<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Big Data</journal-id>
<journal-title>Frontiers in Big Data</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Big Data</abbrev-journal-title>
<issn pub-type="epub">2624-909X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fdata.2019.00017</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Big Data</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Twitter Response to Munich July 2016 Attack: Network Analysis of Influence</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Bermudez</surname> <given-names>Ivan</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Cleven</surname> <given-names>Daniel</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Gera</surname> <given-names>Ralucca</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Kiser</surname> <given-names>Erik T.</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Newlin</surname> <given-names>Timothy</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Saxena</surname> <given-names>Akrati</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/709107/overview"/>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>Naval Postgraduate School</institution>, <addr-line>Monterey, CA</addr-line>, <country>United States</country></aff>
<aff id="aff2"><sup>2</sup><institution>Department of Computer Science, National University of Singapore</institution>, <addr-line>Singapore</addr-line>, <country>Singapore</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Sabrina Gaito, University of Milan, Italy</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Vincent Labatut, Laboratoire Informatique d&#x00027;Avignon, France; Marinette Savonnet, Universit&#x000E9; de Bourgogne, France</p></fn>
<corresp id="c001">&#x0002A;Correspondence: Ralucca Gera <email>rgera&#x00040;nps.edu</email></corresp>
<fn fn-type="other" id="fn001"><p>This article was submitted to Data Mining and Management, a section of the journal Frontiers in Big Data</p></fn></author-notes>
<pub-date pub-type="epub">
<day>25</day>
<month>06</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="collection">
<year>2019</year>
</pub-date>
<volume>2</volume>
<elocation-id>17</elocation-id>
<history>
<date date-type="received">
<day>24</day>
<month>03</month>
<year>2019</year>
</date>
<date date-type="accepted">
<day>03</day>
<month>06</month>
<year>2019</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2019 Bermudez, Cleven, Gera, Kiser, Newlin and Saxena.</copyright-statement>
<copyright-year>2019</copyright-year>
<copyright-holder>Bermudez, Cleven, Gera, Kiser, Newlin and Saxena</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract><p>Social Media platforms in Cyberspace provide communication channels for individuals, businesses, as well as state and non-state actors (i.e., individuals and groups) to conduct messaging campaigns. What are the spheres of influence that arose around the keyword <italic>&#x00023;Munich</italic> on Twitter following an active shooter event at a Munich shopping mall in July 2016? To answer that question in this work, we capture tweets utilizing <italic>&#x00023;Munich</italic> beginning 1 h after the shooting was reported, and the data collection ends approximately 1 month later<xref ref-type="fn" rid="fn0001"><sup>1</sup></xref>. We construct both daily networks and a cumulative network from this data. We analyze community evolution using the standard Louvain algorithm, and how the communities change over time to study how they both encourage and discourage the effectiveness of an information messaging campaign. We conclude that the large communities observed in the early stage of the data disappear from the <italic>&#x00023;Munich</italic> conversation within 7 days. The politically charged nature of many of these communities suggests their activity is migrated to other Twitter hashtags (i.e., conversation topics). Future analysis of Twitter activity might focus on tracking communities across topics and time.</p></abstract>
<kwd-group>
<kwd>Twitter data analysis</kwd>
<kwd>Munich July 2016 attack</kwd>
<kwd>social network analysis</kwd>
<kwd>meme propagation</kwd>
<kwd>influence spread</kwd>
</kwd-group>
<counts>
<fig-count count="5"/>
<table-count count="0"/>
<equation-count count="2"/>
<ref-count count="31"/>
<page-count count="9"/>
<word-count count="5543"/>
</counts>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="s1">
<title>1. Introduction</title>
<sec>
<title>1.1. Event Background</title>
<p>On July 22, 2016, a mass shooting occurred in a shopping mall in Munich, Germany. The attacker was quickly identified by local police as an 18 year old German-Iranian dual national resident of Munich (Harrison, <xref ref-type="bibr" rid="B10">2016</xref>). As is often the case after high impact incidents like mass shootings, there was a high volume of conversation in social media associated with this shooting. Conversations range from official government accounts providing instructions to affected people, speculation regarding the identity and motivation of the attacker(s), and individuals or news organizations providing reports (accurate or otherwise) of the event. As micro-blogging services like Twitter become more popular, it becomes interesting to analyze the data generated by the service in an attempt to extract topologies or trends that may provide insight into the event in question. A timeline of this event is displayed in <xref ref-type="fig" rid="F1">Figure 1</xref>.</p>
<fig id="F1" position="float">
<label>Figure 1</label>
<caption><p>Timeline of attack (Zeitung, <xref ref-type="bibr" rid="B30">2016</xref>).</p></caption>
<graphic xlink:href="fdata-02-00017-g0001.tif"/>
</fig>
</sec>
<sec>
<title>1.2. Motivation: Twitter Connection to Information Warfare</title>
<p>The Internet and Cyberspace foster many types of activities that involve different aspects of human social interaction. We can visualize and analyze the relationships that convey these interactions using network science techniques. Twitter is undoubtedly a common channel by which significant online social interaction occurs. Individuals, organizations, and nation states all use this tool as a medium of communication and many interested listeners, then retweet statements they believe deserve the attention of others. Both the real world and contrived activity generate conversations around a particular hashtag. Regardless of the authenticity of an event, the social interactions that occur during and after its occurrence have a real effect on the way humans perceive the world and can influence their future actions both in the world and in Cyberspace. To improve our appreciation for how message information both spreads and decays, we increasingly study and understand how information campaigns develop and change.</p>
