Mobile social group sizes and scaling ratio

Social data mining has become an emerging area of research in information and communication technology fields. The scope of social data mining has expanded significantly in the recent years with the advance of telecommunication technologies and the rapidly increasing accessibility of computing resources and mobile devices. People increasingly engage in and rely on phone communications for both personal and business purposes. Hence, mobile phones become an indispensable part of life for many people. In this article, we perform social data mining on mobile social networking by presenting a simple but efficient method to define social closeness and social grouping, which are then used to identify social sizes and scaling ratio of close to “8”. We conclude that social mobile network is a subset of the face-to-face social network, and both groupings are not necessary the same, hence the scaling ratios are distinct. Mobile social data mining.

[1]  Stuart Barber,et al.  All of Statistics: a Concise Course in Statistical Inference , 2005 .

[2]  Sheikh Iqbal Ahamed,et al.  Privacy in Pervasive Computing and Open Issues , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[3]  M. C. Jones,et al.  A reliable data-based bandwidth selection method for kernel density estimation , 1991 .

[4]  P. V. Marsden,et al.  Measuring Tie Strength , 1984 .

[5]  J. Marcia,et al.  Ego identity status and the intimacy versus isolation crisis of young adulthood. , 1973, Journal of personality and social psychology.

[6]  Didier Sornette,et al.  Generalized q analysis of log-periodicity: applications to critical ruptures. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[7]  Robin I. M. Dunbar,et al.  Social network size in humans , 2003, Human nature.

[8]  John Birtchnell,et al.  Personality set within an octagonal model of relating. , 1997 .

[9]  Robin I. M. Dunbar,et al.  Social networks, support cliques, and kinship , 1995, Human nature.

[10]  D. Sornette Discrete scale invariance and complex dimensions , 1997, cond-mat/9707012.

[11]  L. Jamieson Intimacy: Personal Relationships in Modern Societies , 1998 .

[12]  D. Olson,et al.  Assessing Intimacy: The Pair Inventory† , 1981 .

[13]  Gráinne M. Fitzsimons,et al.  Dogs on the Street, Pumas on Your Feet: How Cues in the Environment Influence Product Evaluation and Choice , 2008 .

[14]  P. Barrett,et al.  The scale of perceived interpersonal closeness (PICS) , 2003 .

[15]  D. P. Himle,et al.  Dysfunctional Beliefs About Intimacy , 1994, Journal of Cognitive Psychotherapy.

[16]  Julian Bleecker What's Your Social Doing In My Mobile? Design Patterns for Mobile Social Software , 2006 .

[17]  Gustavo S. Mesch,et al.  Friendship Formation , Communication Channels , and Social Closeness , 2006 .

[18]  T. Williams,et al.  "Cultural Anthropology", Thomas Rhys Williams, Prentice Hall, Englewood Cliffs, New Jersey 1990 : [recenzja] / Barbara Olszewska-Dyoniziak. , 1993 .

[19]  Tassilo Pellegrini,et al.  A Social Networking Model of a Web Community , 2007 .

[20]  Raymond Scupin Cultural Anthropology: A Global Perspective , 2007 .

[21]  Derek L. Milne Social Therapy: A Guide to Social Support Interventions for Mental Health Practitioners , 1999 .

[22]  Kon Shing Kenneth Chung,et al.  Exploring Temporal Communication Through Social Networks , 2007, INTERACT.

[23]  Andrew W. Moore,et al.  Rule-based anomaly pattern detection for detecting disease outbreaks , 2002, AAAI/IAAI.

[24]  Mark H. Thelen,et al.  Fear of Intimacy Scale: Validation and Extension with Adolescents , 1996 .

[25]  Evangelos E. Milios,et al.  Link-Based Anomaly Detection in Communication Networks , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[26]  Rachel Croson,et al.  Field experiments in charitable contribution: The impact of social influence on the voluntary provision of public goods , 2006 .

[27]  Didier Sornette,et al.  Discrete hierarchical organization of social group sizes , 2004, Proceedings of the Royal Society B: Biological Sciences.

[28]  Ram Dantu,et al.  Socio-technical defense against voice spamming , 2007, TAAS.

[29]  D. Sornette Multiplicative processes and power laws , 1997, cond-mat/9708231.

[30]  Americus Reed,et al.  “I” Give, But “We” Give More: the Impact of Identity and the Mere Social Information Effect on Donation Behavior , 2007 .

[31]  Rachel Croson,et al.  The Impact of Social Comparisons on Nonprofit Fund Raising , 2006 .

[32]  Jonna Häkkilä,et al.  Collaboration in Context-Aware Mobile Phone Applications , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[33]  Paul D. Berger,et al.  The impact of direct marketing appeals on charitable marketing effectiveness , 1996 .

[34]  Ram Dantu,et al.  Nuisance level of a voice call , 2008, TOMCCAP.

[35]  Jim Dowling,et al.  Properties and mechanisms of self-organizing MANET and P2P systems , 2007, TAAS.

[36]  Jean-Pierre Eckmann,et al.  Q-ANALYSIS OF FRACTAL SETS , 1997 .

[37]  Songwu Lu,et al.  SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.

[38]  Robin I. M. Dunbar CO-EVOLUTION OF NEOCORTEX SIZE , GROUP SIZE AND LANGUAGE IN HUMANS , 2008 .

[39]  Robin I. M. Dunbar Neocortex size as a constraint on group size in primates , 1992 .

[40]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[41]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[42]  Lina Zhou,et al.  Social computing and weighting to identify member roles in online communities , 2005, The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05).

[43]  J. Coleman Introduction to Mathematical Sociology , 1965 .

[44]  Ram Dantu,et al.  Detecting Spam in VoIP Networks , 2005, SRUTI.

[45]  Robin I. M. Dunbar Coevolution of neocortical size, group size and language in humans , 1993, Behavioral and Brain Sciences.