DCS 2350/CSCI 2350:


Social and Economic Networks


Fall 2024


What is this course about?


Networks: A modern way of looking at, reasoning about, and making sense of the world.

Example: What does a Tunisian fruit seller's self-immolation have anything to do with the Saudi-Iran proxy war in Yemen?

Figure 1: A map of the Arab Spring.

Example: Why did Covid impact the northeastern part of the U.S. or countries like Italy so much?

Figure 2: A plot of the number of deaths vs. population density in the U.S. (the Economist).

What do these examples have in common? Additionally, how are they even remotely related to things like the U.S. residency matching or kidney exchange programs?

This course examines the social and economic aspects of today's connected world from a multitude of perspectives; namely, network science, computer science, sociology, and economics. The fundamental questions to be addressed are: What are the properties of real-world networks? What are the effects of networks on our behavioral choices like quitting smoking or eating healthy? How do cascades in networks lead to outcomes like videos going viral? How does Google search the Internet and make money doing so? Debates issues around centrality in networks. Uses game theory to study strategic interactions in networks and markets.

Prerequisites:

What is the central theme?

The focus of this course is networks. Graph theory as a mathematical tool for studying networks has been around for over two centuries. However, modern computational power has enabled the study of the types of networks that not only change dynamically but also scale to a previously unimaginable size. Examples of such networks are today's social and economic networks. This course connects a series of questions within the central theme of social and economic networks. (The specific questions are listed in the course schedule.)


Figure 3: A large-scale network of political blogs. Colors denote political leaning (Adamic and Glance, LinkKDD 2005).

How will these questions be addressed?

A variety of inter-disciplinary tools and techniques will be used to address these questions. For example, we will use a software called Gephi to visualize networks and study their properties. We will study the classical as well as the modern theories of network formation, and we will experiment with these theories in the NetLogo software environment. We will use tools from mathematical sociology as well as computer science to study diffusion in networks. We will get an introduction to computational game theory in order to address various interesting questions on the strategic aspects of networks.

Most importantly, elements of computational thinking will be prevalent throughout this course to answer many of the "how" questions. The reason is that in today's socio-economic context, nearly all real-world networks are very complex with many interdependent components. To answer any conceivable question within such complex settings, we need to think critically about devising a solution. We need to consider computational time and space. We need to combine a mathematical approach with an engineering approach. Computational thinking enables us to do the above in order to devise practical solutions to problems. Programming is just one part of computational thinking; it's not all.

Example: How do we study networks of influence among the U.S. senators?

Figure 4: A nice example of how we address questions on networks is a research project I did with my students Phillips '19 and Ostertag-Hill '20. The figure above gives a bird's eye view of the influence network in the U.S. senate (click on the image to enlarge it). Red nodes are Republicans, blue Democrats, green Independents. Darker nodes have higher threshold and thicker edges have more influence weights. The strongest 40% incoming and outgoing edges for each node are shown. The project used machine learning, social network analysis, computational game theory, and even models from political science.

Why are networks the way they are?

Several critical questions will be addressed in this course. First, almost all real-world networks exhibit some common properties, such as a "giant component" and a certain type of "degree distribution." Why do the entities in the network connect in this fashion? Second, what are the effects of network connectivity on various social and behavioral phenomena, such as smoking, obesity, or even videos going viral? Finally, what roles do strategic interactions play in shaping the networks that we see today?

Instructors

Professor: Mohammad T. Irfan
Email: mirfan@bowdoin.edu
Office Hours:
Wed 10am-1pm
Fri 10am-12pm
Room: Mills 209
LAs: Will Gaston: Tue 7-9pm
Yassine Khayati: Thu 7-9pm
Room: Mills 105

Time & Place

Lectures: TR 11:40-1:05
Midterm: In-class (10/17)
No final exam

Course Outline

Learning Objectives:

Even after 5 years:

  • Know:
    • How networks are modeled, how they look like in the real world , and how they evolve over time
    • Basics of social network analysis: Small-world phenomenon, clustering, degree distribution, centrality in networks
    • Algorithms like PageRank and web-search auctions running on the Internet
  • Be able to do:
    • Implement network models using computer programs
    • Study the effects of networks, with examples ranging from contagion to smoking and obesity to online videos going viral: How would the effect vary if the network structure were different?
  • Find value in:
    • Networks as an essential DCS tool to better understand today's intricately connected world

What type of course is it?

  • This is a lecture-based course.
  • This is not a projects course. Nor is it a discussion course, even though it will be very much conversational in style.
  • Readings are due after the class, unless otherwise announced.
  • There are some additional notes and video clips that will not be covered in class. However, you are required to utilize these resources to reinforce the key concepts.

Textbooks:


[EK] Networks, Crowds, and Markets,
by Easley and Kleinberg
(Required)


[Glad] The Tipping Point,
by Gladwell
(Required)


[Jack] Social and Economic Networks,
by Matthew Jackson (Optional)


[Wat] Six Degrees: The Science of a Connected Age,
by Watts (Optional)

[*] Individual chapters from other books (to be provided as hand-outs)

Software:

The following free software will be required. Please install them on your computer.
[1] Gephi

[2] NetLogo

[3] Visual Studio Code with Python 3

Evaluation:

  • 15% Points: One in-class midterm exam

  • 15% Points: Final paper

  • 45% Points: Summative Assessment: Problem solving and programming assignments

  • 25% Points: Formative assessment and class participation: This includes formative assignments, attendance, and active class participation. Taking handwritten class notes is highly recommended for its many benefits. Students will report the status of their note taking.

  • Points to letter grade conversion: 94% A, 90% A-, 85% B+, 80% B, 75% B-, 70% C+, 65% C, 60% C-, 55% D, below 55% F

Late Policy:

  • Late submissions will be accepted up until 24 hours after the deadline with a penalty. Each hour after the deadline would cost 4% of the points for that assignment. Extensions will be given if there is any health or other emergency situation.

Outline of Topics:

Week Question Topics Readings Additional Notes/Links
Week 1
(9/3, 9/5)
Course introduction: Why study networks? What's the foundation of the study of networks? Basics of graph theory [EK] Ch 2 Slides (Intro)
Week 2
(9/10, 9/12)
What does a real-world network look like? What are some common properties?
1. Macro-level properties of a real-world social network:
giant component, small-word effect, clustering, degree distribution
[EK] Ch 2
[Jack] Ch 2
1. Slides (Properties)
2. 3.5 degrees of separation in Facebook
3. Power law debate
4. Barabasi's response
5. Petter Holme's blog post on it
Week 3
(9/17, 9/19)
What does a real-world network look like? (continued)
2. Micro-level properties: centrality
3. Experiments with Gephi
Assignments 1 and 2 (experiments and theory) out
[Jack] Ch 2
Slides (continued)
Week 4
(9/24, 9/26)
1. What's the effect of different types of edges?
2. How can we use it to detect communities in a network?
1. The strength of weak ties
2. Community detection algorithms
[EK] Ch 3
Granovetter's paper
1. Slides (The strength of weak ties)
2. Note on Girvan-Newman algorithm
Week 5
(10/1, 10/3)
Are the nodes connected to each other kind of the same?
Homophily [EK] Ch 4 Slides: Homophily
Fall Break        
Week 6
(10/10)
What can we say about a network having friends as well as enemies? Structural balance: positive and negative relationships
[EK] Ch 5
Slides: Structural balance
Week 7
(10/15, 10/17)
Modeling Networks: How can we model network formation in the real world? And why should we model?

Network Formation:
Random-graph models and their properties
Midterm exam on 10/17
[Jack] Ch 4, 5
[Wat] Ch 3, 4
1. Slides (Models of network formation)
2. Prof. Irfan's NetLogo tool to study Erdos-Renyi random graphs
Week 8
(10/22, 10/24)
Modeling Networks (continued) 1. Watts-Strogatz and preferential-attachment models
2. NetworkX: network programming in Python
Assignment 3 and 4 (modeling networks: theory and experiments) out
NetworkX tutorial by Prof. Irfan
Week 9
(10/29, 10/31)
What is the effect of a network as a whole on people's behavior? For example, how does a video get viral on a social network? Similarly, how did the Facebook post "Hi World, we want a puppy!" get over a million likes within a few hours?
Cascading behavior/diffusion in networks
[EK] Ch 19
1. Slides (diffusion)
2. One person starts a dance party
3. Kleinberg's talk
4. Interview of Duncan Watts by Fast Company
Week 10
(11/5, 11/7)
How does a disease propagate over a network? What is the difference between the propagation of behavior and the propagation of diseases? 1. Diffusion (continued)
2. Epidemics
Assignment 5 (programming: epidemics and cascading behavior) out
1. Ch 21 of EK
2. Optional: Ch 10 of Barabasi's Network Science
Slides (epidemics)
Week 11
(11/12, 11/14)
We've talked about structures of networks and the connection between network structures and various social phenomena. Can we say something about economic networks where the interactions are primarily strategic? How can we model such strategic interactions? Game theory [EK] Ch 6
1. Slides (Game theory)
2. A Beautiful Mind: How it missed NE
3. Russia-Ukraine war:
4. Trump & game theory:
Week 12
(11/19, 11/21)
How can we model one very common type of strategic interaction that we see everyday--auctions?
Auction
[EK] Ch 9
Slides (Auctions)
Thanksgiving Break        
Week 13
(12/3, 12/5)
How does Google and other search engines use auction to make money?
Sponsored search markets
Assignment 6 (game theory, auction, and sponsored search markets) out
[EK] Ch 15
1. Slides (Sponsored search markets)
2. Prof. Irfan's video lecture
3. Greg Taylor (Oxford) on the economics of search engines
Week 14
(12/10)
Matching: Another example of strategic interactions that received many plaudits due to its humanitarian cause is the kidney exchange program. What is the networked economy foundation of such a program?
Stable marriage
FA or Assignment on VCG, GSP, matching (depending on course progression)
Stable marriage handout
Slides (Matching)
Week 14
(12/12)
Alternative topic (or time perimitting):
Let's talk about one special network that we use everyday--the Internet. What does it look like? How does Google search it?
WWW: structure
Link analysis and web search--PageRank
[EK] Ch 13, 14
1. Slides (Information Networks)
2. Vannevar Bush's Memex
3. Google's Matt Cutts on PageRank


Collaboration Policy:

Assignments will normally be done individually. Unless clearly marked as a group assignment, each assignment is an individual assignment by default. Students are expected to follow Bowdoin's Academic Honor Code.

Following is the collaboration policy for individual assignments. You are encouraged to discuss ideas and techniques broadly with your classmates, but not specifics of assigned problems. Discussions should be limited to questions that can be asked and answered without using any written medium (e.g., pencil and paper or email). This means that at no time should a student read anything written by another student. Violation of this policy is grounds for me to initiate an action that would be filed with the Dean's office and would come before the Conduct Review Board. If you have any questions about this policy, PLEASE do not hesitate to contact me. This will be a zero-tolerance policy.

It is permissible to use software and materials available from other sources (understanding that you get no credit for using the work of others on those parts of your assignment) as long as: 1) You acknowledge explicitly which aspects of your assignment were taken from other sources and what those sources are. 2) The materials are freely and legally available. 3) The material was not created by a student at Bowdoin as part of this course this year or in prior years. To be absolutely clear, if you turn in someone else's (human or AI) work you will not receive credit for it - on the other hand, if you acknowledge it, at least you will not go to the Conduct Review Board.

All write-ups, code, reviews, documentation, and other written material must be original and may not be derived from other sources, including AI tools.

If in the future you provide your work to other students, this will also constitute a violation of Bowdoin's honor code.

If Winter comes, can Spring be far behind? -- Percy Bysshe Shelley