<p>Information Warfare has been occurring for as long as parties have been trying to deceive their opponents. While the information itself may not be physical, it is considered by social scientists and the Department of Defense in Joint Publication 1 (Department of Defense, <xref ref-type="bibr" rid="B7">2013</xref>) as one of the instruments of national power that the nation states utilize in order to pursue their ends. The other instruments include Diplomatic, Military, and Economic power (DIME) (Department of Defense, <xref ref-type="bibr" rid="B7">2013</xref>). At first glance, Twitter seems to offer the empowerment of free speech to any user, and yet our analysis of the retweeting that occurs helps demonstrate how little many users are interested in genuine original thought. Rather, the majority of traffic tends to gravitate toward sharing the thoughts of a few accounts. We believe that such influence, while not forced by any entity, still offers tremendous power for parties engaged in Information Warfare to increase their power within the domain of Cyberspace. This power is not limited to national security and a nation&#x00027;s foreign policy but extends into the realms of domestic politics, sports, business, and many other areas.</p>
<p>Does Twitter offer the empowerment of free speech to any user? And does that make a difference? To understand this, we analyze the Twitter data we collected on the Munich attack using Netlytic (Gruzd, <xref ref-type="bibr" rid="B8">2016</xref>), a software that captures data and can perform social network analysis as well. We collected dataset focused on the surge in Twitter activity using <italic>&#x00023;Munich</italic> linked to the July 22 shootings which garnered international attention across social media and traditional reporting channels. We analyze both temporal slices of the data and the cumulative dataset to better understand how information and messages propagate across Twitter. In particular, we are interested in the community structure, its evolution, and the role of top influential leaders within these communities.</p>
<p>The main contributions of the paper are: (1) The collection of the hashtaged <italic>&#x00023;Munich</italic> dataset from Twitter for an active shooter event at a Munich shopping mall in July 2016. (2) The general analysis of the cumulative network of retweets for this incident. (3) The evolution of the influence flow-based communities in temporal network of timeslices by day. In section 2 we discuss related work. Section 3 covers the problem definition and the details of the collected dataset. In sections 4 and 5, we discuss the methodology and results, respectively. The paper concludes with several future directions.</p>
</sec>
</sec>
<sec id="s2">
<title>2. Related Work</title>
<p>In the current era of social networking, information sharing has been easier by posting microblogs (Kempe et al., <xref ref-type="bibr" rid="B13">2003</xref>; Leskovec et al., <xref ref-type="bibr" rid="B14">2007</xref>). The influence spreads very fast over the network and impacts the opinion of the users or maybe groups of users, i.e., communities (Lin et al., <xref ref-type="bibr" rid="B16">2008</xref>). Researchers have studied the influence propagation on Social networking platform and their impact on network structure (Sadikov and Martinez, <xref ref-type="bibr" rid="B22">2009</xref>; Chen et al., <xref ref-type="bibr" rid="B6">2013</xref>; Saxena et al., <xref ref-type="bibr" rid="B23">2015</xref>). Hong et al. (<xref ref-type="bibr" rid="B11">2011</xref>) proposed a method that successfully predicts popular tweets using the content of the message, temporal information, metadata of messages and users, structural properties of the users&#x00027; social network.</p>
<p>Of more specific interest to us is the study of spreading behavior of tweets in case of attacks, hazards, natural calamities, etc, and how it affects the opinion of the users. Nadamoto et al. (<xref ref-type="bibr" rid="B18">2013</xref>) observed that the spreading of rumor during the disaster situation is different from the normal situation. In a disaster situation, the rumor goes through two or three hierarchy, but in the normal situation, it passes through many hierarchies. In the case of news spreading during disasters, Jin et al. (<xref ref-type="bibr" rid="B12">2014</xref>) showed that lies, half-truths, and rumors spread in the same way as true news using tweets during the Ebola crisis. On the other hand, Mendoza et al. (<xref ref-type="bibr" rid="B17">2010</xref>) showed that the propagation of rumor differs from the true news, and this information can be used to detect rumors using aggregated analysis on tweet dataset collected on the 2010 earthquake in Chille. Spiro et al. (<xref ref-type="bibr" rid="B26">2012</xref>) proposed a model for the waiting time of retweets and showed that the hazard related tweets have a shorter waiting time. For a non-disaster situations, Vosoughi et al. (<xref ref-type="bibr" rid="B28">2018</xref>) observed that the false news spread faster, farther and deeper, and are more prominent in the case of political news than financial, disaster, terrorism or science-related news. This research is based on Twitter data spanning 11 years comprising around 126,000 stories tweeted by around 3 million people. A brief survey on influence propagation on online social networks can be seen at Bonchi (<xref ref-type="bibr" rid="B4">2011</xref>).</p>
<p>How do communities emerge while influence spread? Gupta et al. (<xref ref-type="bibr" rid="B9">2016</xref>) studied the role of core-periphery structure in the information propagation to multiple communities. Complementing the spreading behavior, we are also interested in identifying influential user or users on Twitter, the emergence of influential leaders in different communities, how they shift from one community to another and how they die out (Tsur and Rappoport, <xref ref-type="bibr" rid="B27">2012</xref>; Riquelme and Gonz&#x000E1;lez-Cantergiani, <xref ref-type="bibr" rid="B20">2016</xref>). More specific, understanding this phenomenon based on dominant language per hashtag to trace which users overlap between the thematic and linguistic communities delineated by different information streams (Bastos et al., <xref ref-type="bibr" rid="B2">2013</xref>). Our research examines several language communities that intermix with political leanings of conversations, Spanish, French, and English all use <italic>&#x00023;Munich</italic> although it is important to remember the German discussion mostly emerged under &#x00023;M&#x000FC;nchen. By studying the dependencies between global features such as graph topology and content features emergence helps in explaining how long members might remain in the community and the importance of repeated messaging to maintain the community of influence over time. Successful prediction of the spread of memes can improve marketing efforts whether the target is a commercial product or an idea being promoted.</p>
<p>Influence propagation has also been studied using the multilayered structure of online social networks. The layers depict either different type of relationship, allowing the researchers to perform studies at different granularity (Li et al., <xref ref-type="bibr" rid="B15">2012</xref>; Zhuang and Ya&#x0011F;an, <xref ref-type="bibr" rid="B31">2016</xref>) or the layers representing followers, mentions or retweeting (Borondo et al., <xref ref-type="bibr" rid="B5">2015</xref>). We also include the multilayer aspect in our research in a different way, namely temporally. Wang et al. (<xref ref-type="bibr" rid="B29">2008</xref>) stated that most nodes lack stability in the evolution of the network between time steps, and the manner in which time is partitioned will determine how communities are detected. This inspires our analysis to examine if and how accounts migrate between communities over time. Yet, in terms of stability, Romero et al. (<xref ref-type="bibr" rid="B21">2011</xref>) highlighted that hashtags on politically controversial topics are particularly persistent, with repeated exposures continuing to have unusually large marginal effects on adoption. In this research, we do not specifically examine how long certain messages persist, but the observation about political messages lasting longer is related to how long individuals choose to continue retweeting the same leader accounts over multiple days. That information is captured in the multipartite temporal network, and it is shown in section 5.</p>
<p>Smith et al. (<xref ref-type="bibr" rid="B25">2014</xref>) from the Pew Research Center found six different network structures (Polarized Crowds, Tight Crowd, Brand Clusters, Community Clusters, Broadcast Network, Support Network) that emerge in social media networks. They study how the structures differ based on the content of the issues driving the discussion, highlighting the importance that most real social networks are usually a hybrid of multiple structures. The research shows that Broadcast Network, and Support Network have large size groups, Tight Crowd has medium size groups, and Brand clusters and Community Clusters have many small sized groups. The structures of interest to the <italic>&#x00023;Munich</italic> dataset were the Community Clusters, and Broadcast Network. Both of these structures appeared within the context of the retweets in the month following the July 2016 attack in Munich. The Pew researchers give voice to the idea that mapping the social landscape using networks helps interpret trends, topics, and implications of the technologies being used. Our analysis of the <italic>&#x00023;Munich</italic> data regarding the polarized crowd supports the Pew team&#x00027;s statement that if a topic is political, it is common to see two separate groups take shape and they form two distinct discussion groups that mostly do not interact with each other. The groups are recognizably liberal or conservative (Smith et al., <xref ref-type="bibr" rid="B25">2014</xref>). Each group links to a different set of influential people or organizations that can be found at the center of each conversation cluster.</p>
</sec>
<sec id="s3">
<title>3. Problem Definition and Dataset</title>
<p>The broader problem examined in this research is how social media spheres of influence in Cyberspace can be employed to conduct information operations campaigns. We analyze the communities of influence in the considered dataset and their evolution over time.</p>
<p>The approach to solving this problem uses efforts similar to Pew Research (Smith et al., <xref ref-type="bibr" rid="B25">2014</xref>) work on Social Media, personalized for the <italic>&#x00023;Munich</italic> Dataset. Our background research leads to the understanding that the structure of the network we create affects how communities emerge. In this work, we focus on retweets only, because they convey the aspect of influence, as individuals choose to associate with particular leader&#x00027;s thoughts. The network&#x00027;s nodes are thus the Twitter accounts that have retweets at least once, and directed edges connect retweeting accounts to the account of origin for that message.</p>
<p>The original data captured in Netlytics consists of 13 files of total 655 MB (Gruzd, <xref ref-type="bibr" rid="B8">2016</xref>). It conveys all Tweets captured from July 22, 2016 to August 22, 2016 labeled with <italic>&#x00023;Munich</italic>. This discussion topic involved 147,116 Twitter accounts that either tweeted or re-tweeted <italic>&#x00023;Munich</italic> messages during those 32 days. Each row of the dataset containes several categories including the text of the Tweet, date, time, author, type of device it was posted from when user/account was created, and the Twitter profile location.</p>
<p>Our research focuses on the Tweets that contain the retweet indicator, &#x0201C;RT&#x00040;&#x0201D;, in the text or body of the message. Of the total 925,019 Tweets, 79.8% were retweets, and 72% of all retweets occurred between July 22 and July 25 which corresponds to the first 3 days after the shooting. The Tweets cover several languages including English, French, and Spanish, all of which use the spelling Munich for the city. However, very few German language Tweets are captured because German Twitter users use the German spelling of &#x0201C;M&#x000FC;nchen&#x0201D; instead of &#x0201C;Munich.&#x0201D;</p>
</sec>
<sec sec-type="methods" id="s4">
<title>4. Methodology</title>
<p>The raw data was used to build a directed graph <italic>G</italic><sub>0</sub> of the <italic>&#x00023;Munich</italic> data using the following methodology.</p>
<list list-type="simple">
<list-item><p>(1) Every unique Twitter account that occurred in our data is represented by a node,</p></list-item>
<list-item><p>(2) A directed edge is placed from node <italic>u</italic> to node <italic>v</italic> if user <italic>u</italic> retweets the tweet that was initially posted by user <italic>v</italic>,</p></list-item>
<list-item><p>(3) Edge weights represent the number of times user <italic>u</italic> retweeted user <italic>v</italic>&#x00027;s tweets, and</p></list-item>
<list-item><p>(&#x0002A;) Edges in <italic>G</italic><sub>0</sub> did not contain any temporal information.</p></list-item>
</list>
<p>The resulted graph <italic>G</italic><sub>0</sub> has 147, 116 nodes, 191, 002 edges. To this graph we apply a standard community detection algorithm called Louvain (Blondel et al., <xref ref-type="bibr" rid="B3">2008</xref>). The algorithm assigns nodes randomly to communities, measures the strength of the community partition using modularity (Newman, <xref ref-type="bibr" rid="B19">2006</xref>), and shuffles neighbors from one community to another while maximizing modularity. The result of the Louvain algorithm is 5, 807 communities, which will become part of our cumulative analysis of this network.</p>
<p>Our temporal analysis of the raw data reveals that over 72% of all retweets occurred between July 22, 2016 and July 25, 2016 as shown in <xref ref-type="fig" rid="F2">Figure 2</xref>. For temporal analysis, we thus focus the analysis on these 4 days, for which we build sub-graphs <italic>G</italic><sub>22</sub>, <italic>G</italic><sub>23</sub>, <italic>G</italic><sub>24</sub>, <italic>G</italic><sub>25</sub> using the same methodology described above, but only capturing retweets of the top twenty leaders for each day.</p>
<fig id="F2" position="float">
<label>Figure 2</label>
