Actions speak as loud as words: predicting relationships from social behavior data

In recent years, new studies concentrating on analyzing user personality and finding credible content in social media have become quite popular. Most such work augments features from textual content with features representing the user's social ties and the tie strength. Social ties are crucial in understanding the network the people are a part of. However, textual content is extremely useful in understanding topics discussed and the personality of the individual. We bring a new dimension to this type of analysis with methods to compute the type of ties individuals have and the strength of the ties in each dimension. We present a new genre of behavioral features that are able to capture the "function" of a specific relationship without the help of textual features. Our novel features are based on the statistical properties of communication patterns between individuals such as reciprocity, assortativity, attention and latency. We introduce a new methodology for determining how such features can be compared to textual features, and show, using Twitter data, that our features can be used to capture contextual information present in textual features very accurately. Conversely, we also demonstrate how textual features can be used to determine social attributes related to an individual.

[1]  Susan C. Herring,et al.  Beyond Microblogging: Conversation and Collaboration via Twitter , 2009 .

[2]  Timothy W. Finin,et al.  Why we twitter: understanding microblogging usage and communities , 2007, WebKDD/SNA-KDD '07.

[3]  J. Pennebaker The Secret Life of Pronouns: What Our Words Say About Us , 2011 .

[4]  Danah Boyd,et al.  Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[5]  Hi boyd, danah, Golder, Scott, and Lotan, Gilad. . Tweet Tweet Retweet: Conversational Aspects of Retweeting on Twitter. , 2010 .

[6]  Malik Magdon-Ismail,et al.  Efficient Identification of Overlapping Communities , 2005, ISI.

[7]  E. Hall The Silent Language , 1959 .

[8]  Alex Hai Wang,et al.  Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[9]  Jennifer Golbeck,et al.  Predicting personality with social media , 2011, CHI Extended Abstracts.

[10]  J. Pennebaker,et al.  The Psychological Meaning of Words: LIWC and Computerized Text Analysis Methods , 2010 .

[11]  B. Uzzi,et al.  Social Structure and Competition in Interfirm Networks: The Paradox of Embeddedness , 1997 .

[12]  J. Pennebaker,et al.  The Secret Life of Pronouns , 2003, Psychological science.

[13]  Virgílio A. F. Almeida,et al.  Detecting Spammers on Twitter , 2010 .

[14]  Debra Lauterbach,et al.  Surfing a Web of Trust: Reputation and Reciprocity on CouchSurfing.com , 2009, 2009 International Conference on Computational Science and Engineering.

[15]  Alan Ritter,et al.  Unsupervised Modeling of Twitter Conversations , 2010, NAACL.

[16]  Cheng Wang,et al.  Weighted reciprocity in human communication networks , 2011, ArXiv.

[17]  Kevin Robert Canini,et al.  Finding Credible Information Sources in Social Networks Based on Content and Social Structure , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[18]  Xiaohui Lu,et al.  Prominence Ranking in Graphs with Community Structure , 2021, ICWSM.

[19]  Aravind Srinivasan,et al.  Predicting Trust and Distrust in Social Networks , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[20]  M. Newman,et al.  Finding community structure in very large networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[21]  Elinor Ostrom,et al.  Trust And Reciprocity , 2003 .

[22]  Jennifer Golbeck,et al.  Predicting Personality from Twitter , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[23]  Susan C. Herring,et al.  Beyond Microblogging: Conversation and Collaboration via Twitter , 2009, 2009 42nd Hawaii International Conference on System Sciences.

[24]  Mark S. Granovetter Economic Action and Social Structure: The Problem of Embeddedness , 1985, American Journal of Sociology.

[25]  Brian Uzzi,et al.  Synchronicity, instant messaging, and performance among financial traders , 2011, Proceedings of the National Academy of Sciences.

[26]  Ed H. Chi,et al.  Language Matters In Twitter: A Large Scale Study , 2011, ICWSM.

[27]  Eric Gilbert,et al.  Predicting tie strength with social media , 2009, CHI.

[28]  Sibel Adali,et al.  Measuring behavioral trust in social networks , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.

[29]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[30]  Ed H. Chi,et al.  Want to be Retweeted? Large Scale Analytics on Factors Impacting Retweet in Twitter Network , 2010, 2010 IEEE Second International Conference on Social Computing.

[31]  Brian Uzzi,et al.  Human Communication Dynamics in Digital Footsteps: A Study of the Agreement between Self-Reported Ties and Email Networks , 2011, PloS one.

[32]  Cindy K. Chung,et al.  The Psychological Functions of Function Words , 2007 .

[33]  M. Newman,et al.  Mixing patterns in networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[34]  Sara B. Soderstrom,et al.  Dynamics of Dyads in Social Networks: Assortative, Relational, and Proximity Mechanisms , 2010 .