skip to main content
10.1145/1519065.1519089acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

User interactions in social networks and their implications

Authors Info & Claims
Published:01 April 2009Publication History

ABSTRACT

Social networks are popular platforms for interaction, communication and collaboration between friends. Researchers have recently proposed an emerging class of applications that leverage relationships from social networks to improve security and performance in applications such as email, web browsing and overlay routing. While these applications often cite social network connectivity statistics to support their designs, researchers in psychology and sociology have repeatedly cast doubt on the practice of inferring meaningful relationships from social network connections alone.

This leads to the question: Are social links valid indicators of real user interaction? If not, then how can we quantify these factors to form a more accurate model for evaluating socially-enhanced applications? In this paper, we address this question through a detailed study of user interactions in the Facebook social network. We propose the use of interaction graphs to impart meaning to online social links by quantifying user interactions. We analyze interaction graphs derived from Facebook user traces and show that they exhibit significantly lower levels of the "small-world" properties shown in their social graph counterparts. This means that these graphs have fewer "supernodes" with extremely high degree, and overall network diameter increases significantly as a result. To quantify the impact of our observations, we use both types of graphs to validate two well-known social-based applications (RE and SybilGuard). The results reveal new insights into both systems, and confirm our hypothesis that studies of social applications should use real indicators of user interactions in lieu of social graphs.

References

  1. Lada A. Adamic, Orkut Buyukkokten, and Eytan Adar. A social network caught in the web. First Monday, 8(6), 2003.Google ScholarGoogle Scholar
  2. Yong-Yeol Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong. Analysis of topological characteristics of huge online social networking services. In Proc. of the International World Wide Web Conference, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L.A. N. Amaral, A. Scala,M. Barthelemy, and H. E. Stanley. Classes of small--world networks. In Proc. of National Academy of Sciences, pages 11149--11152, 2000.Google ScholarGoogle Scholar
  4. Albert-Laszlo Barabasi and Reka Albert. Emergence of scaling in random networks. Science, 286, 1999.Google ScholarGoogle Scholar
  5. Bryce Boe and Christo Wilson. crawl-e: Highly distributed web crawling framework written in python. Google Code, 2008.Google ScholarGoogle Scholar
  6. Andrei Broder, Ravi Kumar, Farzin Maghoul, Prabhakar Raghavan, Sridhar Rajagopalan, Raymie Stata, Andrew Tomkins, and Janet Wiener. Graph structure in the web: Experiments and models. In Proc. of the International World Wide Web Conference, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Chun, H. Kwak, Y.H. Eom, Y.Y. Ahn, S. Moon, and H. Jeong. Comparison of online social relations in volume vs interaction: a case study of cyworld. In Proc. of Internet Measurement Conference, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Aaron Clauset, Cosma Rohilla Shalizi, and M. E. J. Newman. Power-law distributions in empirical data. SIAM Review, to appear, 2009. See: <a href="http://arxiv.org/abs/0706.1062">arxiv:0706.1062</a>. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Donath and D. Boyd. Public displays of connection. BT Technology Journal, 22(4), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. John R. Douceur. The Sybil attack. In Proc. of IPTPS, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Facebook. Statistics. facebook.com, March 2008.Google ScholarGoogle Scholar
  12. S. Garriss, M. Kaminsky, M. J. Freedman, B. Karp, D. Mazieres, and H. Yu. Re: Reliable email. In Proc. of NSDI, San Jose, CA, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ravi Kumar, Jasmine Novak, and Andrew Tomkins. Structure and evolution of online social networks. In Proc. of KDD, pages 611--617, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jure Leskovec and Eric Horvitz. Planetary-scale views on a large instant-messaging network. In Proc. of the International World WideWeb Conference, Beijing, China, April 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Sergio Marti, Prasanna Ganesan, and Hector Garcia-Molina. DHT routing using social links. In Proc. of IPTPS, San Diego, CA, February 2004.Google ScholarGoogle Scholar
  16. Stanley Milgram. The small world problem. Psychology Today, 6:62--67, 1967.Google ScholarGoogle Scholar
  17. StanleyMilgram. The familiar stranger: an aspect of urban anonymity. Addison--Wesley, 1977.Google ScholarGoogle Scholar
  18. A. Mislove, K. P. Gummadi, and P. Druschel. Exploiting social networks for internet search. In Proc. of HotNets, Irvine, CA, November 2006.Google ScholarGoogle Scholar
  19. Alan Mislove, Hema Swetha Koppula, Krishna P. Gummadi, Peter Druschel, and Bobby Bhattacharjee. Growth of the Flickr social network. In Proc. of WOSN, Seattle, WA, August 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Alan Mislove, Massimiliano Marcon, Krishna P. Gummadi, Peter Druschel, and Bobby Bhattacharjee. Measurement and analysis of online social networks. In Proc. of Internet Measurement Conference, October 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. E. J. Newman. Mixing patterns in networks. Physical Review E, 67, 2003.Google ScholarGoogle Scholar
  22. Mark Sweney. Facebook sees first dip in uk users. guardian.co.uk, February 2008.Google ScholarGoogle Scholar
  23. Duncan J. Watts and Steven Strogatz. Collective dynamics of 'small-world' networks. Nature, (393):440--442, 1998.Google ScholarGoogle Scholar
  24. Ben Worthen. Bill Gates quits facebook. Wall Street Journal Online, Feb. 2008.Google ScholarGoogle Scholar
  25. Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, and Feng Xiao. Sybillimit: A near-optimal social network defense against sybil attacks. In Proc. of IEEE Security &amp; Privacy, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman. Sybilguard: defending against sybil attacks via social networks. In Proc. of SIGCOMM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. User interactions in social networks and their implications

    Recommendations

    Reviews

    Burkhard Englert

    Recently, several applications have been designed that use social networking relationships "to improve [the] security and performance [of] applications such as email, Web browsing, and overlay routing." Such applications usually base trust on the existence of social network connections between participants. In this paper, Wilson et al. demonstrate the limitations of social network connections alone as the basis for trust, and make suggestions for a better approach. They show, based on a large social network and user interaction analysis on the Facebook network, that only a fraction of users' social network connections (friends) represent actual social interactions. Hence, they propose the use of interaction graphs instead of the customary social graphs as the basis of trust decisions in applications. "An interaction graph contains all nodes from its social graph counterpart, but only a subset of the links"-those over which real interactions occur. Social interaction graphs reduce the social graphs and therefore enhance their value. As the authors further demonstrate, this approach leads to improved performance in algorithms such as Reliable Email [1] and SybilGuard [2]. This well-written paper deserves credit for its formal verification of the seemingly intuitive observation that social network connections do not always represent social network interactions, and for its careful analysis of the relationship between social and interaction graphs. One of its main weaknesses is its exclusive focus on Facebook. As a result, the issue of how to construct interaction graphs for other social networking sites is never addressed. In the end, what remains is a valuable suggestion-to consider social interactions instead of social connections-to anyone who wants to develop applications based on social networks. Online Computing Reviews Service

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      EuroSys '09: Proceedings of the 4th ACM European conference on Computer systems
      April 2009
      342 pages
      ISBN:9781605584829
      DOI:10.1145/1519065

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 April 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate241of1,308submissions,18%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader