skip to main content
research-article

Beyond Social Graphs: User Interactions in Online Social Networks and their Implications

Published:01 November 2012Publication History
Skip Abstract Section

Abstract

Social networks are popular platforms for interaction, communication, and collaboration between friends. Researchers have recently proposed an emerging class of applications that leverage relationships from social networks to improve security and performance in applications such as email, Web browsing, and overlay routing. While these applications often cite social network connectivity statistics to support their designs, researchers in psychology and sociology have repeatedly cast doubt on the practice of inferring meaningful relationships from social network connections alone. This leads to the question: “Are social links valid indicators of real user interaction? If not, then how can we quantify these factors to form a more accurate model for evaluating socially enhanced applications?” In this article, we address this question through a detailed study of user interactions in the Facebook social network. We propose the use of “interaction graphs” to impart meaning to online social links by quantifying user interactions. We analyze interaction graphs derived from Facebook user traces and show that they exhibit significantly lower levels of the “small-world” properties present in their social graph counterparts. This means that these graphs have fewer “supernodes” with extremely high degree, and overall graph diameter increases significantly as a result. To quantify the impact of our observations, we use both types of graphs to validate several well-known social-based applications that rely on graph properties to infuse new functionality into Internet applications, including Reliable Email (RE), SybilGuard, and the weighted cascade influence maximization algorithm. The results reveal new insights into each of these systems, and confirm our hypothesis that to obtain realistic and accurate results, ongoing research on social network applications studies of social applications should use real indicators of user interactions in lieu of social graphs.

References

  1. Adamic, L. A., Buyukkokten, O., and Adar, E. 2003. A social network caught in the web. First Monday 8, 6.Google ScholarGoogle ScholarCross RefCross Ref
  2. Ahn, Y.-Y., Han, S., Kwak, H., Moon, S., and Jeong, H. 2007. Analysis of topological characteristics of huge online social networking services. In Proceedings of the International Conference on the World Wide Web (WWW’07). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Amaral, L. A. N., Scala, A., Barthelemy, M., and Stanley, H. E. 2000. Classes of small-world networks. Proc. Nat. Acad. Sci. 11149--11152.Google ScholarGoogle Scholar
  4. Backstrom, L., Bakshy, E., Kleinberg, J. M., Lento, T. M., and Rosenn, I. 2011. Center of attention: How facebook users allocate attention across friends. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM’11).Google ScholarGoogle Scholar
  5. Barabasi, A.-L. and Albert, R. 1999. Emergence of scaling in random networks. Science 286.Google ScholarGoogle Scholar
  6. Benevenuto, F., Rodrigues, T., Cha, M., and Almeida, V. 2009. Characterizing user behavior in online social networks. In Proceedings of the Internet Measurement Conference (IMC’09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Boe, B. and Wilson, C. 2008. Crawl-E: Highly distributed web crawling framework written in python. Google Code.Google ScholarGoogle Scholar
  8. Broder, A., Kumar, R., Maghoul, F., Raghavan, P., Rajagopalan, S., Stata, R., Tomkins, A., and Wiener, J. 2000. Graph structure in the web: Experiments and models. In Proceedings of the International Conference on the World Wide Web (WWW’00). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Cha, M., Mislove, A., and Gummadi, K. 2009. A measurement-driven analysis of information propagation in the flickr social network. In Proceedings of the International Conference on the World Wide Web (WWW’09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Cha, M., Haddadi, H., Benevenuto, F., and Gummadi, K. P. 2010. Measuring user influence in twitter: The million follower fallacy. In Proceedings of the International Conference on the Weblogs and Social Media (ICWSM’10).Google ScholarGoogle Scholar
  11. Chang, J. and Sun, E. 2011. Location3: How users share and respond to location-based data on social networking sites. In Proceedings of the International Conference on the Weblogs and Social Media (ICWSM’11).Google ScholarGoogle Scholar
  12. Chen, W., Wang, Y., and Yang, S. 2009. Efficient influence maximization in social networks. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Choudhury, M. D., Mason, W. A., Hofman, J. M., and Watts, D. 2010. Inferring relevant social networks from interpersonal communication. In Proceedings of the International Conference on the World Wide Web (WWW’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Chun, H., Kwak, H., Eom, Y., Ahn, Y., Moon, S., and Jeong, H. 2008. Comparison of online social relations in volume vs interaction: A case study of cyworld. In Proceedings of the Internet Measurement Conference (IMC’08). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Clauset, A., Shalizi, C. R., and Newman, M. E. J. 2009. Power-Law distributions in empirical data. SIAM Rev. To appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Donath, J. and Boyd, D. 2004. Public displays of connection. BT Tech. J. 22, 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Douceur, J. R. 2002. The Sybil attack. In Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS’02). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Facebook. 2008. Statistics. facebook.com.Google ScholarGoogle Scholar
  19. Garriss, S., Kaminsky, M., Freedman, M. J., Karp, B., Mazi‘eres, D., and Yu, H. 2006. Re: Reliable email. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI’06). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Golder, S. A., Wilkinson, D., and Huberman, B. A. 2007. Rhythms of social interaction: Messaging within a massive online network. In Proceedings of the Conference on Communities and Technologies.Google ScholarGoogle Scholar
  21. Jiang, J., Wilson, C., Wang, X., Huang, P., Sha, W., Dai, Y., and Zhao, B. Y. 2010. Understanding latent interactions in online social networks. In Proceedings of the Internet Measurement Conference (IMC’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kempe, D., Kleinberg, J. M., and Tardos, E. 2003. Maximizing the spread of influence through a social network. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’03). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Kumar, R., Novak, J., and Tomkins, A. 2006. Structure and evolution of online social networks. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’06). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Kwak, H., Lee, C., Park, H., and Moon, S. B. 2010. What is twitter, a social network or a news media? In Proceedings of the International Conference on the World Wide Web (WWW’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Leskovec, J. and Horvitz, E. 2008. Planetary-scale views on a large instant-messaging network. In Proceedings of the International Conference on the World Wide Web (WWW’08). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Marti, S., Ganesan, P., and Garcia-Molina, H. 2004. DHT routing using social links. In Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS’04). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Milgram, S. 1967. The small world problem. Psychol. Today 6, 62--67.Google ScholarGoogle Scholar
  28. Milgram, S. 1977. The Familiar Stranger: An Aspect of Urban Anonymity. Addison-Wesley.Google ScholarGoogle Scholar
  29. Mislove, A., Gummadi, K. P., and Druschel, P. 2006. Exploiting social networks for internet search. In Proceedings of the ACM Workshop on Hot Topics in Networks (HotNets’06).Google ScholarGoogle Scholar
  30. Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P., and Bhattacharjee, B. 2007. Measurement and analysis of online social networks. In Proceedings of the Internet Measurement Conference (IMC’07). Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Mislove, A., Koppula, H. S., Gummadi, K. P., Druschel, P., and Bhattacharjee, B. 2008. Growth of the flickr social network. In Proceedings of the ACM Workshop on Online Networks (WOSN’08). Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Mohaisen, A., Yun, A., and Kim, Y. 2010. Measuring the mixing time of social graphs. In Proceedings of the Internet Measurement Conference (IMC’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Newman, M. E. J. 2003. Mixing patterns in networks. Phys. Rev. E 67.Google ScholarGoogle ScholarCross RefCross Ref
  34. Scellato, S., Mascolo, C., Musolesi, M., and Latora, V. 2010. Distance matters: Geo-social metrics for online social networks. In Proceedings of the ACM Workshop on Online Networks (WOSN’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Schneider, F., Feldmann, A., Krishnamurthy, B., and Willinger, W. 2009. Understanding online social network usage from a network perspective. In Proceedings of the Internet Measurement Conference (IMC’09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Swamynathan, G., Wilson, C., Boe, B., Almeroth, K. C., and Zhao, B. Y. 2008. Can social networks improve e-commerce: A study on social marketplaces. In Proceedings of the ACM Workshop on Online Networks (WOSN’08). Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Sweney, M. 2008. Facebook sees first dip in uk users. guardian.co.uk.Google ScholarGoogle Scholar
  38. Ugander, J., Karrer, B., Backstrom, L., and Marlow, C. 2011. The anatomy of the facebook social graph. Arxiv online pre-print, abs/1111.4503v1.Google ScholarGoogle Scholar
  39. Valafar, M., Rejaie, R., and Willinger, W. 2009. Beyond friendship graphs: A study of user interactions in flickr. In Proceedings of the ACM Workshop on Online Networks (WOSN’09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Vert, J.-P. and Yamanishi, Y. 2004. Supervised graph inference. In Proceedings of the Annual Conference on Neural Information Procesing Systems (NIPS’04).Google ScholarGoogle Scholar
  41. Viswanath, B., Mislove, A., Cha, M., and Gummadi, K. P. 2009. On the evolution of user interaction in facebook. In Proceedings of the ACM Workshop on Online Networks (WOSN’09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Watts, D. J. and Strogatz, S. 1998. Collective dynamics of ‘small-world’ networks. Nature 393, 440--442.Google ScholarGoogle ScholarCross RefCross Ref
  43. Wilson, C., Boe, B., Sala, A., Puttaswamy, K. P. N., and Zhao, B. Y. 2009. User interactions in social networks and their implications. In Proceedings of the European Conference on Computer Systems (EuroSys’09). Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Worthen, B. 2008. Bill Gates quits facebook. Wall St. J. Online.Google ScholarGoogle Scholar
  45. Xiang, R., Neville, J., and Rogati, M. 2010. Modeling relationship strength in online social networks. In Proceedings of the International Conference on the World Wide Web (WWW’10). Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Yang, J. and Counts, S. 2010. Predicting the speed, scale, and range of information diffusion in twitter. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM’10).Google ScholarGoogle Scholar
  47. Yu, H., Kaminsky, M., Gibbons, P. B., and Flaxman, A. 2006. Sybilguard: Defending against Sybil attacks via social networks. In Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures and Protocols for Computer Comminications. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Yu, H., Gibbons, P. B., Kaminsky, M., and Xiao, F. 2008. Sybillimit: A near-optimal social network defense against Sybil attacks. In Proceedings of the IEEE Conference on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Zuckerberg, M. 2009. 200 million strong. The Facebook Blog.Google ScholarGoogle Scholar

Index Terms

  1. Beyond Social Graphs: User Interactions in Online Social Networks and their Implications

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on the Web
          ACM Transactions on the Web  Volume 6, Issue 4
          November 2012
          138 pages
          ISSN:1559-1131
          EISSN:1559-114X
          DOI:10.1145/2382616
          Issue’s Table of Contents

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 November 2012
          • Accepted: 1 July 2012
          • Revised: 1 March 2012
          • Received: 1 November 2010
          Published in tweb Volume 6, Issue 4

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader