skip to main content
10.1145/2187836.2187930acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

Actions speak as loud as words: predicting relationships from social behavior data

Published:16 April 2012Publication History

ABSTRACT

In recent years, new studies concentrating on analyzing user personality and finding credible content in social media have become quite popular. Most such work augments features from textual content with features representing the user's social ties and the tie strength. Social ties are crucial in understanding the network the people are a part of. However, textual content is extremely useful in understanding topics discussed and the personality of the individual. We bring a new dimension to this type of analysis with methods to compute the type of ties individuals have and the strength of the ties in each dimension. We present a new genre of behavioral features that are able to capture the "function" of a specific relationship without the help of textual features. Our novel features are based on the statistical properties of communication patterns between individuals such as reciprocity, assortativity, attention and latency. We introduce a new methodology for determining how such features can be compared to textual features, and show, using Twitter data, that our features can be used to capture contextual information present in textual features very accurately. Conversely, we also demonstrate how textual features can be used to determine social attributes related to an individual.

References

  1. S. Adali, R. Escriva, M. Goldberg, M. Hayvanovych, M. Magdon-Ismail, B. K. Szymanski, W. A. Wallace, and G. M. Williams. Measuring behavioral trust in social networks. In Proc. International Conference on Intelligence and Security Informatics (ISI), pages 150--152, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  2. S. Adali, X. Lu, M. Magdon-Ismail, and J. Purnell. Prominence ranking in graphs with community structure. In International AAAI Conference on Weblogs and Social Media (ICWSM'11), 2011.Google ScholarGoogle Scholar
  3. B. D. Alan Ritter, Colin Cherry. Unsupervised modeling of twitter conversations. In Proceedings of HLT-NAACL, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Baumes, M. Golberg, and M. Magdon-Ismail. Efficient identification of overlapping communities. In Proc. International Conference on Intelligence and Security Informatics (ISI), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida. Detecting spammers on twitter. In CEAS 2010 - Seventh annual Collaboration, Electronic messaging, Anti- Abuse and Spam Conference, 2010.Google ScholarGoogle Scholar
  6. D. Boyd, S. Golder, and G. Lotan. Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. In HICSS-43. IEEE: Kauai, HI, January 6., 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K. Canini, B. Suh, and P. Pirolli. Finding credible information sources in social networks based on content and social structure. In2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  8. C. Chung and J. Pennebaker.The psychological function of function words, pages 343--359. New York: Psychology Press, 2007.Google ScholarGoogle Scholar
  9. A. Clauset, M. Newman, and C. Moore. Finding community structure in very large networks.Phys. Rev. E, 70(6):066111, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  10. T. DuBois, J. Golbeck, and A. Srinavasan. Predicting trust and distrust in social networks. In IEEE International Conference on Social Computing, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  11. E. Gilbert and K. Karahalios. Predicting tie strength with social media. InProceedings of the 27th international conference on Human factors in computing systems, pages 211--220, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Golbeck, C. Robles, M. Edmondson, and K. Turner. Predicting personality from twitter. In 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  13. J. Golbeck, C. Robles, and K. Turner. Predicting personality with social media. InProceedings of the 2011 annual conference extended abstracts on Human factors in computing systems, CHI EA 2011, pages 253--262, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Granovetter. The strength of weak ties. American Journal of Sociology, 78:1--22, 1973.Google ScholarGoogle ScholarCross RefCross Ref
  15. M. Granovetter. Economic action and social structure: The problem of embeddedness.American Journal of Sociology, 91:481--510, 1985.Google ScholarGoogle ScholarCross RefCross Ref
  16. E. T. Hall.The Silent Language. Anchor, 1973.Google ScholarGoogle Scholar
  17. C. Honey and S. Herring. Beyond microblogging: Conversation and collaboration via twitter. In HICSS'09. 42nd Hawaii International Conference on System Sciences, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. L. Hong, G. Convertino, and E. Chi. Language matters in twitter: A large scale study. In International AAAI Conference on Weblogs and Social Media (ICWSM'11), 2011.Google ScholarGoogle Scholar
  19. A. Java, X. Song, T. Finin, and B. Tseng. Why we twitter: understanding microblogging usage and communities. InProceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis, pages 56--65, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Lauterbach, H. Truong, T. Shah, and L. Adamic. Surfing a web of trust: Reputation and reciprocity on couchsurfing. InProceedings of the 2009 International Conference on Computational Science and Engineering, volume 4, pages 346--353, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. E. J. Newman. Mixing patterns in networks. Physical Review E, 67, 2003.Google ScholarGoogle Scholar
  22. E. Ostrom and J. W. (editors).Trust and Reciprocity. Russell Sage Foundation, 2005.Google ScholarGoogle Scholar
  23. J. Pennebaker.The Secret Life of Pronouns: What Our Words Say About Us. Bloomsbury Press, 2011.Google ScholarGoogle Scholar
  24. M. Rivera, S. Soderstrom, and B. Uzzi. Dynamics of dyads in social networks: Assortative, relational, and proximity mechanisms.Annual Review of Sociology, pages 91--115, 2010.Google ScholarGoogle Scholar
  25. S. Saavedraa, K. Hagerty, and B. Uzzi. Synchronicity, instant messaging, and performance among financial traders. Proceeding of the National Academy of Sciences (PNAS), 2011.Google ScholarGoogle ScholarCross RefCross Ref
  26. B. Suh, L. Hong, P. Pirolli, and E. Chi. Want to be retweeted? large scale analytics on factors impacting retweet in twitter network. In 2010 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Y. R. Tausczik and J. W. Pennebaker. The psychological meaning of words: Liwc and computerized text analysis methods.Journal of Language and Social Psychology, 29(1):24--54, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  28. B. Uzzi. Social structure and competition in interfirm networks: The paradox of embeddedness. Administrative Science Quarterly, 42:35--67, March 1997.Google ScholarGoogle ScholarCross RefCross Ref
  29. A. Wang. Don't follow me: Spam detection in twitter. In Intl Conference on Security and Cryptography (SECRYPT), 2010.Google ScholarGoogle Scholar
  30. C. Wang, A. Strathman, O. Lizardo, D. Hachen, Z. Toroczkai, and N. V. Chawla. Weighted reciprocity in human communication networks. Social Networks (under review), 2011.Google ScholarGoogle Scholar
  31. S. Wuchty and B. Uzzi. Human communication dynamics: A study of the agreement between self-reported and email derived social networks. PLoS One, forthcoming, 2011.Google ScholarGoogle Scholar

Index Terms

  1. Actions speak as loud as words: predicting relationships from social behavior data

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          WWW '12: Proceedings of the 21st international conference on World Wide Web
          April 2012
          1078 pages
          ISBN:9781450312295
          DOI:10.1145/2187836

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 16 April 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate1,899of8,196submissions,23%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader