct neighbors of anti-spreader nodes.
Fig. 1.

Model
At the end of simulation when there are no infected nodes, i.e., and equilibrium is reached then some nodes can still remain in susceptible state other then anti-spreaders. It is not like that the final state is anti-spreader, and all the nodes should be in this state at the end; rather, it depends on the various conversion rates considered. Also, other than the rate of conversion from , the nodes in susceptible state can only transit to an infected state, if they are direct neighbors of an infected node. Similarly, other than the rate of conversion from , the susceptible nodes can directly transition into recovered nodes if they are direct neighbors of anti-spreader nodes.
System of differential equations
The population is divided into the 4 states Susceptible , anti-spreaders , Infected and Recovered and at any time t their sum is 1 as given in Eq. (1).
| 1 |
As evident from Fig. 1, some recovered nodes may become anti-spreaders at the rate as per Eq. (2). Anti-spreaders are those nodes who know the ingenuity of the information. The node in the anti-spreader(A) state continues to be in the same state throughout.
| 2 |
Recovered nodes increase through multiple methods, either through the direct recovery of susceptible nodes due to influence of anti-spreaders (edge between S to R in Fig. 1) or by direct conversion from infected to recovered (edge between I to R in Fig. 1). Some recovered nodes may also become anti-spreader at the rate . The change in recovered nodes is presented in Eq. (3).
| 3 |
where k is the average degree of the nodes in the network. Change in infected nodes, Eq 4, arises from the conversion of susceptible nodes to infected nodes with the rate and infected nodes go to recovered state with the rate .
| 4 |
| 5 |
Initially, all the nodes are assumed susceptible except few seed nodes, and slowly, they decay into infected state with rate and recovered state with rate as given in Eq. (5). Now let us solve these equations by substituting with from Eq. (3), and hence, getting the system given by 6, 7, 8.
| 6 |
| 7 |
| 8 |
Calculation of reproduction number
The basic reproduction number () is an important parameter in epidemics which measures the propagation potential of contagious diseases. The reproduction number () is an epidemiologic measure used to characterize the contagiousness or transmissibility of infectious agents. We have applied a similar concept for the rumor propagation. Since for successful reproduction of the rumor, we require that initially , this produces Eq. (9)
| 9 |
Thus, giving us Eq. (10),
| 10 |
means that the rumor is active in the system. For the initial spread of rumor, , and since , we get Eq. (11)
| 11 |
Now, when , there is no rumor in the system. When then . This implies there is no infected node in the system, and hence, there is no rumor in the system.
Model analysis in a homogeneous network
We analyze the proposed model on a homogeneous network and prove the validity of the model at the stable equilibrium points. An equilibrium point of a dynamic mathematical framework produced by an independent system of ordinary differential equation (ODEs) is a solution point where the count of participating entities does not change with time, and hence, their rate of change becomes 0 (Roussel 2005). In the case of epidemics, the disease-free equilibrium is asymptotically stable, and the infection asymptotically vanishes. Similarly, in the case of information propagation, rumor-free stable equilibrium is stable, and information is no longer being spread, and the network has no active rumor propagating nodes. We prove the stability of our differential equation at the equilibrium condition given by Eq. (12)
| 12 |
The Jacobian method (Izhikevich 2007), as given by Eq. (13), is a popular iterative technique used for determining the solutions for the system of linear equations, which is diagonally dominant.
| 13 |
The equilibrium points exist if I(t) = 0, and under this condition, we have Eq. (14)
| 14 |
The Jacobian matrix is given by Eq. (15):
| 15 |
We will calculate the eigenvalues of as given in Eq. (16):
| 16 |
Expanding on the third row, we arrive at the following characteristic equation in Eq. (17):
| 17 |
As evident, are eigenvalues and also the solutions of which we find and analyze as follows using the Quadratic Formula:
| 18 |
Here, since and also , we have Eq. (19):
| 19 |
Thus, the eigenvalues are given by Eq. (20):
| 20 |
Now, for a stable equilibrium, real eigenvalues must be , and since and , we know that eigenvalues satisfy these properties in the assumptions of our system for equilibrium. The first eigenvalue is 0 and and are as given by Eq. (21).
| 21 |
Thus, rearranging and squaring both sides, we get to Eq. (22):
| 22 |
Hence, Eq. (22) holds true , and at this point, the mathematical stability of the system is proved quantitatively by finding the eigenvector related to every eigenvalue. An equilibrium point is hyperbolic if none of the eigenvalues have zero real part. One of our eigenvalues is zero. Thus, the equilibrium is non-hyperbolic. If all eigenvalues have a negative real part, the equilibrium is steady, as given by the Lyapunov stability theorem (Lyapunov 1992). As evident in Eqs. (20–22), the corresponding eigenvalues are , and the equilibrium for our model is stable.
The simplification to information propagation SEI model
When the information is non-rumor, the model can directly be simplified to an information propagation model that leads to influence maximization achieved through anti-spreaders.
The roles of the nodes, however, remain almost the same. Anti-spreaders are still the carriers of correct information and the recovered nodes still are the dormant nodes that know about the information but are not spreading it. Similarly, susceptible nodes still remain the nodes that are unaware of the information and can likely be turned into recovered nodes by anti-spreaders. This effect can be seen when we plug in into the model (Eqs. 1, 2, 3 and 5) and we get the following system of equations, namely Eqs. (2324, 25 and 26).
| 23 |
| 24 |
| 25 |
| 26 |
For the purpose of an analogy between these states, we rename the states for direct correspondence with the SEI model as follows:
Anti-spreader nodes (A) become source spreaders or seed nodes (I)
Recovered nodes (R) are renamed as exposed nodes (E)
Susceptible nodes remain in the same naming convention (S)
These seed nodes (I) affect fraction of their neighbors, and they convert into exposed (E). Exposed users can become spreaders of the information with the rate .
Thus, the proposed model for the rumor propagation and rumor control simplifies to information spreading (Guihua and Zhen 2004) model for influence maximization. This conversion is depicted in Fig. 2
Fig. 2.
Simplification of the model from to for non-rumor information
Simulation of the proposed model on a toy network
A toy network, as shown in Fig. 3, is chosen as a simulation network. The most influential node in the network is chosen as the spreader, and are assumed without loss of generality. Initially, all the nodes, except the one chosen as the influential node based on out-degree, are susceptible, and the given node is in an Infected state. As time progresses, random neighbors of this node become infected, and the node recovers. After recovery, it is dormant, and other nodes continue spreading information. The recovered node decides to dispel the rumor and makes itself an anti-spreader. This effect makes all its susceptible neighbors instantly recover. The spreading continues till all the nodes either are against the rumor or have never heard of the rumor or its dispel. We describe the spread in Fig. 3 as a change of state in an event-driven simulation.
Fig. 3.
All nodes are initially susceptible and an influential node is chosen as the spreader with . Here, purple nodes are susceptible, pink nodes are infected, blue nodes are recovered and green nodes are anti-spreaders
The change of state in an event-driven simulation are as follows:
t1: Node F is infected, chosen because of maximum out-degree, all other nodes are currently susceptible.
t2: Node F has recovered and has infected its neighbors with a uniform probability of , thus randomly infecting nodes E and J.
t3: Node F is now an anti-spreader, all the infected nodes recover at the rate of , and their neighbors are infected at the rate .
t4: Node F has recovered its susceptible neighbor H at rate , all recovered nodes became anti-spreaders at the rate of .
t5: Anti-spreaders are beginning to take more portion of the network. However, there is still an infection going on in the network.
t6: No neighbors of the current infected nodes are susceptible.
t7: All reachable nodes in the network have seen the information. However, there is still a node G, which has never heard of the rumor or anti-rumor.
t8: All nodes that saw the rumor or the truth are now anti-spreaders. Other nodes like G are still susceptible. After the equilibrium point, either all nodes will end as susceptible, or anti-spreaders and no nodes are spreading the rumor if the parameters are coherent to the reproduction number.
In the above toy network simulation in Fig. 3, the value of various probabilities considered is , which are relatively very high values. The conversion rate from is 0.5%, i.e., an infected node can randomly infect 50% of its susceptible neighbors. Similarly, each of the conversion rates from , and is 1. It implies the probability of conversion from susceptible to recovered, infected to recovered and recovered to anti-spreaders is 100%. At the end of the simulation, all the nodes are in the anti-spreader state except one node in the susceptible state. The node ‘G’ is non-reachable from all other nodes, and hence, it is not influenced by any nodes during the simulation process and its color remains unchanged.
Result and analysis
In this section, we simulate our proposed methodology and analyze the different findings related to rumor propagation and rumor control using real-world various weighted and unweighted networks given in Subsection 4.1. Table 1 depicts the brief description used datasets in this paper. We use the spreading characteristics defined by giving the count of the susceptible, infected, anti-spreaders and recovered nodes as a function of time. Infection scale, i.e., F(t), is an important evaluation parameter. When information propagates in a network then at any time t, F(t) denotes the fraction of nodes in the network which have received the particular information. A higher value of F(t) indicates that information spreads rapidly in the network. Section 4.2 discusses the propagation of non-rumors, similar to the traditional information propagation model, using the proposed model. Section 4.3 discovers the role of anti-spreaders in containing the harmful effects of the rumor. In section 4.4, a novel method for comparison of centralities is proposed. Here, we compare the recently introduced NCVoteRank (Kumar and Panda 2020) centrality algorithm for unweighted networks and WVoteRank Kumar and Panda (2022) centrality on weighted networks for finding the initial spreaders. These centrality algorithms are simulated in comparison to traditional algorithms, DegreeRank Freeman (1978) for unweighted networks, and its weighted version WDegreeRank for weighted networks.
Table 1.
Description of datasets used
| Dataset name | Characteristics | Description |
|---|---|---|
| US-Airports (Colizza et al. 2007) | Weighted, Directed, 1574 vertices, 28,236 edges | The network of the most crowded trading airports in the United States. An edge is there between airports, if there is a flight between them. The weights are the number of seats available on these flights |
| Brightkite (Cho et al. 2011) | Unweighted, Undirected, 58228 nodes, 214078 edges | Brightkite was a location-based social network. Users can share their locations by check-ins |
| Email-Enron (Leskovec et al. 2009) | Unweighted, Undirected, 36692 nodes, 183831 edges | Nodes of the network are email addresses. If address A sends one or more email to address B, the graph contains an undirected edge between these nodes |
| US PowerGrid (Watts and Strogatz 1998) | Undirected, Weighted, 4941 nodes, 6594 edges | This network is the high-voltage power grid in the USA. The nodes are substations, transformers and generators, and the connections are voltage power lines |
| CA-GrQc (Leskovec et al. 2007) | Unweighted, Undirected, 5242 nodes, 14496 edges | Arxiv GR-QC (General Relativity and Quantum Cosmology) research network is from the research papers and covers scientific referencing between papers in General Relativity and Quantum Cosmology category |
| p2p-Gnutella08 (Ripeanu et al. 2002) | Unweighted, Undirected, 6301 nodes, 20777 edges | This is a Gnutella peer-to-peer file-sharing network dataset collected from 08 August 2002 where a vertex represents host in the network, and the edge denotes the connection between the Gnutella hosts |
Datasets used
Information propagation on real-world networks
As highlighted in Section 3.5, the proposed algorithm reduces to a Susceptible-Exposed-Infected () model where susceptible nodes remain susceptible (S), recovered nodes act as exposed (E) nodes and anti-spreader nodes are the carrier of the correct information and act as infected (I) nodes. The information diffuses based on two parameters, namely the rate of infection as and rate of recovery as , leading to a simplified model of information propagation. As evident, the model has similar characteristics to those of the model with similar parameters and has expected behavior on the real-world weighted and unweighted networks, as shown in Fig. 4. We use NCVoteRank centrality (Kumar and Panda 2020) and to identify one top spreader as infected node on the unweighted networks like Brightkite and Email-Enron. Similarly, we utilize WVoteRank centrality (Kumar and Panda 2022) to identify one top spreader as infected node to start the information diffusion process on the weighted networks like US-Airports and PowerGrid. Notice that all the graphs behave similarly to the epidemic model. As evident from Fig. 4a, the spreader on weighted network US-Airports is able to infect around ( nodes of the network receive the information at the end of the simulation, out of the total population of ) of the network. In Fig. 4b, the spreader on Brightkite is able to infect around 50% of the network and ended up having a stable equilibrium. In Fig. 4c, the spreader on Email-Enron is able to infect more than of the network, notice that the peak reaches an early time stamp due to high connectivity. On the weighted PowerGrid network, notice that the change in the numbers is gradual, and very few nodes eventually become exposed as shown in Fig. 4d.
Fig. 4.
Information propagation on real-world networks when there is no rumor, and anti-spreader nodes act as the information carrier. All nodes are initially susceptible. An influential node is chosen as the spreader using the NCVoteRank method in case of an unweighted network and WVoteRank method in weighted networks. The results are obtained over 100 independent simulation of SEI model with , and
Numerical simulations for basic reproduction number and the equilibrium point
In this section, we discuss the equilibrium characteristics of the proposed method near the rumor-free equilibrium point, along with endemic equilibrium characteristics and the role of anti-spreaders nodes to minimize the effect of rumor on various network datasets. On reaching equilibrium on real-world networks, the rumor vanishes in the network only after the complete network has no more rumor-spreading nodes. The equilibrium is stable, only if the conditions are such that , as given by calculation in Eq. (10). We assume the values of the parameters , and based on the reproduction number and network topology. The value of shall indicate how likely an informed (recovered) node is to dispel the rumor by becoming an anti-spreader. The value of depends on the preference of the given group and the severity of the information. As evident from Fig. 5a, the spreaders on weighted network US-Airports can infect around of the network in the beginning, whereas around nodes of the network recovers and becomes anti-spreader during the simulation and minimizing the spread of the rumor. In Fig. 5b, the spreader on Brightkite is able to infect around of the network, and about of the nodes became anti-spreaders. Due to the influence of anti-spreader, approximately of the nodes remains susceptible means unaffected by the rumor. Hence, the roles of anti-spreaders nodes become vital to confine the rumor in the system. In Fig. 5c, the spreader on Email-Enron is able to infect about of the network initially, and nodes are anti-spreaders. It is clear that due to the impact of anti-spreaders about of nodes remains susceptible. On the weighted PowerGrid network, the spreader is able to infect about of the network initially, and nodes are anti-spreaders, which enables approximately nodes are susceptible and are unaffected by the rumor as depicted in Fig. 5d. Similarly, in the case of GrQc and p2p Guntella08 networks, as evident from Fig. 5e and f, respectively, the anti-spreader nodes are able to control the rumor, and most of the nodes remain susceptible in the system after reaching the equilibrium.
Fig. 5.
Equilibrium characteristics of model and impact of anti-spreader to control the rumor as seen on various used datasets. The results are obtained over 100 independent simulation of the proposed model with
Here, in case of the results obtained on real-life network datasets in Fig. 5, results are obtained over 100 independent simulation of SIRA model with the value of various probabilities as . The probability of conversion from is 0.1, i.e., an infected node can randomly infect 10% of its susceptible neighbors. The probability of conversion is 0.1, i.e., an infected node can randomly infect 10% of its susceptible neighbors. The probability of conversion from is 0.1, which implies due to the influence of anti-spreader nodes, their 10% susceptible neighbors go directly in recovered state. Similarly, the rate of conversion from infected state to recovered state is 20%, and the rate of conversion from recovered state to anti-spreader state is 90%. Hence, in this case, we have performed the simulation on relatively lower conversion rates as compared to the simulation performed in the toy network as shown in Fig. 3. This results in a significant number of nodes that are in the susceptible state apart from in anti-spreader state when the equilibrium is reached in the system. The increase in the value of the conversion rate, especially for and for , results in less number of susceptible nodes at the end of the simulation when equilibrium is reached. Also, many real-life networks like US-Airports, Brightkite and social networks are sparse networks where many nodes exist with relatively less degree. Here, degree means the number of direct neighbors or number of friends in social networks, and some of such nodes may not come in contact with either infected or anti-spreader nodes in the system and remains in the susceptible state or unaware of the information.
The endemic equilibrium state is the state where the disease or rumor cannot be totally eradicated but remains in the population (Ugwa et al. 2013). For the disease or rumor to persist in the population, the anti-spreader class, the susceptible class, the infectious class and the recovered class must not be zero at the equilibrium state, i.e., (S, I, R, A) (0, 0, 0, 0). In this case the equilibrium is stable, only if the conditions are such that , as given by calculation in Eq. (10). The results obtained in Fig. 6 on the various used datasets confirm that there exit an endemic equilibrium point and its stability in the system.
Fig. 6.
Endemic equilibrium characteristics of model observed on different used datasets. The results are obtained over 100 independent simulation of SIRA model with
Spreader and anti-spreader seeding: comparing centrality algorithms
The proposed model can compare two different node centrality algorithms for evaluating the spread and control of information to model the real-life situation. In the framework, we can change the comparing centrality algorithms. Node centrality methods intend to assign some score to each node of the network based on its significance and different parameters (Kumar et al. 2022a, b) In this case, spreaders are chosen from one centrality algorithm spread the rumor, and the anti-spreaders are chosen from the second algorithm dispel the rumor and vice versa. We apply , the infected scale, as a function of time, as the performance measure for this comparison. We employ the top 10 selected spreaders and top 10 selected anti-spreaders using the specified centrality algorithm for performing the comparison study. We intend to develop a generic framework where any two node centrality can be taken to compare the performance. In the case of unweighted networks, we consider NCVoteRank and Degree centrality as the choice of node centrality algorithms. However, in the case of the weighted networks, WVoteRank and WDegree centrality is viewed as the choice of node centrality algorithms. During the simulation, due to a nonzero value of , the count of anti-spreaders increases, and also newly became anti-spreaders can immune their neighbors as per the dynamics of the model.
The obtained results of comparing centrality is depicted in Fig. 7 for various considered datasets by using the parameters . From the results, it can be inferred that initially, the count of infected nodes increases due to the influence of selected seed nodes. However, shortly the initial seed and the converted anti-spreader nodes tend to slow down the conversion of susceptible nodes to the infected node and rapidly decrease the count of spreaders by converting them to recovered nodes based on the parameters considered. PowerGrid network is a weighted network, and we use WVoteRank centrality and WDegreeRank centrality for the selection of spreaders and anti-spreaders, respectively, and vice versa. WVoteRank as the choice for spreaders and WDegreeRank as the choice for anti-spreaders can get more infected users than WDegreeRank as the method for selecting spreaders and WVoteRank for the anti-spreaders, as evident in Fig. 7d. CA-GrQc is an unweighted network, and hence, NCVoteRank and DegreeRank are applicable for comparison. NCVoteRank as the choice for spreaders and DegreeRank as the choice for anti-spreaders are able to get more infected users than DegreeRank as the method for the selection of spreaders and NCVoteRank for the anti-spreaders, as evident in Fig. 7e. Hence, we can conclude that NCVoteRank, on unweighted networks, and WVoteRank, on weighted networks, act as better node selection algorithms at both the spreading, and the control of the rumor and fake news as compared to degree on the unweighted and weighted degree on the weighted networks.
Fig. 7.
Spreading of the information using comparing centrality algorithms on the various network datasets with NCVoteRank and DegreeRank used on unweighted networks, and WVoteRank and WDegreeRank on weighted networks with parameters values as
Conclusion
The healthcare social networks present potential risks for patients due to the possible distribution of poor quality or wrong information. In this paper, we proposed the rumor propagation model to investigate the process of rumor propagation and control in healthcare social networks. We added a new state to the model called the anti-spreader that spread the truth, to prevent the harmful effects of the rumor. Considering the variety in people’s reactions to rumors, we divided nodes into four categories, namely susceptible, anti-spreaders, recovered and infected. We modeled the system of differential equations mathematically and determined the reproduction number to find the equilibrium point and also confirmed the consistency of the proposed model on real-world datasets. We generalized our model into an information propagation model similar to the traditional models for modeling information diffusion to achieve influence maximization. In both weighted and unweighted networks, we compared two different centrality algorithms: one for choosing the spreaders and the other for choosing the anti-spreaders and vice versa and the amount of information spread. The studies showed that our model is coherent with the spread of rumors in social network topology, and our proposal gives a great reference to simulating and controlling the spread of rumors and fake news on the network. The proposed model is not applicable for heterogeneous networks. In the near future, we can extend our model to heterogeneous networks.
Author Contributions
All the authors have contributed equally in the research, compiling results and manuscript preparation.
Funding
No funding has been received.
Data availability
Enquiries about data availability should be directed to the authors.
Declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
The work conducted is not plagiarized. No one has been harmed in this work.
Consent to participate
All the authors have given consent to submit the manuscript.
Consent for publication
The authors provide their consent for the publication.
Footnotes
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Contributor Information
Akshi Kumar, Email: akshi.kumar@mmu.ac.uk.
Nipun Aggarwal, Email: nipundtu@gmail.com.
Sanjay Kumar, Email: sanjay.kumar@dtu.ac.in.
References
- Britton T. Stochastic epidemic models: a survey. Math Biosci. 2010;225(1):24–35. doi: 10.1016/j.mbs.2010.01.006. [DOI] [PubMed] [Google Scholar]
- Cho E, Myers SA, Leskovec J (2011) Friendship and mobility: friendship and mobility: user movement in location-based social networks. In: ACM SIGKDD international conference on knowledge discovery and data mining (KDD)
- Colizza V, Pastor-Satorras R, Vespignani A. Reaction-diffusion processes and metapopulation models in heterogeneous networks. Nat Phys. 2007;3:276–282. doi: 10.1038/nphys560. [DOI] [Google Scholar]
- Freeman LC. Centrality in social networks conceptual clarification. Soc Netw. 1978;1(3):215–239. doi: 10.1016/0378-8733(78)90021-7. [DOI] [Google Scholar]
- Guihua L, Zhen J. Global stability of an epidemic model. Chaos, Solitons Fractals. 2004;21(4):925–931. doi: 10.1016/j.chaos.2003.12.031. [DOI] [Google Scholar]
- Harko T, Lobo FSN, Mak MK. Exact analytical solutions of the Susceptible-Infected-Recovered (SIR) epidemic model and the SIR model with equal death and birth rates. Appl Math Comput. 2014;236(2014):184–194. [Google Scholar]
- Huang J, Jin X. Preventing rumor spreading on small-world networks. J Syst Sci Complex. 2011;24(3):449–456. doi: 10.1007/s11424-011-8303-1. [DOI] [Google Scholar]
- Indu V, Thampi SM. The nature-inspired approach based on the forest fire model for modeling rumor propagation in social networks. J Netw Comput Appl. 2019;125:28–41. doi: 10.1016/j.jnca.2018.10.003. [DOI] [Google Scholar]
- Izhikevich EM. Equilibrium. Scholarpedia. 2007;2(10):2014. doi: 10.4249/scholarpedia.2014. [DOI] [Google Scholar]
- Kaur S, Kumar P, Kumaraguru P. Automating fake news detection system using multi-level voting model. Soft Comput. 2020;24(12):9049–9069. doi: 10.1007/s00500-019-04436-y. [DOI] [Google Scholar]
- Kijkuit B, Ende J. The organizational life of an idea: integrating social network, creativity, and decision-making perspectives. J Manage Stud. 2007;44(6):863–882. doi: 10.1111/j.1467-6486.2007.00695.x. [DOI] [Google Scholar]
- Kumar S, Panda BS. Identifying influential nodes in social networks: neighborhood coreness based voting approach. Stat Mech Appl, Phys A. 2020;553:124215. doi: 10.1016/j.physa.2020.124215. [DOI] [Google Scholar]
- Kumar S, Panda A. Identifying influential nodes in weighted complex networks using an improved WVoteRank approach. Appl Intell. 2022;52:1838–1852. doi: 10.1007/s10489-021-02403-5. [DOI] [Google Scholar]
- Kumar S, Saini M, Goel M, Aggarwal N. Modeling information diffusion in online social networks using SEI epidemic model. Procedia Comput Sci. 2020;171:672–678. doi: 10.1016/j.procs.2020.04.073. [DOI] [Google Scholar]
- Kumar S, Mallik A, Khetarpal A, Panda BS. Influence maximization in social networks using graph embedding and graph neural network. Inf Sci. 2022 doi: 10.1016/j.ins.2022.06.075. [DOI] [Google Scholar]
- Kumar S, Gupta A, Khatri I (2022) CSR: A community based spreaders ranking algorithm for influence maximization in social networks. World Wide Web, 1–20
- Lai K, Xiong X, Jiang X, Sun M, He L. Who falls for rumor? Influence of personality traits on false rumor belief. Pers Individ Differ. 2020;152:109520. doi: 10.1016/j.paid.2019.109520. [DOI] [Google Scholar]
- Leskovec J, Kleinberg J, Faloutsos C. Graph evolution: densification and shrinking diameters. ACM Trans Knowl Discov Data (ACM TKDD) 2007;1(1):2. doi: 10.1145/1217299.1217301. [DOI] [Google Scholar]
- Leskovec J, Lang K, Dasgupta A, Mahoney M. Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters. Internet Math. 2009;6(1):29–123. doi: 10.1080/15427951.2009.10129177. [DOI] [Google Scholar]
- Lyapunov AM. The general problem of the stability of motion. Int J Control. 1992;55(3):531–534. doi: 10.1080/00207179208934253. [DOI] [Google Scholar]
- O’Keeffe GS, Clarke-Pearson K. The impact of social media on children, adolescents, and families. Pediatrics. 2011;127(4):800–804. doi: 10.1542/peds.2011-0054. [DOI] [PubMed] [Google Scholar]
- Pfeffer J, Zorbach T, Carley KM. Understanding online firestorms: negative word-of-mouth dynamics in social media networks. J Mark Commun. 2013;20(1–2):117–128. [Google Scholar]
- Qiu L, Jia W, Niu W, Zhang M, Liu S. SIR-IM: SIR rumor spreading model with influence mechanism in social networks. Soft Comput. 2021;25(22):13949–13958. doi: 10.1007/s00500-020-04915-7. [DOI] [Google Scholar]
- Ripeanu M, Foster I, Iamnitchi A (2002) Mapping the gnutella network: properties of large-scale peer-to-peer systems and implications for system design. arXiv preprint cs/0209028
- Roussel MR. Stability analysis for ODEs. Canada: University Hall; 2005. Nonlinear Dynamics, lecture notes. [Google Scholar]
- Sivasankari S, Vadivu G (2021) Tracing the fake news propagation path using social network analysis. Soft Comput 1-9
- Spohr D. Fake news and ideological polarization. Bus Inf Rev. 2017;34(3):150–160. [Google Scholar]
- Tripathy RM, Bagchi A, Mehta S (2010) A study of rumor control strategies on social networks. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management - CIKM ’10. Presented at the 19th ACM international conference, 1817–1820
- Ugwa KA, Agwu IA, Akuagwu NA. Mathematical analysis of the endemic equilibrium of the transmission dynamics of tuberculosis. Int J Technol Enhanc Emerg Eng Res. 2013;2(12):263–9. [Google Scholar]
- Wan YP, Zhang DG, Ren QH. Propagation and inhibition of online rumor with considering the rumor elimination process. Acta Phys Sin. 2015;64(24):240501. doi: 10.7498/aps.64.240501. [DOI] [Google Scholar]
- Wang C, Wang G, Luo X, Li H. Modeling rumor propagation and mitigation across multiple social networks. Phys A. 2019;535:122240. doi: 10.1016/j.physa.2019.122240. [DOI] [Google Scholar]
- Watts DJ, Strogatz SH (1998) Collective dynamics of small-world networks. Nature 393:440–442 [DOI] [PubMed]
- Yang A, Huang X, Cai X, Zhu X, Lu L. ILSR rumor spreading model with degree in a complex network. Phys A. 2019;531:121807. doi: 10.1016/j.physa.2019.121807. [DOI] [Google Scholar]
- Zhu H, Ma J. Analysis of SHIR rumor propagation in random heterogeneous networks with dynamic friendships. Phys A. 2018;513:257–271. doi: 10.1016/j.physa.2018.09.015. [DOI] [Google Scholar]
- Zhu L, Liu W, Zhang Z. Delay differential equations modeling of rumor propagation in both homogeneous and heterogeneous networks with a forced silence function. Appl Math Comput. 2020;370:124925. [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
Enquiries about data availability should be directed to the authors.






