Midge Cozzens Rutgers University Winona State University October 13, 2010.

31
Midge Cozzens Rutgers University Winona State University October 13, 2010

Transcript of Midge Cozzens Rutgers University Winona State University October 13, 2010.

Page 1: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Midge CozzensRutgers University

Winona State UniversityOctober 13, 2010

Page 2: Midge Cozzens Rutgers University Winona State University October 13, 2010.

What is Viral Marketing?Start off with a small group of individuals

and spread by “word-of-mouth”, email, etc.Initial individual tells two of his friends and

they tell…Not necessarily selling a product, but

attempts to change behavior or condition, to activate!

Spread of viruses, disruptions etc. through an ecosystem.

Page 3: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Small-Scale Behavioral Viral SpreadingSmall-Scale Behavioral Viral Spreading

• Two people start singing

• Next their friends join in

• By the end of the song, the whole bar is singing Mariah Carey’s Fantasy…true story

Page 4: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Graph Theory - Viral spread

Page 5: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Game TheoryGame Theory

Page 6: Midge Cozzens Rutgers University Winona State University October 13, 2010.
Page 7: Midge Cozzens Rutgers University Winona State University October 13, 2010.

ConfessDon’t

Confess

Confess (10,10) (0,20)

Don’t Confess (20,0) (1,1)

Page 8: Midge Cozzens Rutgers University Winona State University October 13, 2010.
Page 9: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Varying ApplicationsStrategies of political parties in getting

voters to vote for their candidate. REU student Jim Manning showed that the optimal strategy for the Republicans in 2008 was to go after moderates first then bring in the conservatives. Had they done that they would have taken 60% of the vote and beat Obama. Instead they brought in Sarah Palin to get the conservative base in place.

Page 10: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Another ApplicationChange the behavior of college students

concerning unprotected sex. REU student Jordan Mitchell wrote a paper to be published in a sociology journal showing strategies to convince students to use protection. She used real data and measured parameters governing use such as attractiveness, drinking, multiplicity of partners, etc.

Page 11: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Another ApplicationVolvo car dealers have decided to

concentrate on online marketing to sell cars across the country. Ajay Matapalli, REU student, developed an optimal progressive strategy for marketing where the dealers gained significantly and the incentives were far more lucrative then would have been just walking in off the street.

Page 12: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Incentive ModelIndividual gain is represented by v(xh) where xh

represents an individual (or in terms of a graph, a specific node).

The subsequent factor is the gain (loss) that the individual receives from his or her peers owning the product as well. The inspiration for separating the individual and collective gain came from H. Peyton Young’s work. A simple example would be if my neighbor had sneakers, then I would gain the enjoyment of being able to run with him if I purchased sneakers.

Page 13: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Incentive Modelu(xh , xj) is a binary function, where xj is any

node in the graph G not equal to xh, such that if there exists an edge between xh and xj , and xj owns the product, then the function equals 1; if there doesn’t exist an edge or xj doesn’t own the product, then let the function equal 0.

r = constant that represents the benefit of a node, which you are connected to having the product.

Page 14: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Incentive ModelEdge weights (the strength of the connection

between two people); contained in the set (0, 1]. w(xh , xj) be a function, where xj is any node in

the graph G not equal to xh, such that if there exists an edge between xh and xj , then the output value is the weight of the edge; if there doesn’t exist an edge, then the output value is 0.

This accounts for the fact that all connections which you have to other people are not equal; thus the edges with aren’t as strong don’t influence the buyer node as much.

Page 15: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Total Effects in the ModelThe total effects of viral marketing is the sum all the benefits

from each peer connection

∑ u(xh , xj) w(xh , xj)r

The graph theory comes into play here because when forming this function we are concerned with the converted node who is reaching out to the new potential customers nodes (its neighbors).

 

 

 

 

Page 16: Midge Cozzens Rutgers University Winona State University October 13, 2010.
Page 17: Midge Cozzens Rutgers University Winona State University October 13, 2010.

q = constant that represents a value that will normalize the weight of the edge to use in our final equation.

y(xh , xo) = the weight of the edge coming from the previously converted node if there is one; if there is no previously converted node, then this function equals

The final incentive equation is:I(xh) = Incentive for Individual xh

I(xh) = z(xh) – v(xh) – y(xh , xo)q - [ ∑ u(xh , xj) w(xh , xj)r ]

The incentive must at least be equal to the gap between the cost of the product to the individual and the gain and ease of the buying it.

Page 18: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Overall Gain Model

G(xh) Overall Gain to Individual xh

G(xh) = v(xh) + [ ∑ u(xh , xj) w(xh , xj)r ] + y(xh , xo)q

Page 19: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Profit ModelB = cost of marketing I = incentiveM = cost of manufacture or equivalentT = retail pricek = number expected to purchase productC(xh) Cost to Company for xh

C(xh) = I(xh) + B/k + M/k

P(xh) Profit for Company from xh

P(xh) = T – C(xh)

Page 20: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Payoff Matrix

Page 21: Midge Cozzens Rutgers University Winona State University October 13, 2010.

EquilibriumSuppose Neo buys the product, and The Matrix markets it

to him; we then arrive at the overall gain plus the incentive for Neo and the overall profit for The Matrix. Suppose Neo buys the product, but the Matrix didn’t market it to him; we then arrive at the overall gain without the incentive for Neo, and the Matrix saves on marketing, not manufacturing, costs. Suppose Neo rejects the product, and the Matrix had marketed it to him; we then have Neo saving on the cost of the product, but the Matrix losing on marketing and manufacturing costs. Suppose Neo rejects the product, and the Matrix did market it to him; we then have Neo saving on the cost of the product, but the Matrix losing on manufacturing costs. We can now take these values and find a (Mixed Strategy) Nash Equilibrium.

Page 22: Midge Cozzens Rutgers University Winona State University October 13, 2010.

How Do We Get Data for tableConsumer ResearchPast history dataCDC data for spread of disease,Public and World Health data on the

effectiveness of innoculations

Page 23: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Graph Theory QuestionsFind the k most influential nodes to

market to:In general, identifying the k most

influential nodes is NP-hard.A natural greedy algorithm exists which

is a 1−1/e−ε approximation for selecting a target set of size k, using probabilistically determined simulations.

Page 24: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Tuberculosis Network SW Oklahoma 2002

Page 25: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Spread of Viruses and InnoculationSocial Networks relative to virus spreading

most often look like stars linked together as in the next slide which shows a portion of the first to set to contract TB and their contacts.

Current procedures focus on inoculating the vulnerable -- often the very young and the very old. Network analysis tells us that it may be smarter, and more efficient, to focus on the spreaders -- those with many contacts to many groups.

Page 26: Midge Cozzens Rutgers University Winona State University October 13, 2010.
Page 27: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Possible Research DirectionsFind classes of graphs where finding the k-most

influential nodes can be done in polynomial time.Consider ways of subdividing the social network

into subgraphs where the k-most influential nodes are easy to find.

What type of dominating sets in a graph should one look for?

How does the connectivity of a social network influence spread?

What other connectivity parameters make sense?

Page 28: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Research DirectionsWhat other connectivity parameters make sense?Once the most influential node(s) are targeted,

how do you reach other (or all) nodes in the graph?• Find a Hamiltonian path – hard!• Find an Eulerian path – easy if connected and

vertices have only 2 odd degree vertices;• Partition the graph into connected components with

one target node in each component and add or subtract edges so Eulerian path can be found in each.

Page 29: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Find an euler path

Page 30: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Remove 1 or 2 edges

Page 31: Midge Cozzens Rutgers University Winona State University October 13, 2010.

Fleury’s Algorithm to get path