Article | Open | Published:

Strategic tradeoffs in competitor dynamics on adaptive networks

Scientific Reportsvolume 7, Article number: 7576 (2017) | Download Citation

Abstract

Recent empirical work highlights the heterogeneity of social competitions such as political campaigns: proponents of some ideologies seek debate and conversation, others create echo chambers. While symmetric and static network structure is typically used as a substrate to study such competitor dynamics, network structure can instead be interpreted as a signature of the competitor strategies, yielding competition dynamics on adaptive networks. Here we demonstrate that tradeoffs between aggressiveness and defensiveness (i.e., targeting adversaries vs. targeting like-minded individuals) creates paradoxical behaviour such as non-transitive dynamics. And while there is an optimal strategy in a two competitor system, three competitor systems have no such solution; the introduction of extreme strategies can easily affect the outcome of a competition, even if the extreme strategies have no chance of winning. Not only are these results reminiscent of classic paradoxical results from evolutionary game theory, but the structure of social networks created by our model can be mapped to particular forms of payoff matrices. Consequently, social structure can act as a measurable metric for social games which in turn allows us to provide a game theoretical perspective on online political debates.

Introduction

Fixed resources drive competition and non-linear dynamics in socio-biological systems1,2,3,4,5,6,7,8. As entities compete over resources, they often face strategic decisions: pursuing one resource means foregoing another. The importance of such strategic decisions is exacerbated when resources are heterogeneous because some are ultimately more valuable than others. Many real world scenarios feature heterogeneous resources where strategic decisions determine the winner of the competition. For example, consider political campaigns, a canonical example of social competition where voters identify with one of many candidates and either try to change or reinforce the opinions of other voters. A typical strategic decision is how much time to spend debating with adversaries so as to change their opinions versus agreeing with like-minded voters. Recent studies of online conversations provide unique insights into this process9,10,11,12. Barberá et al. studied 150 million tweets on Twitter to determine how often online political discussions were debates as opposed to echo chambers where like-minded people voice a shared opinion12. Their results, reproduced on Fig. 1, demonstrate how users with different ideologies behave in characteristic manners. More specifically, they found that users identified as liberals are more likely to initiate cross-ideological conversations on political issues than users identified as conservatives. Similar differences in strategy between people of different ideologies have also been observed in other online discussion forums9 including user comments on online newspapers11. Motivated by these examples, we consider a general model of competition between different strategies.

Figure 1
Figure 1

Debates and echo chambers on Twitter. Shown is the number of retweets according to the inferred ideologies of the author and of the retweeter. The ideology of authors is estimated through their connections and ranges from strongly liberal (−3) to strongly conservative (+3). Political subjects such as the federal budget and marriage equality in the USA (left and middle panels respectively) lead to a much stronger homophily and the creation of echo chambers, while non-political subjects such as the 2014 Winter Olympics (right panel) are not polarized. Reproduced from Ref. 12.

Classical models of competitor dynamics on networks, such as the voter model (VM)13 and the analogous Moran process model (MP)14, do not distinguish between resources in a way that permits consideration of strategic tradeoffs. Indeed, each competitor in an MP is defined by a single parameter that expresses their ability to indiscriminately obtain available resources. Similarly, a VM typically considers a fixed symmetric social structure (i.e. with undirected interactions) and the influence of a voter over its neighbours does not depend on their current state. The lack of state-dependent interactions is particularly limiting because resources will likely change hands, or states. As this happens, competitors may want to modify interactions to reclaim or protect resources. In the context of the earlier political example, when nodes change states they adopt different opinions/ideologies and thus probably change their strategies accordingly. Adaptive networks, where links (or their weights) change with the states of nodes, offer a natural way to model this plasticity. This rewiring allows strategies to determine both which nodes interact and how they interact, depending on their states.

Using the directed stochastic block model (SBM) to encode these strategies15, we extend the MP and VM dynamics to an adaptive network structure to study the effects of strategic decisions. We obtain general analytical solutions for the voter model dynamics and investigate specific cases with tradeoffs between aggressiveness and defensiveness (i.e., targeting adversaries vs. targeting like-minded individuals). We show that these tradeoffs yield interesting, and even paradoxical, behaviors such as long transient dynamics, sensitive dependence to initial conditions, and non-transitive dynamics. These results are reminiscent of classic voting paradoxes and are known results from evolutionary game theory; in fact, the SBM allows us to directly map the social structure created by our model to particular cases of payoff matrices in game theory. While the mapping between the two models is not exact, we observe several interesting results of well-mixed game theory in our network model. This means on the one hand that our model can provide a network perspective to game theory, and on the other hand that social network structure can potentially be used to infer the payoff structure of an equivalent evolutionary game. For example, we show how we can use our model to infer different dynamical regimes from empirical observations of activities on Twitter and interpret the resulting network structure as a signature of competitor strategies.

Results

We consider competitor dynamics on an adaptive network where nodes are units of resource adopting a state according to which of the g competitors currently claims them. The interactions between the nodes depend on their states and are prescribed by the g × g matrix P whose elements p ij correspond to the probability that a directed link exists from a node of state i towards a node of state j. As in the traditional voter model, at every time step a randomly chosen node adopts the state of a node at the end of a randomly chosen incoming link. In this adaptive version, once a node changes state its incoming and outgoing edges are redrawn according to P reflecting its new state. Thus, the network evolves throughout the competition as nodes change hands. Other versions of adaptive coevolution of structure and voter dynamics exist16,17,18 but, to the best of our knowledge, all involve symmetric strategies across competitors.

Here, the density matrix P is not only a description of the underlying structure at a given time, but directly reflects the different strategies of different competitors. For instance, a modular structure (i.e., larger p ij values on the diagonal or homophily) implies defensive or self-reinforcing strategies that try to prevent their nodes from switching to a different state. A fuzzy multipartite structure (i.e., larger p ij values off the diagonal or heterophily) reflects offensive strategies where individuals mostly target competitors. Similarly, a core-periphery structure19 reflects a defensive competitor facing an offensive strategy (i.e., one row showing homophily and others rows showing heterophily). Our model can therefore lead to very different network structures arising from the interplay between strategies. In fact, the network structure is entirely specified by P which in turn is a direct parametrization of the strategies of the competitors.

Without any constraints on the density matrix P, the optimal strategy for nodes belonging to competitor i would be to fully target every state, i.e. \({p}_{ij}=1\,\forall j\). However, to embody the key tradeoffs mentioned in the introduction, an obvious choice of constraints is \({p}_{ii}+{p}_{ij}=1\,\forall j\ne i\), which forces competitors to choose between offense (targeting competitor-owned nodes) and defense (targeting self-owned nodes). We analyze the resulting dynamics for two competitors trying to capture a majority of nodes and find that there exists a single optimal strategy. In contrast, the presence of a third competitor results in much richer dynamics. We discover that there are four canonical types of dynamics for three competitors that can exhibit counterintuitive, nonlinear behaviors.

The two competitor case

We begin our analysis of competitor dynamics on an adaptive network by considering a reduced form of the general framework where there are only two competitors who both face the same constraint p i1 + p i2 = 1 on their possible strategies. The matrix P thus has the structure

$${\boldsymbol{P}}=(\begin{array}{cc}{p}_{1} & 1-{p}_{1}\\ 1-{p}_{2} & {p}_{2}\end{array}),$$
(1)

where 0 ≤ p 1, p 2 ≤ 1 are the parameters that define each strategy. The value of p i determines how much competitor i influences itself, i.e., defending its own resources, while 1 − p i is the influence on the opposing competitor. Since the total influence of any competitor is constrained, there is a trade-off between group cohesion p i (i.e., defense) and the deployment of effort to gather new nodes 1 − p i (i.e., offense). The success of a competitor is measured by its frequency in the population, which we denote x i . The frequencies x i range from 0 to 1, and only one of them is needed to fully specify the state of a system with 2 competitors since the other is constrained by the conserved population: \({\sum }_{i}\,{x}_{i}=1\).

Using Eq. (1) and the conservation relation x 2 = 1 − x 1, we can describe the change in frequency of competitor 1, whose strategy is determined by p 1, by

$${\dot{x}}_{1}=\frac{{x}_{1}\mathrm{(1}-{x}_{1})\,\mathrm{(1}-{p}_{1})}{{x}_{1}\mathrm{(1}-{p}_{1})+\mathrm{(1}-{x}_{1}){p}_{2}}-\frac{{x}_{1}\mathrm{(1}-{x}_{1})\,\mathrm{(1}-{p}_{2})}{{x}_{1}{p}_{1}+\mathrm{(1}-{x}_{1})\,\mathrm{(1}-{p}_{2})}.$$
(2)

The first term corresponds to nodes belonging to competitor 1 trying to claim the remaining 1 − x 1 fraction of nodes. The probability that an offense on a given node of competitor 2 is successful is given by the ratio of edges from competitor 1 [x 1(1 − p 1)] to the total number of incoming edges on that node [offense plus defense: x 1(1 − p 1) + (1 − x 1)p 2]. The second term correspond to nodes of competitor 1 being claimed by nodes of competitor 2, and is constructed using the same logic.

The three fixed points of Eq. (2) are

$$\begin{array}{l}{x}_{1}^{\ast \mathrm{(1)}}=0,\quad {x}_{1}^{\ast \mathrm{(2)}}=1\quad {\rm{and}}\\ {x}_{1}^{\mathrm{\ast (3)}}=(1-{p}_{2})/(2-{p}_{1}-{p}_{2}).\end{array}$$
(3)

Analyzing the stability of the fixed points, we find that there are two qualitative regimes depending on the value of p 1 + p 2 (see Supplementary Methods for analysis). If p 1 + p 2 < 1, both \({x}_{1}^{\mathrm{\ast (1)}}\) and \({x}_{1}^{\mathrm{\ast (2)}}\) are unstable and \({x}_{1}^{\mathrm{\ast (3)}}\) is stable. This means that the competition will result in a mixed population where neither competitor goes extinct. The competitor who has the highest value of p will make up the majority of the population. In contrast, if p 1 + p 2 > 1, then both \({x}_{1}^{\mathrm{\ast (1)}}\) and \({x}_{1}^{\mathrm{\ast (2)}}\) are stable and \({x}_{1}^{\mathrm{\ast (3)}}\) is unstable. Thus, one competitor will always go extinct. The winner does not depend on strategy but rather the initial frequency. If x 1(0) is greater than \({x}_{1}^{\mathrm{\ast (3)}}\) then x 1 will win; if x 1(0) is less than \({x}_{1}^{\mathrm{\ast (3)}}\) then x 1 will go extinct.

Our stability analysis shows that coexistence is only possible if competitors adopt sufficiently offensive strategies, i.e. p 1 + p 2 < 1. We call such competitions “pairwise aggressive” because each competitor’s offense overwhelms the defense of their opponent, i.e. p 1 < 1 − p 2 and p 2 < 1 − p 1. In Fig. 2, an example of a pairwise aggressive competition shows that as the two strategies compete for resources they shape the network topology into a disassortative structure: nodes of one competitor preferentially target nodes of the other competitor. In contrast, a competition in which p 1 + p 2 > 1 results in an assortative network. We call such competitions “pairwise defensive” because each competitor’s defense is greater than the offense of their opponent. The ultimate result of a pairwise defensive competition is annihilation of one of the competitors (see also Fig. 2).

Figure 2
Figure 2

Examples of a two competitor contest with assortative and disassortative strategies. We illustrate topologies given two set of strategies. Node color corresponds to its current state, node size is proportional to its total degree, and links are colored according to the states of the nodes they connect. (left) A disassortative structure: nodes tend to connect to nodes of a different state, notice that most links are grey which denotes inter block links. (right) An assortative structure: nodes tend to connect to nodes of the same state. (bottom) Time evolution of the voter model on these adaptive topologies. In the disassortative structure both competitors can coexist whereas the assortative structure leads to a winner-takes-all scenario.

This result is surprising when we consider the underlying network architecture. When both strategies are defensive (high p i for all i), the assortative network has a highly modular structure which indicates poorly coupled subsystems occupied by different competitors. This would seem to promote coexistence as it is analogous to each competitor having a well-defined territory and rarely seeking to acquire outside nodes. Yet, this structure promotes extinction. This occurs due to a positive feedback mechanism: once a competitor loses a node, its opponent’s territory grows because of the adaptive structure. This node is now more strongly defended because it is part of a larger module, and thus harder to recapture. This feedback destabilizes coexistence. Similarly, we might expect the well-mixed system architecture of the low p strategy competition to allow for one competitor to rapidly capture all the nodes, but our results show the opposite.

Finally, we find that the two-competitor system has the optimal strategy p = 1/2, although the ultimate outcome may depend on the initial resources of the competitors. If both competitors start with the same resources x 1(0) = x 2(0) = 1/2, then the strategy p = 1/2 is unbeatable: it guarantees a win against all p ≠ 1/2. Note that a competitor who values survival instead of winning by majority may prefer the strategy p = 0, which guarantees a nonzero equilibrium population for all nonzero initial conditions.

Evolutionary game theory perspective

One striking aspect of the solutions shown in Eq. 3 is that their phenomenology is surprisingly reminiscent of the solutions of a 2-strategy game in an infinite and well-mixed population. Consider the classic example of the 2-player, 2-strategy prisoner’s dilemma. At every step, two individuals in an infinite population are chosen at random. Each individual must choose to either collaborate or defect. If both collaborate, they are awarded a big payoff R as a reward. If they both defect, they are awarded a small payoff P as punishment. If one defects and one collaborates, they respectively get the temptation award T and sucker punishment S. The game is thus fully parametrized by the following award (or payoff) matrix A:

$${\boldsymbol{A}}=(\begin{array}{cc}R & S\\ T & P\end{array}),$$
(4)

where A ij corresponds to the award given to a node in state i interacting with a node in state j. State i = 1 corresponds to cooperation and is awarded either R (j = 1) or S (j = 2), and state i = 2 corresponds to defection and is awarded either T (j = 1) or P (j = 2). Following the presentation in ref. 20, we denote the frequency of strategy i in the infinite population as y i . Its expected award is therefore \({f}_{i}={\sum }_{j}\,{y}_{j}{A}_{ij}\), and the expected award of any random individual is \(\alpha ={\sum }_{i}\,{y}_{i}\,{f}_{i}\). Under the assumption that the frequency of a strategy is proportional to its expected award, we can write the following mean-field dynamics:

$${\dot{y}}_{i}={y}_{i}({f}_{i}-\alpha ),$$
(5)

whose fixed points are

$$\begin{array}{l}{y}_{1}^{\mathrm{\ast (1)}}=0,\quad {y}_{1}^{\mathrm{\ast (2)}}=1\quad {\rm{and}}\\ {y}_{1}^{\mathrm{\ast (3)}}=(P-S)/(R-S-T+P).\end{array}$$
(6)

The phenomenology of the prisoner’s dilemma is thus very similar to that of our model: 2 fixed points corresponding to winner-takes-all scenarios, and a co-existence fixed point. In the general case without strategic tradeoffs (see Supplementary Methods for a complete analysis), we can set T = S = p 12 = p 21 ≠ 0 to force symmetry between the two strategies and avoid disconnected subpopulations. There is then a direct mapping between all fixed points when A = P.

This condition is not surprising since, unlike the prisoner’s dilemma, the voter model does not allow one strategy to have an advantage over the other (i.e., a node converts its neighbour with a probability independent of their types; the outcome only depends on the relative number of neighbours of each type). The other key difference in the general forms of the two models is that ours includes network effects that co-evolve with the states of the nodes. A simple example from the mapping described above is when p 12 = p 21 = 0, where there are no dynamics whatsoever in the voter model since the two populations are disconnected; it is of course not the case for the well-mixed prisoner’s dilemma even if T = S = 0.

There is a also a more subtle but fundamental distinction between the two models. In classic evolutionary game theory there are pairwise interactions between players where the payoff matrix determines who wins and thereby increases in relative frequency. The strategies adopted by players and the associated payoff matrices can only be inferred through population dynamics21. In contrast, in our model, the network structure (i.e., the directions and densities of the various edges) is shaped by and reflects the competing strategies at any point in time. As a consequence the competition and its dynamics can be inferred from a static snapshot of the network.

Despite these differences, there is striking similarity between the phenomenology observed in our model and in g-strategies game theory. This is likely due to the fact that the underlying dynamics in both models is determined by a term corresponding to the probability of interaction between two strategies and the associated reward/influence. In the following section we will consider the case of three competitors and their rich dynamical behaviours that can also be found in results of evolutionary game theory, but that emerge here for very different reasons. In fact, it will be much easier to interpret our results, and the tradeoffs from which they stem, in terms of the structure of the interaction network. In that sense, one significant advantage of our model is that the density matrix P is much less abstract than the payoff matrix A in the sense that it can be measured from relatively simple data. This network perspective thus allows us to apply our model to the previously discussed Twitter data (cf., end of the section and Fig. 8).

The three competitor case

Having analyzed the case of two competitors, we now investigate the case of three competitors each trying to collect more nodes than the others. We assume for simplicity that competitors adopt the same strategy against all of their opponents. Thus, there is no distinction between opposition, only an “us and them” distinction. The constraints remain the same in that each competitor allocates a portion p i of its strategy to reinforcing captured nodes, and 1 − p i to pursuing nodes owned by its competitors. The elements p ij of the matrix P have the form

$${\boldsymbol{P}}=(\begin{array}{ccc}{p}_{1} & 1-{p}_{1} & 1-{p}_{1}\\ 1-{p}_{2} & {p}_{2} & 1-{p}_{2}\\ 1-{p}_{3} & 1-{p}_{3} & {p}_{3}\end{array}),$$
(7)

and the dynamics can be followed by equations of the form

$${\dot{x}}_{i}={x}_{i}\,\sum _{j\in \{1,2,3\}}\,[\frac{{p}_{ij}{x}_{j}}{{\sum }_{l\in \{1,2,3\}}{p}_{lj}{x}_{l}}-\frac{{p}_{ji}{x}_{j}}{{\sum }_{l\in \{1,2,3\}}{p}_{li}{x}_{l}}],$$
(8)

for every i {1, 2, 3}, although one is superfluous as the system is constrained by x 1 + x 2 + x 3 = 1.

In the two-competitor scenario, the optimal strategy was p = 1/2. For example, if a competitor with this optimal strategy battled an opponent with p < 1/2, then the competition would finish with a mixed population where p = 1/2 held the majority. If, instead, the competitor with the optimal strategy battled two opponents each with a p < 1/2 then it would go extinct (see Fig. 3). Thus, the p = 1/2 strategy is not optimal in the three-competitor scenario.

Figure 3
Figure 3

Dynamical trajectories for competitor using strategies p 1 = 0.5, p 2 = 0.4, and p 3 = 0.3. (left) This triangle contains all possible dynamics: we show trajectories through a space where every point is defined by a unique (x 1, x 2, x 3) state. Therefore, any point within the triangle correspond to a mixed state where all competitors have non-zero frequencies, whereas the edges correspond to two-competitor dynamics. All stable fixed points are shown as black dots, and semi-stable and unstable fixed points appear as open circles (their stability can also be deduced by the linear flows shown in black arrows around them). We delineate the three regions corresponding to states where one of the three competitors are respectively winning by a relative majority. While competitor 1 uses p 1 = 0.5, which is optimal on a one-on-one basis as shown by the two fixed points close to the (1, 0, 0) apex, it systematically loses when all three strategies are involved. (middle) Example of a time series starting at (0.099, 0.002, 0.899), which corresponds to the one highlighted in the left figure. (right) The network structure when two strategies are aggressive and one is defensive corresponds to a core-periphery structure with the core corresponding to the highest p value. The network display style is the same as used in Fig. 2. The core is denser with nodes having a higher average total degree, but it does not target the periphery whereas nodes on the periphery preferentially targets the core and eventually win.

To analyze the dynamics of the three-competitor contest, we note that setting any x i  = 0 constrains the phase space of the dynamics to the set of the remaining two competitors. Consequently, the results for the two-competitor contest apply directly to the three-competitor case. This yields six fixed points: three in which only one competitor exists and three mixed states with two competitors. There is another possible set of fixed points corresponding to coexistence of all three competitors, i.e., \({x}_{1}^{\ast },\,{x}_{2}^{\ast },\,{x}_{3}^{\ast }\ne 0\). We find that barring pathological cases, there can only exist at most one fixed point where all three competitors coexist (see Supplementary Methods). We can obtain this fixed point by removing the x i factor in all \({\dot{x}}_{i}=0\) equations to eliminate solutions with any \({x}_{i}^{\ast }=0\). Through a simple change of variables \({z}_{i}={x}_{i}^{\ast }/({\sum }_{j}\,{p}_{ji}{x}_{j}^{\ast })\), the resulting system of equations can be written as the matrix equation

$${\boldsymbol{P}}\vec{z}=\vec{1},$$
(9)

where \(\vec{z}\) is the vector of the new z i variables. The change of variables allows us to leverage the symmetries of the original equations. We can compute the remaining fixed point with three non-zero stable competitors by inverting P and solving a system of linear equations.

By computing the fixed points and determining their stabilities, we find that the three-competitor contest can be described by a set of five characteristic flow diagrams that we organize into four classes with qualitatively different behaviors and numbers/types of stable outcomes. Each class is distinguished by two simple features: (i) by the number of defensive strategies, i.e. how many competitors i 1, 2, 3 have p i  ≥ 1/2; and (ii) by the number of pairwise combination of strategies that are generally defensive, i.e., whether p i  + p j is greater than 1 for pairings {i, j} in {1, 2}, {1, 3} and {2, 3}. Condition (ii) determines the dynamics along the edge of the \(\overrightarrow{x}\) space (where x i  = 0 for exactly one i), and condition (i) informs us on the overall shape of the flow. In what follows, we discuss the dynamics of each class and its implications for three-competitor contests. We analyse the observed phenomenology in terms of the underlying network structure, but similar discussions exist for games with more than two strategies in evolutionary game theory22, 23.

Interior stable fixed point

We already know that pairwise aggressive competitions promote coexistence in two-competitor cases. Similarly, with three competitors, all three strategies can coexist only when all strategies are offensive, i.e. \({p}_{i} < \mathrm{1/2}\,\forall i\). This mixed fixed point is globally stable such that all trajectories lead to it provided that the frequencies of competitors are nonzero (see Fig. 4 for example). As a result, if two competitors have reached their equilibrium and a third competitor enters the contest at low abundance then the equilibrium is shifted to the interior fixed point. Thus, any third competitor with a strategy of p < 1/2 can successfully invade and reach a nonzero equilibrium frequency in the population. Following the results of ref. 23 and knowing that the basic step of the voter model is a pairwise interaction (i.e., a two-player game), we know that there is only a single point of full co-existence.

Figure 4
Figure 4

Coexistence of three aggressive strategies. Depicted is the flow diagram of the voter dynamics given p 1 = 0.3, p 2 = 0.2 and p 3 = 0.1. As obtained through our analysis of the two competitor dynamics, aggressive strategies promote coexistence. This is generalized in the three competitor cases, where an interior stable fixed point can exist when p i  < 1/2 for all i.

Single edge stable fixed point

Another class of flow diagrams have a single final state in which two competitors coexist and one goes extinct. This occurs if only one strategy is defensive, i.e. p i  ≥ 1/2 for only one i, which disrupts the fully mixed coexistence. In these cases, all trajectories with nonzero initial conditions lead to a fixed point corresponding to coexistence between the two offensive strategies. This class of flow diagrams has an interesting property that in some cases the winner of pairwise competitions is the loser in the three competitor contest (see Fig. 3 for an example of this behavior). This “winner turns loser” scenario is analogous to well-known paradoxes in voting systems with rational voters choosing between options24. To be clear, our results and methodology are distinct from the traditional framing of voter paradoxes. In such systems, there are rational voters choosing between options and voters have fixed preferences for the options. Various rules used to determine the winning option present paradoxical behavior. In our system, the analogous framing would be if nodes are voters and competitors are options. But since the networks we analyze are adaptive, voters are continually changing their preference for options. Despite the differences, the winner turns loser paradox emerges in our system through the existence of a stable fixed point between the pairwise “losing” strategies.

Two stable fixed points

There are two classes of competitions with two stable outcomes: either two stable mixed points where two strategies coexist, or one stable mixed point and one stable winner-takes-all outcome. The former occurs when we have two defensive strategies but only one pairwise defensive combination. In this case, the two pairwise defensive match-ups will lead to two stable mixed points where the most aggressive strategy coexist with either of the defensive strategies. The second case with two stable points, which has one stable mixed state and one stable winner-takes-all outcome, occurs when there are two pairwise defensive match-ups. Obviously, the pairwise aggressive pair will still lead to a stable mixed state, but the two pairwise defensive pairs create unstable fixed points that delineate a basin of attraction for initial conditions leading to a winner-takes-all outcome for the most defensive strategy.

This class of flow diagrams contains trajectories in which a competitor approaches close to extinction before increasing to reach the majority of the population. These long transients appear to approach one stable set of fixed points before passing a critical threshold where the behavior rapidly changes (see Fig. 5). Interestingly, these trajectories also pass through areas in which one competitor is close to obtaining all of the nodes before eventually losing a majority of them. This type of paradoxical behaviour, where an initial decrease in the frequency of a competitor eventually leads to an enhancement of the same competitor, were originally observed in dynamics with cyclical dominance built-in the game structure (e.g. rock-paper-scissors)25. In our case it emerges because the winner of the pairwise match-ups can not simultaneously overcome two competitors with high frequencies, and must instead wait for one to be suppressed before taking over. A similar effect can also be caused by spatial constraints on predator-prey dynamics26.

Figure 5
Figure 5

Long transient behavior with mixed strategies. (left) We compute the flow diagram using p 1 = 0.8, p 2 = 0.5 and p 3 = 0.2. Notice that the pairwise competition of competitor 1 and 3 leads to a line of fixed points on the right edge of the simplex because of the pathological case p 1 = 1 − p 3, see Supplementary Methods for details. (right) Example of a time series where the final winner (p 2) stays close to extinction until competitor 3 obtains a majority.

Three stable fixed points

Finally, when all pairings are defensive, then there are three stable fixed points corresponding to complete dominance by one competitor. In these competitions, there is no coexistence. The basins of attraction for the fixed points share borders such that small changes in initial conditions can completely change the outcome (see Fig. 6). The largest basin of attraction belongs to the competitor with the least defensive strategy, i.e., the lowest p. Note that only in contests between three defensive strategies, i.e. \({p}_{i}\ge \mathrm{1/2}\,\forall i\), do we see an interior unstable fixed point as in Fig. 6.

Figure 6
Figure 6

Dynamical trajectories in a modular competition between p 1 = 0.9, p 2 = 0.8, and p 3 = 0.7. (left) Example of a network built from three defensive strategies leads to three distinct modules. The network display style is the same as used in Fig. 2. (middle) Flow diagram of the voter model dynamics given these three defensive strategies shows the three basins of attractions. (right) Example of two time series with slightly different initial conditions shows how the final outcomes of the competition can change. The one with full markers starts at (0.62, 0.28, 0.1) and the one shown with a dotted line starts at (0.61, 0.29, 0.1).

Generalized model and empirically-derived P matrix

Hithereto, we primarily considered particular strategic tradeoffs between offense and defense, but our framework is much more general. Competitors may distinguish between different opponents and split their offensive efforts. For instance, consider the following strategy matrix

$${\boldsymbol{P}}=(\begin{array}{ccc}0.33 & 0.32 & 0.35\\ 0.35 & 0.33 & 0.32\\ 0.32 & 0.35 & 0.33\end{array}),$$
(10)

in which we have built a cyclical structure. Competitor 1 targets competitor 3 preferentially, competitor 2 targets competitor 1, and competitor 3 targets competitor 2. Even though the preferential targeting is small, there is enough asymmetry to push the system towards cyclical Rock-Paper-Scissor dynamics as shown in Fig. 7. This kind of behavior has been well-studied27,28,29,30 and is easily generated when competitors distinguish between opposition. Although the trajectories that lead to the final steady state can be very different, the final solutions derived in our analysis (see Supplementary Methods) still holds and can apply to an arbitrary number of competitors.

Figure 7
Figure 7

Rock-paper-scissor behavior in a well-mixed system with slight asymmetries. (left) The network architecture is well-mixed (i.e. an homogeneous network) as the asymmetries in density between groups are of the order of 1 in a 100 links. The network display style is the same as used in Fig. 2. (middle) The flow diagram resulting from the P matrix in Eq. (10) shows cyclic behavior. (right) The slight cyclical structure (1 targets 3, 2 targets 1 and 3 targets 2) is enough to give rise to damped cyclical behavior. Note that an asymmetry in the initial conditions is also needed. The stronger the asymmetries, the longer the oscillatory transient would be.

To illustrate how one might apply our general framework to real world scenarios, we revisit the empirical data from Twitter on political discussions presented in Fig. 1. The echo chambers observed in the political discussions imply that users are following defensive strategies, in which they devote more of their effort to like-minded users than users with opposing views. The shape of the data suggests a parametrization in terms of three ideologies: liberal, centrist, and conservative. Coarse-graining the empirical matrix in terms of this parametrization directly gives a P matrix for its competitor dynamics. Figure 8 summarizes the prediction of our model based on this empirical P matrix. As expected from the defensive strategies and our previous analysis, the dynamical system finds itself in a regime sensitive to initial conditions with possibly long transient behavior. Uncertainty in initial conditions is thus not only reflected in terms of which competitor ultimately wins, but also potentially in how long it will take before a winner emerges.

Figure 8
Figure 8

Application of our model to Twitter data. (left) Shown are strategies of retweets for different inferred ideologies of authors, according to (and normalized) for every inferred ideologies of retweeters using the federal budget data. The structure of strategies leads to a natural parametrization in terms of three ideologies showed by dotted lines: liberal (smaller than −1.0), centrist (between −1.0 and 1.0) and conservative (above 1.0). Coarse-graining of retweets over this 3 by 3 matrix, then normalizing per row, leads directly to a possible P matrix. (middle) We obtain P matrix and compute the flow diagram with our general analysis (see Supplementary Methods). We highlight two possible time series to illustrate how small changes in initial conditions can lead to drastically different outcomes. (right) One possible time series (highlighted in solid line on the flow diagram) shows the transient behavior. The dotted curves do not exactly correspond to the dotted curve in the flow diagram, but rather to a scenario where strategies are re-scaled (or re-normalized) to remove the centrist ideology from the system once its frequency falls below 1% of the population.

Figure 8 shows how our model incorporates empirical data when each competitor can distinguish between opposing competitors. In such cases, the extinction of one competitor does not reduce the competition to an equivalent two-competitor scenario. Indeed, in Fig. 8 after the centrist ideology falls to zero, conservatives have higher outgoing degree than liberals as liberals waste edges targeting non-existent centrists. Re-scaling strategies to account for the disappearance of a competitor can lead to a completely different outcome, see dotted curves on Fig. 8. Assuming the competitors are informed of the current state of the system, this opens the door for more complex strategies that would themselves adaptively co-evolve with the population.

Discussion

There is a rich history in both biology and social sciences of mathematical models used to understand the dynamics of competition over finite resources1,2,3,4,5,6,7,8. The canonical class of these models, which includes voter models and Moran processes, does not incorporate characteristic features of many real-world competitions. Motivated by empirical data from Twitter and other online forums, we extend these models by adding three features: 1. competitors can adopt different strategies towards resources they control and those they do not, 2. there is a tradeoff between offense (seeking resources to acquire) and defense (protecting resources in possession), and 3. the competition structure adapts according to the interplay between strategies.

In competitions between two competitors there is a single optimal strategy that invests equally in defense and offense. The addition of another competitor creates a much richer set of dynamics with four qualitative regimes. One immediate consequence is the absence of an optimal strategy. The different regimes in the three-competitor case exhibit behavior observed in real-world competitions, including winner-turn-loser paradoxes and instances where the ultimate winning competitors must first past close to extinction.

When there are three competitors, coexistence can only occur if all competitors adopt primarily offensive strategies. When competitors adopt defensive strategies, they promote winner-takes-all outcomes. This outcome is surprising considering the network structure that results from such competitions. Defensive strategies lead to high modularity in which each competitor acquires a set of resources/nodes and forms many links between the nodes in order to maintain possession. This network structure seems like it would lead to coexistence because each competitor protects a set of nodes and makes little effort to acquire others. However, it is precisely this structure that leads to the extinction of one or two competitors. The main reason is that there is a strong positive feedback loop, where once there is a disparity in the number of nodes belonging to each competitor, the majority owner is more likely to acquire new nodes even if it spends little effort trying to do so. In contrast, a competition with only offensive strategies produces a network structure in which nodes are continually changing hands. Although this structure seems unstable, the average number of nodes possessed by competitors reaches a non-zero steady state, i.e. coexistence.

If we consider the competitor who claims the most nodes/resources to be the winner, then we find that the optimal strategy in the two-competitor case can easily be out-competed in the three-competitor case. Namely, the p = 1/2 strategy beats an either more offensive or defensive strategy, but loses when facing two offensive or defensive competitors. Instead the strategy with a value of P in between the others tends to win. The best strategy, therefore, is to be the second most aggressive competitor. Thus, the best strategy for a given competitor depends on the strategies adopted by the other competitors.

The dependence of the winning strategy on the competing strategies gives rise to well-known voting paradoxes. For example Fig. 3 illustrates the Condorcet Winner and the Violation of the subset choice condition paradoxes (CW and SCC), which are some of the most frequently occurring paradoxes24. The CW paradox occurs when a competitor loses an election despite the fact that it would be preferred over any of the competing alternatives. In our model, this occurs in competitions between offensive strategies. On a one-on-one basis the strategy closest to p = 1/2 would win, but it is the middle strategy that wins in three-competitor scenarios. So, for example, in a competition between p 1 = 1/2, p 2 = 1/3, and p 3 = 1/4, the p 1 strategy would win any pairwise competition but the p 2 strategy would win in the three competitor case. This dynamic also implies the SCC paradox in which the expected winner of an election may eventually lose following the removal of a current loser. Indeed, the second most offensive strategy is expected to win if all competitors are present, but loses if the most offensive strategy is removed. The inverse of this behavior which also exists in our model system is the decoy or asymmetric dominance effect31 whereby introducing an inferior option/competitor can artificially promote another option/competitor, even if it was not an initial favorite. Interestingly, these paradoxes were primarily identified in social choice systems with very different features than exist in our model. Yet, we find similar paradoxes are produced by the interplay between strategic tradeoffs and adaptive network structure, without the need for any active choice.

Another interesting feature found in our model is the existence of extremely long transient dynamics. An example displayed in Fig. 5 shows that an eventual winner passes very close to zero frequency in the population corresponding to extinction or complete loss. Interestingly, the competitor who was leading initially ends up going extinct. If mid-competition we were to remove the eventual winner, then the initially leading competitor would win. These long dynamics have important implications when we consider political campaigns. A political campaign that steadily decreased in the polls until it claimed only a small percentage of support would generally be assumed to be a lost cause. Yet in our simple model, such a campaign may simply be following a long transient and may ultimately win despite its seeming initial failure. We note that strategies in our model are fixed so that if a campaign with the long transient wins, it is not due to any strategic shift or adjustment.

We also note that the competitions analyzed in our paper are not just decided by strategy but also by initial conditions. In fact, the expected dynamics and eventual winner can be extremely sensitive to initial conditions. For example, if all competitors adopt defensive strategies then there are three stable fixed points corresponding to the three different winner-takes-all outcomes. Each stable fixed point has its own basin of attraction separated by unstable fixed points. One of these unstable fixed points corresponds to an initial condition where all three competitors are initially present. As observed in Fig. 6, small deviations around this point push the dynamics to any of the three winner-takes-all outcome.

In this paper, we highlighted many similarities between our results and evolutionary game theory. These likely stem from the fact that in both cases strategies interact according to probabilities and there is a resultant payout or reward. While the underlying dynamics share similar elements, there are larger conceptual differences. Our model features an adaptive network structure which means that, at any time, the network encodes the strategies. One can look at a node and observe the outgoing and ingoing edges to infer the P matrix and compute the subsequent dynamics—as we did in our Twitter analysis. In contrast, classic evolutionary game theory often does not include any population structure apart from relative frequencies of players (and those that do often consider fixed structures). As a result, in order to determine the competition dynamics one must know the payoff matrix and the probabilities that certain strategies are played. This data is typically hidden from view in empirical systems and challenging to infer without population dynamics. Thus, despite the qualitative connection observed between the payoff structure of game theory and the connectivity structure of our adaptive networks, empirical analysis is likely more readily accessible using our conceptualization and approach.

Finally, our analysis focused on a particular type of tradeoff but it is certainly not the only one. For example, the Twitter data we used to fit a P matrix did not follow that particular tradeoff. Nonetheless, our general analysis still holds and we found similar qualitative dynamics as observed in our more restricted three competitor case. There are, of course, many caveats involved in the use of online discussion forum data, and it might be that incorporating data from other sources such as Facebook or Reddit might yield different P matrix structures. Although individuals have access to many online platforms and activities, their behaviors are likely correlated with their ideology. Consequently, interpreting the data from online discussion platforms is an active area of research11, 12, 32. Our mathematical model complements this work by providing a simple parametrization concerning offense/defense strategies that can be tuned to multiple data sources. Not only does it exhibit behavior found in complex real world scenarios but there are many interesting open questions. For example, do defensive strategies really lead to winner-takes-all competitions while offensive strategies promote coexistence of competitors/ideas? Do the qualitative dynamics change if competitors face different constraints? What happens if competitors alter their strategies over the course of the competition? At the very least, our analytical results provide examples of what to look for in further study.

Additional information

Publisher's note: Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  1. 1.

    Rescigno, A. The struggle for life: II. Three competitors. Bull. Math. Biophys. 30, 291–298 (1968).

  2. 2.

    May, R. M. & Leonard, W. J. Nonlinear aspects of competition between three species. SIAM Journal on Applied Mathematics 29, 243–253 (1975).

  3. 3.

    Perc, M., Gómez-Gardeñes, J., Szolnoki, A., Flora, L. M. & Moreno, Y. Evolutionary dynamics of group interactions on structured populations: a review. J. R. Soc. Interface 10, 20120997 (2013).

  4. 4.

    May, R. M. Some mathematical remarks on the paradox of voting. Behavioral Science 16, 143–151 (1971).

  5. 5.

    Sood, V. & Redner, S. Voter model on heterogeneous graphs. Phys. Rev. Lett. 94, 178701 (2005).

  6. 6.

    Sood, V., Antal, T. & Redner, S. Voter models on heterogeneous networks. Phys. Rev. E 77, 041121 (2008).

  7. 7.

    Kearns, M., Judd, S., Tan, J. & Wortman, J. Behavioral experiments on biased voting in networks. Proc. Natl. Acad. Sci. USA 106, 1347–1352 (2009).

  8. 8.

    Ben-Naim, E., Frachebourg, L. & Krapivsky, P. L. Coarsening and persistence in the voter model. Phys. Rev. E 53, 3078 (1996).

  9. 9.

    Samin, N. Dynamics of Internet use: Saudi youth, religious minorities and tribal communities. Middle East Journal of Culture and Communication 1, 197–215 (2008).

  10. 10.

    Papacharissi, Z. The virtual sphere 2.0: The Internet, the public sphere, and beyond. Routledge handbook of internet politics 230–245 (2009).

  11. 11.

    Ruiz, C. et al. Public sphere 2.0? The democratic qualities of citizen debates in online newspapers. The International Journal of Press/Politics 1940161211415849 (2011).

  12. 12.

    Barberá, P., Jost, J. T., Nagler, J., Tucker, J. A. & Bonneau, R. Tweeting From Left to Right Is Online Political Communication More Than an Echo Chamber? Psychological science 26, 1531–1542 (2015).

  13. 13.

    Clifford, P. & Sudbury, A. A model for spatial conflict. Biometrika 60, 581–588 (1973).

  14. 14.

    Moran, P. A. P. Random processes in genetics. In Proceedings of the Cambridge Philosophical Society vol. 54, 60 (1958).

  15. 15.

    Holland, P. W., Laskey, K. B. & Leinhardt, S. Stochastic blockmodels: First steps. Social networks 5, 109–137 (1983).

  16. 16.

    Durrett, R. et al. Graph fission in an evolving voter model. Proc. Natl. Acad. Sci. USA 109, 3682–3687 (2012).

  17. 17.

    Zschaler, G., Böhme, G. A., Seißinger, M., Huepe, C. & Gross, T. Early fragmentation in the adaptive voter model on directed networks. Phys. Rev. E 85, 046107 (2012).

  18. 18.

    Rogers, T. & Gross, T. Consensus time and conformity in the adaptive voter model. Phys. Rev. E 88, 030102 (2013).

  19. 19.

    Borgatti, S. P. & Everett, M. G. Models of core/periphery structures. Soc. Networks 21, 375–395 (2000).

  20. 20.

    Wang, Z., Kokubo, S., Jusup, M. & Tanimoto, J. Universal scaling for the dilemma strength in evolutionary games. Physics of life reviews 14, 1–30 (2015).

  21. 21.

    Hofbauer, J. & Sigmund, K. Evolutionary game dynamics. Bulletin of the American Mathematical Society 40, 479–519 (2003).

  22. 22.

    Tanimoto, J. & Sagara, H. Relationship between dilemma occurrence and the existence of a weakly dominant strategy in a two-player symmetric game. BioSystems 90, 105–114 (2007).

  23. 23.

    Gokhale, C. S. & Traulsen, A. Evolutionary games in the multiverse. Proceedings of the National Academy of Sciences 107, 5500–5504 (2010).

  24. 24.

    Fishburn, P. C. Paradoxes of voting. American Political Science Review 68, 537–546 (1974).

  25. 25.

    Tainaka, K.-I. Paradoxical effect in a three-candidate voter model. Physics Letters A 176, 303–306 (1993).

  26. 26.

    Nakagiri, N., Tainaka, K.-I. & Tao, T. Indirect relation between species extinction and habitat destruction. Ecological Modelling 137, 109–118 (2001).

  27. 27.

    Sinervo, B. & Lively, C. M. The rock-paper-scissors game and the evolution of alternative male strategies. Nature 380, 240–243 (1996).

  28. 28.

    Reichenbach, T., Mobilia, M. & Frey, E. Mobility promotes and jeopardizes biodiversity in rock–paper–scissors games. Nature 448, 1046–1049 (2007).

  29. 29.

    Peltomäki, M. & Alava, M. Three-and four-state rock-paper-scissors games with diffusion. Phys. Rev. E 78, 031906 (2008).

  30. 30.

    He, Q., Mobilia, M. & Täuber, U. C. Spatial rock-paper-scissors models with inhomogeneous reaction rates. Phys. Rev. E 82, 051909 (2010).

  31. 31.

    Huber, J., Payne, J. W. & Puto, C. Adding asymmetrically dominated alternatives: Violations of regularity and the similarity hypothesis. J. Cons. Res 9, 90–98 (1982).

  32. 32.

    Conover, M. et al. Political polarization on Twitter. ICWSM 133, 89–96 (2011).

Download references

Acknowledgements

We thank Marion Dumas, Mirta Galesic, Sidney Redner and anonymous reviewers for their comments, as well as Pablo Barberá for discussing and sharing the Twitter results of Figures 1 and 8. This work has been supported by the Santa Fe Institute, the James S. McDonnell Foundation Postdoctoral Fellowship (L.H.-D.), the National Science Foundation under Grant DMS-1622390 (L.H.-D.), the Santa Fe Institute Omidyar Postdoctoral Fellowship (E.L.), the Fonds de recherche du Québec–Nature et technologies (J.-G.Y., A.A.) and the Defense Threat Reduction Agency Basic Research Award HDTRA1-10-1-0088 (P.-A.N.).

Author information

Affiliations

  1. Santa Fe Institute, Santa Fe, NM, 87501, USA

    • Laurent Hébert-Dufresne
    •  & Eric Libby
  2. Institute for Disease Modeling, Bellevue, WA, 98005, USA

    • Laurent Hébert-Dufresne
  3. Centre de Recerca Matemàtica, E-08193, Bellaterra, Barcelona, Spain

    • Antoine Allard
  4. University of California, Davis, CA, 95616, USA

    • Pierre-André Noël
  5. Département de physique, de génie physique et d’optique, Université Laval, Québec, Qc, G1V 0A6, Canada

    • Jean-Gabriel Young

Authors

  1. Search for Laurent Hébert-Dufresne in:

  2. Search for Antoine Allard in:

  3. Search for Pierre-André Noël in:

  4. Search for Jean-Gabriel Young in:

  5. Search for Eric Libby in:

Contributions

L.H.-D., A.A., P.-A.N., J.-G.Y., and E.L. conceived of the model, performed analysis and interpretation of results, and wrote the manuscript.

Competing Interests

The authors declare that they have no competing interests.

Corresponding author

Correspondence to Eric Libby.

Electronic supplementary material

About this article

Publication history

Received

Accepted

Published

DOI

https://doi.org/10.1038/s41598-017-07621-x

Comments

By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.