prepare and submit a paper on online human behavior and power law network. The way user access and interact on social media in these small robust networks helps in understanding the behavior of human beings.

Your assignment is to prepare and submit a paper on online human behavior and power law network. The way user access and interact on social media in these small robust networks helps in understanding the behavior of human beings. In reference to the degree of separation, everyone in the social network is separated and is at fewer steps away and interacts through the introduction form another person and the chain continues. Therefore, how these separated people interact, the kind of connections they make and to whom, what they share and how they relate online will help in understanding the human behavior on social media.

The power-law network is a network whose distribution follows the power-law asymptotically. The power law is a relationship between two quantities where one variable varies as the power of another. Examples of these networks include the World Wide Web links, social networks, or biological networks. Power law networks have a characteristic of clustering. This will therefore help organizations like Amazon know how well their nodes and their customers are interconnected within a specified area of the network. It will help the company know how many of a person’s friends also know each other and how this may influence their shopping culture. (Jackson, 2000)

Power law networks can be subject to two different attacks i.e. random and international attacks. Power law networks are less robust as compared to the scale-free networks hence making them vulnerable for attacks. Therefore, the vulnerability under random attacks is enhanced by the lack of robustness control in such networks. Also, the failures are in these networks are facilitated by large scale cascades coupled with an increase in driver nodes. This is because the number of nodes is related to the number of edges in the connecting components hence the vulnerability to attacks. (Jackson, 2000)

Feedback loops. In this case, it refers to a change in variable results either positively or negatively.