| Literature DB >> 31827450 |
Daniel Castro1,2, Filipa Ferreira1,2, Inês de Castro1, Ana Rita Rodrigues1,2, Marta Correia1, Josefina Ribeiro1, Tiago Bento Ferreira1,2.
Abstract
The network model of psychopathology suggests that central and bridge symptoms represent promising treatment targets because they may accelerate the deactivation of the network of interactions between the symptoms of mental disorders. However, the evidence confirming this hypothesis is scarce. This study re-analyzed a convenience sample of 51 cross-sectional psychopathological networks published in previous studies addressing diverse mental disorders or clinically relevant problems. In order to address the hypothesis that central and bridge symptoms are valuable treatment targets, this study simulated five distinct attack conditions on the psychopathological networks by deactivating symptoms based on two characteristics of central symptoms (degree and strength), two characteristics of bridge symptoms (overlap and bridgeness), and at random. The differential impact of the characteristics of these symptoms was assessed in terms of the magnitude and the extent of the attack required to achieve a maximum impact on the number of components, average path length, and connectivity. Only moderate evidence was obtained to sustain the hypothesis that central and bridge symptoms constitute preferential treatment targets. The results suggest that the degree, strength, and bridgeness attack conditions are more effective than the random attack condition only in increasing the number of components of the psychopathological networks. The degree attack condition seemed to perform better than the strength, bridgeness, and overlap attack conditions. Overlapping symptoms evidenced limited impact on the psychopathological networks. The need to address the basic mechanisms underlying the structure and dynamics of psychopathological networks through the expansion of the current methodological framework and its consolidation in more robust theories is stressed.Entities:
Keywords: bridge symptoms; central symptoms; network analysis; psychopathology; vulnerability
Year: 2019 PMID: 31827450 PMCID: PMC6849493 DOI: 10.3389/fpsyg.2019.02448
Source DB: PubMed Journal: Front Psychol ISSN: 1664-1078
FIGURE 1Illustrative example of network attack. Symptom networks are usually represented in a graph comprised of nodes representing symptoms (blue circles in A–C) and edges representing the interactions between symptoms (gray lines in A–C; line width represents the strength of the interaction). The complete graph represents the causal structure of the interactions between the symptoms. Its exploration provides information regarding the centrality of diverse symptoms (e.g., the number of interactions with other symptoms), as well as the network characteristics (e.g., the number of symptoms, or groups of symptoms, disconnected from the remainder). (A) Represents the original psychopathological network. Under attack, the symptoms (nodes) were sequentially removed, one at a time, in the decreasing order of two centrality measures – (1) degree and (2) strength – and two bridging measures – (3) bridgeness and (4) overlap. (B,C) Represent the evolution of the initial network as symptoms are removed. At each point, network characteristics were measured (average path length, number of components, connectivity, and diameter). The evolution of these measures throughout the attack is represented in (D). The blue rectangles signal the moments to which the networks represented in (A–C) correspond. Finally, the attack extent and the magnitude of its impact were measured considering the number of symptoms that had to be removed to achieve peak average path length, number of components, connectivity, and diameter, as well as the difference between peak and initial values.
Network descriptives.
| Nodes | 22.725 (20.576) | 17.419 (1.335) | 5.000–120.000 |
| Edges | 99.392 (129.186) | 65.645 (8.492) | 8.000–756.000 |
| Density | 0.475 (0.221) | 0.485 (0.035) | 0.067–0.861 |
| Components | 1.333 (0.973) | 1.000 (0.000) | 1.000–5.000 |
| Average path length | 1.658 (0.454) | 1.544 (0.053) | 1.139–3.283 |
FIGURE 2Boxplots summarizing the distributions of the network characteristics, impact magnitude, and attack extent.
Descriptives of impact magnitude and attack extent.
| Random | 1.300 (1.469) | 0.926 (0.089) | 0.060–7.096 | 0.568 (0.093) | 0.577 (0.013) | 0.323–0.718 |
| Degree | 3.098 (3.183) | 2.290 (0.295) | 0.000–15.000 | 0.587 (0.213) | 0.623 (0.027) | 0.000–0.889 |
| Strength | 2.471 (2.701) | 1.806 (0.291) | 0.000–12.000 | 0.523 (0.316) | 0.582 (0.058) | 0.000–0.921 |
| Bridgeness | 2.412 (2.401) | 1.774 (0.198) | 0.000–12.000 | 0.527 (0.245) | 0.574 (0.032) | 0.000–0.893 |
| Overlap | 1.608 (1.866) | 1.194 (0.190) | 0.000–10.000 | 0.493 (0.327) | 0.545 (0.074) | 0.000–0.868 |
| Random | 0.855 (0.502) | 0.801 (0.054) | 0.000–2.588 | 0.315 (0.119) | 0.326 (0.016) | 0.000–0.493 |
| Degree | 0.735 (0.629) | 0.576 (0.052) | 0.000–2.820 | 0.459 (0.200) | 0.482 (0.031) | 0.000–0.812 |
| Strength | 0.511 (0.521) | 0.391 (0.052) | 0.000–2.904 | 0.454 (0.208) | 0.467 (0.031) | 0.000–0.857 |
| Bridgeness | 0.575 (0.650) | 0.382 (0.057) | 0.001–3.345 | 0.420 (0.191) | 0.436 (0.034) | 0.059–0.800 |
| Overlap | 0.431 (0.398) | 0.333 (0.041) | 0.010–1.879 | 0.503 (0.182) | 0.526 (0.028) | 0.091–0.786 |
| Connectivity | ||||||
| Random | – | – | – | 0.201 (0.067) | 0.187 (0.007) | 0.127–0.501 |
| Degree | – | – | – | 0.236 (0.036) | 0.235 (0.005) | 0.167–0.333 |
| Strength | – | – | – | 0.270–0.044 | 0.275 (0.007) | 0.167–0.350 |
| Bridgeness | – | – | – | 0.260 (0.039) | 0.259 (0.007) | 0.167–0.333 |
| Overlap | – | – | – | 0.306 (0.051) | 0.300 (0.006) | 0.222–0.536 |
Post hoc comparisons between attack conditions of the magnitude of the impact on the number of components.
| Random vs. Degree | –1.364 | [−2.124, −0.604] | −5.624∗ | 3.132 |
| Random vs. Strength | –0.880 | [−1.627, −0.134] | −3.694∗ | 3.132 |
| Random vs. Bridgeness | –0.848 | [−1.330, −0.366] | −5.513∗ | 3.132 |
| Random vs. Overlap | –0.2671 | [−0.787, 0.253] | –1.610 | 3.132 |
| Degree vs. Strength | 0.484 | [−0.084, 1.052] | 2.668 | 3.132 |
| Degree vs. Bridgeness | 0.516 | [−0.015, 1.047] | 3.044 | 3.132 |
| Degree vs. Overlap | 1.097 | [0.373, 1.821] | 4.745∗ | 3.132 |
| Strength vs. Bridgeness | 0.032 | [−0.572, 0.637] | 0.167 | 3.132 |
| Strength vs. Overlap | 0.613 | [−0.098, 1.324] | 2.700 | 3.132 |
| Bridgeness vs. Overlap | 0.581 | [0.022, 1.140] | 3.250∗ | 3.132 |
Post hoc comparisons between attack conditions of the magnitude of the impact on the average path length.
| Random vs. Degree | 0.225 | [0.079, 0.372] | 4.346∗ | 2.826 |
| Random vs. Strength | 0.410 | [0.250, 0.570] | 7.242∗ | 2.826 |
| Random vs. Bridgeness | 0.419 | [0.260, 0.579] | 7.437∗ | 2.826 |
| Random vs. Overlap | 0.468 | [0.312, 0.625] | 8.447∗ | 2.826 |
| Degree vs. Strength | 0.185 | [0.038, 0.332] | 3.554∗ | 2.826 |
| Degree vs. Bridgeness | 0.194 | [0.065, 0.323] | 4.237∗ | 2.826 |
| Degree vs. Overlap | 0.243 | [0.090, 0.396] | 4.479∗ | 2.826 |
| Strength vs. Bridgeness | 0.009 | [−0.122, 0.140] | 0.195 | 2.826 |
| Strength vs. Overlap | 0.058 | [−0.078, 0.194] | 1.202 | 2.826 |
| Bridgeness vs. Overlap | 0.049 | [−0.068, 0.166] | 1.186 | 2.826 |
Post hoc comparisons between attack conditions of the extent of the attack on the average path length in the network.
| Random vs. Degree | –0.155 | [−0.215, −0.096] | −7.702∗ | 2.970 |
| Random vs. Strength | –0.141 | [−0.204, −0.078] | −6.618∗ | 2.970 |
| Random vs. Bridgeness | –0.110 | [−0.189, −0.030] | −4.111∗ | 2.970 |
| Random vs. Overlap | –0.200 | [−0.270, −0.130] | −8.498∗ | 2.970 |
| Degree vs. Strength | 0.015 | [−0.052, 0.081] | 0.655 | 2.970 |
| Degree vs. Bridgeness | 0.046 | [−0.024, 0.115] | 1.953 | 2.970 |
| Degree vs. Overlap | –0.045 | [−0.123, 0.034] | –1.686 | 2.970 |
| Strength vs. Bridgeness | 0.031 | [−0.044, 0.106] | 1.220 | 2.970 |
| Strength vs. Overlap | –0.059 | [−0.148, 0.030] | –1.972 | 2.970 |
| Bridgeness vs. Overlap | –0.090 | [−0.181, 0.001] | –2.943 | 2.970 |
Post hoc comparisons between attack conditions of the impact of the extent of the attack on network connectivity.
| Random vs. Degree | –0.049 | [−0.075, −0.022] | −5.506∗ | 3.017 |
| Random vs. Strength | –0.088 | [−0.122, −0.054] | −7.894∗ | 3.017 |
| Random vs. Bridgeness | –0.073 | [−0.101, −0.044] | −7.711∗ | 3.017 |
| Random vs. Overlap | –0.114 | [−0.135, −0.092] | −16.200∗ | 3.017 |
| Degree vs. Strength | –0.039 | [−0.059, −0.020] | −6.015∗ | 3.017 |
| Degree vs. Bridgeness | –0.024 | [−0.041, −0.008] | −4.422∗ | 3.017 |
| Degree vs. Overlap | –0.065 | [−0.084, −0.046] | −10.289∗ | 3.017 |
| Strength vs. Bridgeness | 0.015 | [−0.005, 0.035] | 2.298 | 3.017 |
| Strength vs. Overlap | –0.026 | [−0.054, 0.003] | –2.740 | 3.017 |
| Bridgeness vs. Overlap | –0.041 | [−0.065, −0.016] | −5.026∗ | 3.017 |