<caption><p><italic>&#x00023;Munich</italic> retweets by date.</p></caption>
<graphic xlink:href="fdata-02-00017-g0002.tif"/>
</fig>
<p>Building upon Smith&#x00027;s observations (Smith et al., <xref ref-type="bibr" rid="B25">2014</xref>), we propose and compute the leader score for every node. This score shows which user accounts are influential within a community, and provide a relative scale of their influence. The leader score for every node <italic>u</italic> in <italic>G</italic> is computed as follows.</p>
<disp-formula id="E1"><label>(1)</label><mml:math id="M1"><mml:mtable class="eqnarray" columnalign="right center left"><mml:mtr><mml:mtd><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mi>a</mml:mi><mml:mi>d</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>s</mml:mi><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>u</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>d</mml:mi><mml:mi>e</mml:mi><mml:msub><mml:mrow><mml:mi>g</mml:mi></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>u</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mi>d</mml:mi><mml:mi>e</mml:mi><mml:msub><mml:mrow><mml:mi>g</mml:mi></mml:mrow><mml:mrow><mml:mi>o</mml:mi><mml:mi>u</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>u</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>&#x0002B;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mfrac><mml:mo>.</mml:mo></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>We further propose a metric to compare leader-centric communities across time, computed in two steps: (1) run Louvain community detection on sub-graphs <italic>G</italic><sub>22</sub>, <italic>G</italic><sub>23</sub>, <italic>G</italic><sub>24</sub>, <italic>G</italic><sub>25</sub>, and then (2) add an edge between communities if they have a shared user. Let <italic>U</italic><sub><italic>t</italic></sub> be the set of users comprising community <italic>U</italic> on day (<italic>t</italic>), and <italic>V</italic><sub><italic>t</italic>&#x0002B;1</sub> be the set of users comprising community <italic>V</italic> on day (<italic>t</italic> &#x0002B; 1). We then compute the similarity between two communities as,</p>
<disp-formula id="E2"><label>(2)</label><mml:math id="M2"><mml:mtable class="eqnarray" columnalign="right center left"><mml:mtr><mml:mtd><mml:mrow><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>m</mml:mi><mml:mi>i</mml:mi><mml:mi>l</mml:mi><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>y</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:msub><mml:mi>U</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x0002B;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:mi>a</mml:mi><mml:mi>v</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>g</mml:mi><mml:mi>e</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>U</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x02229;</mml:mo><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x0002B;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>U</mml:mi><mml:mi>t</mml:mi></mml:msub></mml:mrow></mml:mfrac><mml:mo>,</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi>U</mml:mi><mml:mi>t</mml:mi></mml:msub><mml:mo>&#x02229;</mml:mo><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x0002B;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mo>&#x0002B;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>.</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>Similarity metric assigns the value while considering the sizes of the communities, as community sizes may vary a lot due to their sphere of influence. Next, we present the analysis results using the discussed metrics.</p>
</sec>
<sec id="s5">
<title>5. Results and Analysis</title>
<p>In exploring the data set of all the Tweets with <italic>&#x00023;Munich</italic>, we notice that about 80% of the Tweets were individuals retweeting other users. This dynamically captures the influence of a very small portion of the overall accounts, because these tweets include content that a large number of other users identify with as they get retweeted.</p>
<p>The distribution of retweets vs. day is shown in <xref ref-type="fig" rid="F2">Figure 2</xref>. Observe that the distribution of all retweets for 32 days has a strong positive skew with the majority of retweets occurring the day after the attack. Notice that within a week, the activity returns to a level similar to before the attack.</p>
<p>We begin our study with the community structure of the cumulative dataset using Louvain algorithm, identifying 5, 807 communities. For better visualization, we create a graph <italic>G</italic><sup>&#x0002A;</sup> from <italic>G</italic><sub>0</sub> by selecting the 20 largest communities in <italic>G</italic><sub>0</sub>. <italic>G</italic><sup>&#x0002A;</sup> contains less than 1% of the communities, but it still accounts for over 70% of the nodes and 75% of the edges in <italic>G</italic><sub>0</sub>. <xref ref-type="fig" rid="F3">Figure 3</xref> shows a plot of the <italic>G</italic><sup>&#x0002A;</sup> using the ForceAtlas visualization from Gephi (Bastian, <xref ref-type="bibr" rid="B1">2009</xref>). A large number of edges or high edge weights between two communities corresponds to greater proximity on the visualization; whereas communities which share few or no edges will be spaced further apart on the visualization.</p>
<fig id="F3" position="float">
<label>Figure 3</label>
<caption><p>Visualization of <italic>G</italic>&#x0002A;.</p></caption>
<graphic xlink:href="fdata-02-00017-g0003.tif"/>
</fig>
<p>The information box for each community in <xref ref-type="fig" rid="F3">Figure 3</xref> conveys the following information:</p>
<list list-type="order">
<list-item><p>The percent of nodes in <italic>G</italic><sub>0</sub> that the community comprises.</p></list-item>
<list-item><p>The predominant language of the community, as,</p>
<list list-type="bullet">
<list-item><p>EN: English</p></list-item>
<list-item><p>ES: Spanish</p></list-item>
<list-item><p>FR: French</p></list-item>
<list-item><p>HI: Hindi</p></list-item>
</list>
</list-item>
<list-item><p>A brief characterization of the community based on the profiles of its leaders using commonly accepted definitions of conservative and liberal social views. The term social commentary is used to emphasize the proffering of opinions rather than the objective conveyance of information.</p></list-item>
</list>
<p><xref ref-type="fig" rid="F3">Figure 3</xref> reveals a partitioning of the communities along linguistic and political lines. We observe that a community built around a common language and/or shared political views is more likely to have a higher edges density. One can visually interpret the data in <xref ref-type="fig" rid="F3">Figure 3</xref> as follows:</p>
<list list-type="bullet">
<list-item><p>Horizontally (left to right): socially conservative communities, politically neutral communities/news sources, socially liberal communities</p></list-item>
<list-item><p>Vertically (top to bottom): English language communities, French language communities, Spanish language communities.</p></list-item>
</list>
<p>Note that the FC Bayern Munich community might be outside the scope of the study of the July 22nd attack, rather tweets on football using the same hashtag(&#x00023;Munich). Since the data captured it anyway, we have shown it in the analysis.</p>
<p>The partitioning of communities along language and political views reinforces the findings of the Pew study (Smith et al., <xref ref-type="bibr" rid="B25">2014</xref>). The relatively small size of the communities represents news sources given a large number of Twitter followers many of these news outlets have. This is likely a result of how the network is built since it only captures the accounts who actively retweet others yet fail to capture passive users who consume Tweets but do not actively retweet.</p>
<p>Terrorist events such as the Munich attack create a unique circumstance where we assume that leaders within preexisting communities (fundamental communities) attach themselves to a particular hashtag (e.g., topic) and form topic communities. This creates the following cases for followers and leaders.</p>
<list list-type="order">
<list-item><p>A user exists in the fundamental community but not in the topic community</p></list-item>
<list-item><p>A user exists in both the fundamental community and the topic community</p></list-item>
<list-item><p>A user exists in a topic-specific community but not in the underlying fundamental community.</p></list-item>
</list>
<p>For example, user <italic>u</italic> agrees with the sentiment of leader <italic>v</italic>&#x00027;s Tweet on the topic of the <italic>&#x00023;Munich</italic> and retweets <italic>v</italic>&#x00027;s message. Users <italic>u</italic> and <italic>v</italic> are in the same topic community, but not necessarily in the same fundamental communities if in general their views do not coincide.</p>
<p>To understand the influential hierarchy of the network, we first apply the core-periphery analysis of the network using K-shell decomposition method (Seidman, <xref ref-type="bibr" rid="B24">1983</xref>). The k-shell decomposition method assigns a k-shell value to each node, and it works in the following way. The k-shell method first removes all nodes of degree one until there is no node of degree one or less, and assigns them k-shell value 1. Iteratively, it will remove nodes of degree 2, 3, 4&#x02026;and will assign them k-shell value 2, 3, 4&#x02026;respectively. While removing the nodes of degree <italic>k</italic>, if any node is ended up having degree <italic>k</italic> or less, will also be removed in the same iteration. The method is stopped once each node has been assigned a k-shell value. <italic>k</italic>-core of a network contains all the nodes having k-shell value equal to or higher than <italic>k</italic>. <xref ref-type="fig" rid="F4">Figure 4</xref> presents the split of the 1-core, 3-core and the 5-core between the communities for a better understanding of the core-periphery structure. We observe that the cores of different communities are connected with each other, thus leaders communicate or influence each others. We also observe that the smaller communities do not have higher influential nodes having a higher k-shell value, which could be the reason why they did not become larger communities overtime. Next, we do the temporal analysis of retweet networks for better understanding the role and evolution of the communities.</p>
<fig id="F4" position="float">
<label>Figure 4</label>
<caption><p>Community partition within different k-cores.</p></caption>
<graphic xlink:href="fdata-02-00017-g0004.tif"/>
</fig>
<sec>
<title>5.1. Temporal Leader Networks</title>
<p>In this section, we study the evolution of the communities found in the cumulative graph for the first 4 days succeeding the attack. This subset is deemed adequate by examining the frequency of retweets in each day for the whole period. As seen in <xref ref-type="fig" rid="F2">Figure 2</xref>, the majority of traffic occurs from the 22 to 25 of July 2016. This subset of data is used to create the multilayer network seen in <xref ref-type="fig" rid="F5">Figure 5</xref>.</p>
<fig id="F5" position="float">
<label>Figure 5</label>
<caption><p>Multipartite temporal community daily evolution.</p></caption>
<graphic xlink:href="fdata-02-00017-g0005.tif"/>
</fig>
<p>In this multilayer network, the nodes represent each of the top 20 communities, and a single layer is created for each day. The nodes are sized by the number of users in that community and colored by the communities they belong to in the cumulative graph. The label of each node corresponds to the leader in that community as defined by Equation (1). We then add an edge from a node in one layer to a node in another layer if there are any shared users between the two communities. This captures the continuity of community membership. The weight of the edge is then computed using Equation (2) as described in the methodology.</p>
<p>The resulting network provides significant insight into the evolution of communities over time. <xref ref-type="fig" rid="F5">Figure 5</xref> provides visualization for the migration of users and leaders between different communities. We also observe that community leaders appear or disappear each day depending on whether they generate a tweet message and the volume of retweets. For example, the Russian based English language news (RTcom) community dies out after July 23.</p>
<p>We further observe that a significant amount of users retweet from the same community. Although this observation is prevalent in the data, it is most evident in the community labeled as French conservative social commentary. We observe that a high amount of users that retweeted from &#x00040;tprincedelamour on July 23, 2016, did so again on the next day.</p>
<p>Following communities from left to right we see how they can merge from several nodes to one or split from one over each day, as is the case with the English conservative social commentary (USA based) community. Lastly, the &#x00040;jazayerli community is seen to grow from the 24 to 25 of July with no connecting edge. The lack of an edge between these two nodes is because the community consists of just one Twitter message generated by &#x00040;jazayerli that is retweeted several times over the 2 days.</p>
<p>The cumulative and temporal graphs of the Twitter data complement each other by providing overlapping insight into the communities described. <xref ref-type="fig" rid="F5">Figure 5</xref> provides insight into the nature of each community; how did leaders and followers&#x00027; activities for a given community change across time. <xref ref-type="fig" rid="F3">Figure 3</xref> provides an overview of each community and its relative importance across time and the degree to which communities and leaders are connected. Examining the yellow colored community lead by &#x00040;jazayerli, it becomes clear from <xref ref-type="fig" rid="F3">Figure 3</xref> that this community is a peninsula (a very small community) and <xref ref-type="fig" rid="F5">Figure 5</xref> illustrates that this particular community dominated the <italic>&#x00023;Munich</italic> retweets on July 25.</p>
</sec>
</sec>
<sec id="s6">
<title>6. Conclusions and Further Directions</title>
<p>In this work, we collect and analyze the Twitter data of <italic>&#x00023;Munich</italic> July 2016 attack corresponding to a month-long period after the July 22 shootings in Munich. We study the community structure in the cumulative dataset as well as daily partitions and classify each community based on the nature of its leaders and their tweets. This study provides insight on how information spreads on Twitter in case of an event, and we observe how the important leaders disappear from the network of <italic>&#x00023;Munich</italic> retweets after a week of the attack. The leaders in the first week tended to be news organizations or social leaders with strong or extreme views. Communities expressing strong opinions were the most active; however, as mentioned, the collected data is unable to account for passive users (e.g., users who may read a Tweet and internalize the information or message but do not retweet the message). One can further study the impact of the event on other users who are not directly involved in tweeting and retweeting, however, have been affected by the event. The analysis can also be extended to different social media platforms for better understanding.</p>
<p>This research opens up several questions to be studied for a better understanding of the evolution of the network in case of terrorist attacks. One can identify the leaders and follow them across multiple hashtags to determine topic communities of leaders for each hashtag. By comparing a leader&#x00027;s topic networks and identifying users that retweet the leader across multiple different topics, we can understand the development of the fundamental and topic-based communities represented by that leader. These communities can be further classified based on different parameters, such as is the community passive where the leader has many followers, but few retweets; or is it active where the majority of users following a leader actively retweet the leader across many different topics.</p>
<p>All these approaches will be fruitful in a deeper understanding of how communities generate influence in social media networks. Given the increasing use of online social media, the implications for how corporations, organizations, and nation states conduct influence campaigns will continue to grow as part of future information operations.</p>
</sec>
<sec id="s7">
<title>Data Availability</title>
<p>The datasets generated for this study are available on request to the corresponding author.</p>
</sec>
<sec id="s8">
<title>Author Contributions</title>
<p>IB, DC, EK, and TN collected the dataset, discussed the research methodology, implemented the project, and contributed to the writing of the manuscript. RG and AS contributed to the research methodology and its implementation, analysis of the results, and writing of the manuscript.</p>
<sec>
<title>Conflict of Interest Statement</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
</sec>
</body>
<back>
<ack><p>We would like to thank the DoD for partially sponsoring the current research.</p>
</ack>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bastian</surname> <given-names>M.</given-names></name> <name><surname>Heymann</surname> <given-names>S.</given-names></name> <name><surname>Jacomy</surname> <given-names>M.</given-names></name></person-group> (<year>2009</year>). <article-title>Gephi: an open source software for exploring and manipulating networks</article-title>. <source>ICWSM</source> <volume>8</volume>, <fpage>361</fpage>&#x02013;<lpage>362</lpage>.</citation></ref>
<ref id="B2">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Bastos</surname> <given-names>M. T.</given-names></name> <name><surname>Puschmann</surname> <given-names>C.</given-names></name> <name><surname>Travitzki</surname> <given-names>R.</given-names></name></person-group> (<year>2013</year>). <article-title>Tweeting across hashtags: overlapping users and the importance of language, topics, and politics,</article-title> in <source>Proceedings of the 24th ACM Conference on Hypertext and Social Media, HT&#x00027;13</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>164</fpage>&#x02013;<lpage>168</lpage>.</citation></ref>
<ref id="B3">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Blondel</surname> <given-names>V. D.</given-names></name> <name><surname>Guillaume</surname> <given-names>J.-L.</given-names></name> <name><surname>Lambiotte</surname> <given-names>R.</given-names></name> <name><surname>Lefebvre</surname> <given-names>E.</given-names></name></person-group> (<year>2008</year>). <article-title>Fast unfolding of communities in large networks</article-title>. <source>J. Stat. Mech.</source> <volume>2008</volume>:<fpage>P10008</fpage>. <pub-id pub-id-type="doi">10.1088/1742-5468/2008/10/P10008</pub-id></citation></ref>
<ref id="B4">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bonchi</surname> <given-names>F.</given-names></name></person-group> (<year>2011</year>). <article-title>Influence propagation in social networks: a data mining perspective</article-title>. <source>IEEE Intell. Inform. Bull.</source> <volume>12</volume>, <fpage>8</fpage>&#x02013;<lpage>16</lpage>. <pub-id pub-id-type="doi">10.1109/WI-IAT.2011.292</pub-id></citation></ref>
<ref id="B5">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Borondo</surname> <given-names>J.</given-names></name> <name><surname>Morales</surname> <given-names>A.</given-names></name> <name><surname>Benito</surname> <given-names>R.</given-names></name> <name><surname>Losada</surname> <given-names>J.</given-names></name></person-group> (<year>2015</year>). <article-title>Multiple leaders on a multilayer social media</article-title>. <source>Chaos Solit. Fract.</source> <volume>72</volume>, <fpage>90</fpage>&#x02013;<lpage>98</lpage>. <pub-id pub-id-type="doi">10.1016/j.chaos.2014.12.023</pub-id></citation></ref>
<ref id="B6">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>W.</given-names></name> <name><surname>Lakshmanan</surname> <given-names>L. V.</given-names></name> <name><surname>Castillo</surname> <given-names>C.</given-names></name></person-group> (<year>2013</year>). <article-title>Information and influence propagation in social networks</article-title>. <source>Synt. Lect. Data Manag.</source> <volume>5</volume>, <fpage>1</fpage>&#x02013;<lpage>177</lpage>. <pub-id pub-id-type="doi">10.2200/S00527ED1V01Y201308DTM037</pub-id></citation></ref>
<ref id="B7">
<citation citation-type="web"><person-group person-group-type="author"><collab>Department of Defense</collab></person-group> (<year>2013</year>). <source>JP 1, Doctrine for the Armed Forces of the United States.</source> Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp1_ch1.pdf:174">https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/jp1_ch1.pdf:174</ext-link></citation></ref>
<ref id="B8">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Gruzd</surname> <given-names>A.</given-names></name></person-group> (<year>2016</year>). <source>Netlytic: Software for Automated Text and Social Network Analysis. Computer Software.</source> Available online at: <ext-link ext-link-type="uri" xlink:href="http://Netlytic.org">http://Netlytic.org</ext-link> (accessed May 25, 2017).</citation></ref>
<ref id="B9">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Gupta</surname> <given-names>Y.</given-names></name> <name><surname>Saxena</surname> <given-names>A.</given-names></name> <name><surname>Das</surname> <given-names>D.</given-names></name> <name><surname>Iyengar</surname> <given-names>S.</given-names></name></person-group> (<year>2016</year>). <article-title>Modeling memetics using edge diversity,</article-title> in <source>Complex Networks VII</source> eds <person-group person-group-type="editor"><name><surname>Cherifi</surname> <given-names>H.</given-names></name> <name><surname>Gon&#x000E7;alves</surname> <given-names>B.</given-names></name> <name><surname>Menezes</surname> <given-names>R.</given-names></name> <name><surname>Sinatra</surname> <given-names>R.</given-names></name></person-group> (<publisher-name>Springer</publisher-name>), <fpage>187</fpage>&#x02013;<lpage>198</lpage>.</citation></ref>
<ref id="B10">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Harrison</surname> <given-names>J.</given-names></name></person-group> (<year>2016</year>). <source>German-Iranian teen behind Munich shootings. BBC.</source> Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.bbc.com/news/live/world-europe-36870986">http://www.bbc.com/news/live/world-europe-36870986</ext-link></citation></ref>
<ref id="B11">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Hong</surname> <given-names>L.</given-names></name> <name><surname>Dan</surname> <given-names>O.</given-names></name> <name><surname>Davison</surname> <given-names>B. D.</given-names></name></person-group> (<year>2011</year>). <article-title>Predicting popular messages in twitter,</article-title> in <source>Proceedings of the 20th International Conference Companion on World Wide Web</source> (<publisher-loc>Hyderabad</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>57</fpage>&#x02013;<lpage>58</lpage>.</citation></ref>
<ref id="B12">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jin</surname> <given-names>F.</given-names></name> <name><surname>Wang</surname> <given-names>W.</given-names></name> <name><surname>Zhao</surname> <given-names>L.</given-names></name> <name><surname>Dougherty</surname> <given-names>E. R.</given-names></name> <name><surname>Cao</surname> <given-names>Y.</given-names></name> <name><surname>Lu</surname> <given-names>C.-T.</given-names></name> <etal/></person-group>. (<year>2014</year>). <article-title>Misinformation propagation in the age of twitter</article-title>. <source>IEEE Comput.</source> <volume>47</volume>, <fpage>90</fpage>&#x02013;<lpage>94</lpage>. <pub-id pub-id-type="doi">10.1109/MC.2014.361</pub-id></citation></ref>
<ref id="B13">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Kempe</surname> <given-names>D.</given-names></name> <name><surname>Kleinberg</surname> <given-names>J.</given-names></name> <name><surname>Tardos</surname> <given-names>&#x000C9;.</given-names></name></person-group> (<year>2003</year>). <article-title>Maximizing the spread of influence through a social network,</article-title> in <source>Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</source> (<publisher-loc>Washington, DC</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>137</fpage>&#x02013;<lpage>146</lpage>.</citation></ref>
<ref id="B14">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Leskovec</surname> <given-names>J.</given-names></name> <name><surname>Krause</surname> <given-names>A.</given-names></name> <name><surname>Guestrin</surname> <given-names>C.</given-names></name> <name><surname>Faloutsos</surname> <given-names>C.</given-names></name> <name><surname>VanBriesen</surname> <given-names>J.</given-names></name> <name><surname>Glance</surname> <given-names>N.</given-names></name></person-group> (<year>2007</year>). <article-title>Cost-effective outbreak detection in networks,</article-title> in <source>Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</source> (<publisher-loc>San Jose, CA</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>420</fpage>&#x02013;<lpage>429</lpage>.</citation></ref>
<ref id="B15">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>C.</given-names></name> <name><surname>Luo</surname> <given-names>J.</given-names></name> <name><surname>Huang</surname> <given-names>J. Z.</given-names></name> <name><surname>Fan</surname> <given-names>J.</given-names></name></person-group> (<year>2012</year>). <article-title>Multi-layer network for influence propagation over microblog,</article-title> in <source>Pacific-Asia Workshop on Intelligence and Security Informatics</source> (<publisher-loc>Springer</publisher-loc>), <fpage>60</fpage>&#x02013;<lpage>72</lpage>.</citation></ref>
<ref id="B16">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Lin</surname> <given-names>Y.-R.</given-names></name> <name><surname>Chi</surname> <given-names>Y.</given-names></name> <name><surname>Zhu</surname> <given-names>S.</given-names></name> <name><surname>Sundaram</surname> <given-names>H.</given-names></name> <name><surname>Tseng</surname> <given-names>B. L.</given-names></name></person-group> (<year>2008</year>). <article-title>Facetnet: a framework for analyzing communities and their evolutions in dynamic networks,</article-title> in <source>Proceedings of the 17th International Conference on World Wide Web</source> (<publisher-loc>Beijing</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>685</fpage>&#x02013;<lpage>694</lpage>.</citation></ref>
<ref id="B17">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Mendoza</surname> <given-names>M.</given-names></name> <name><surname>Poblete</surname> <given-names>B.</given-names></name> <name><surname>Castillo</surname> <given-names>C.</given-names></name></person-group> (<year>2010</year>). <article-title>Twitter under crisis: can we trust what we rt?,</article-title> in <source>Proceedings of the First Workshop on Social Media Analytics</source>, (<publisher-loc>Washington, DC</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>71</fpage>&#x02013;<lpage>79</lpage>.</citation></ref>
<ref id="B18">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Nadamoto</surname> <given-names>A.</given-names></name> <name><surname>Miyabe</surname> <given-names>M.</given-names></name> <name><surname>Aramaki</surname> <given-names>E.</given-names></name></person-group> (<year>2013</year>). <article-title>Analysis of microblog rumors and correction texts for disaster situations,</article-title> in <source>Proceedings of International Conference on Information Integration and Web-based Applications &#x00026; Services</source> (<publisher-loc>Vienna</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>44</fpage>.</citation></ref>
<ref id="B19">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Newman</surname> <given-names>M. E.</given-names></name></person-group> (<year>2006</year>). <article-title>Modularity and community structure in networks</article-title>. <source>Proc. Natl. Acad. Sci. U.S.A.</source> <volume>103</volume>, <fpage>8577</fpage>&#x02013;<lpage>8582</lpage>. <pub-id pub-id-type="doi">10.1073/pnas.0601602103</pub-id><pub-id pub-id-type="pmid">16723398</pub-id></citation></ref>
<ref id="B20">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Riquelme</surname> <given-names>F.</given-names></name> <name><surname>Gonz&#x000E1;lez-Cantergiani</surname> <given-names>P.</given-names></name></person-group> (<year>2016</year>). <article-title>Measuring user influence on twitter: a survey</article-title>. <source>Inform. Process. Manag.</source> <volume>52</volume>, <fpage>949</fpage>&#x02013;<lpage>975</lpage>. <pub-id pub-id-type="doi">10.1016/j.ipm.2016.04.003</pub-id></citation></ref>
<ref id="B21">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Romero</surname> <given-names>D. M.</given-names></name> <name><surname>Meeder</surname> <given-names>B.</given-names></name> <name><surname>Kleinberg</surname> <given-names>J.</given-names></name></person-group> (<year>2011</year>). <article-title>Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter,</article-title> in <source>Proceedings of the 20th International Conference on World Wide Web, WWW &#x00027;11</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>695</fpage>&#x02013;<lpage>704</lpage>.</citation></ref>
<ref id="B22">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sadikov</surname> <given-names>E.</given-names></name> <name><surname>Martinez</surname> <given-names>M. M. M.</given-names></name></person-group> (<year>2009</year>). <source>Information Propagation on Twitter.</source> CS322 Project Report.</citation></ref>
<ref id="B23">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Saxena</surname> <given-names>A.</given-names></name> <name><surname>Iyengar</surname> <given-names>S.</given-names></name> <name><surname>Gupta</surname> <given-names>Y.</given-names></name></person-group> (<year>2015</year>). <article-title>Understanding spreading patterns on social networks based on network topology,</article-title> in <source>Advances in Social Networks Analysis and Mining (ASONAM), 2015 IEEE/ACM International Conference on</source> (<publisher-loc>Paris</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>1616</fpage>&#x02013;<lpage>1617</lpage>.</citation></ref>
<ref id="B24">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Seidman</surname> <given-names>S. B.</given-names></name></person-group> (<year>1983</year>). <article-title>Network structure and minimum degree</article-title>. <source>Soc. Netw.</source> <volume>5</volume>, <fpage>269</fpage>&#x02013;<lpage>287</lpage>. <pub-id pub-id-type="doi">10.1016/0378-8733(83)90028-X</pub-id></citation></ref>
<ref id="B25">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Smith</surname> <given-names>M. A.</given-names></name> <name><surname>Rainie</surname> <given-names>L.</given-names></name> <name><surname>Shneiderman</surname> <given-names>B.</given-names></name> <name><surname>Himelboim</surname> <given-names>I.</given-names></name></person-group> (<year>2014</year>). <article-title>Mapping twitter topic networks: from polarized crowds to community clusters</article-title>. <source>Pew Res. Center</source> <volume>20</volume>, <fpage>1</fpage>&#x02013;<lpage>56</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://scholar.googleusercontent.com/scholar?q=cache:eryksMy4YjgJ:scholar.google.com/&#x00026;hl=en&#x00026;as_sdt=0,5">https://scholar.googleusercontent.com/scholar?q=cache:eryksMy4YjgJ:scholar.google.com/&#x00026;hl=en&#x00026;as_sdt=0,5</ext-link></citation></ref>
<ref id="B26">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Spiro</surname> <given-names>E.</given-names></name> <name><surname>Irvine</surname> <given-names>C.</given-names></name> <name><surname>DuBois</surname> <given-names>C.</given-names></name> <name><surname>Butts</surname> <given-names>C.</given-names></name></person-group> (<year>2012</year>). <article-title>Waiting for a retweet: modeling waiting times in information propagation,</article-title> in <source>2012 NIPS Workshop of Social Networks and Social Media Conference</source>, <volume>Vol. 12</volume>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://snap.stanford.edu/social2012/papers/spiro-dubois-butts.pdf">http://snap.stanford.edu/social2012/papers/spiro-dubois-butts.pdf</ext-link></citation></ref>
<ref id="B27">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Tsur</surname> <given-names>O.</given-names></name> <name><surname>Rappoport</surname> <given-names>A.</given-names></name></person-group> (<year>2012</year>). <article-title>What&#x00027;s in a hashtag? content based prediction of the spread of ideas in microblogging communities,</article-title> in <source>Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, WSDM &#x00027;12</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>643</fpage>&#x02013;<lpage>652</lpage>.</citation></ref>
<ref id="B28">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Vosoughi</surname> <given-names>S.</given-names></name> <name><surname>Roy</surname> <given-names>D.</given-names></name> <name><surname>Aral</surname> <given-names>S.</given-names></name></person-group> (<year>2018</year>). <article-title>The spread of true and false news online</article-title>. <source>Science</source> <volume>359</volume>, <fpage>1146</fpage>&#x02013;<lpage>1151</lpage>. <pub-id pub-id-type="doi">10.1126/science.aap9559</pub-id><pub-id pub-id-type="pmid">29590045</pub-id></citation></ref>
<ref id="B29">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>Y.</given-names></name> <name><surname>Wu</surname> <given-names>B.</given-names></name> <name><surname>Du</surname> <given-names>N.</given-names></name></person-group> (<year>2008</year>). <source>Community Evolution of Social Network: Feature, Algorithm and Model.</source> <volume>arXiv</volume>:<fpage>0804.4356</fpage>.</citation></ref>
<ref id="B30">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Zeitung</surname> <given-names>S.</given-names></name></person-group> (<year>2016</year>). <source>Timeline der panik.</source> Available online at: <ext-link ext-link-type="uri" xlink:href="http://gfx.sueddeutsche.de/apps/57eba578910a46f716ca829d/www/">http://gfx.sueddeutsche.de/apps/57eba578910a46f716ca829d/www/</ext-link></citation></ref>
<ref id="B31">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhuang</surname> <given-names>Y.</given-names></name> <name><surname>Ya&#x0011F;an</surname> <given-names>O.</given-names></name></person-group> (<year>2016</year>). <article-title>Information propagation in clustered multilayer networks</article-title>. <source>IEEE Trans. Netw. Sci. Eng.</source> <volume>3</volume>, <fpage>211</fpage>&#x02013;<lpage>224</lpage>. <pub-id pub-id-type="doi">10.1109/TNSE.2016.2600059</pub-id></citation></ref>
</ref-list>
<fn-group>
<fn id="fn0001"><p><sup>1</sup>The collected dataset will be posted online for public use once the research work is published.</p></fn>
</fn-group>
</back>
</article>