The power of indirect ties

We quantify the strength of indirect social ties by dening a metric named social strength based on various observations from sociology.We evaluate the social strength metric by framing it as a link prediction problem.Social strength metric's usefulness is demonstrated by two applications: predicting information diffusion paths and expanding peers' storage candidates in Friend-to-friend storage systems. While direct social ties have been intensely studied in the context of computer-mediated social networks, indirect ties (e.g., friends of friends) have seen little attention. Yet in real life, we often rely on friends of our friends for recommendations (of good doctors, good schools, or good babysitters), for introduction to a new job opportunity, and for many other occasional needs. In this work we attempt to 1) quantify the strength of indirect social ties, 2) validate the quantification, and 3) empirically demonstrate its usefulness for applications on two examples. We quantify social strength of indirect ties using a measure of the strength of the direct ties that connect two people and the intuition provided by the sociology literature. We evaluate the proposed metric by framing it as a link prediction problem and experimentally demonstrate that our metric accurately (up to 87.2%) predicts link's formation. We show via data-driven experiments that the proposed metric for social strength can be used successfully for social applications. Specifically, we show that it can be used for predicting the effects of information diffusion with an accuracy of up to 0.753. We also show that it alleviates known problems in friend-to-friend storage systems by addressing two previously documented shortcomings: reduced set of storage candidates and data availability correlations.

[1]  Robert Cole,et al.  Computer Communications , 1982, Springer New York.

[2]  I. N. A. C. I. J. H. Fowler Book Review: Connected: The surprising power of our social networks and how they shape our lives. , 2009 .

[3]  Esteban Moro,et al.  Social Features of Online Networks: The Strength of Intermediary Ties in Online Social Media , 2011, PloS one.

[4]  R. Burt Social Contagion and Innovation: Cohesion versus Structural Equivalence , 1987, American Journal of Sociology.

[5]  D. Watts,et al.  Origins of Homophily in an Evolving Social Network1 , 2009, American Journal of Sociology.

[6]  Adam M. Kleinbaum Organizational Misfits and the Origins of Brokerage in Intra-Firm Networks , 2012 .

[7]  Jinyang Li,et al.  F2F: Reliable Storage in Open Networks , 2006, IPTPS.

[8]  A. Rapoport Spread of information through a population with socio-structural bias: I. Assumption of transitivity , 1953 .

[9]  Pietro Michiardi,et al.  An empirical study of availability in friend-to-friend storage systems , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.

[10]  Paul Anderson,et al.  On managing social data for enabling socially-aware applications and services , 2010, SNS '10.

[11]  George C. Homans Human Group , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[12]  Dan Cosley,et al.  Inferring social ties from geographic coincidences , 2010, Proceedings of the National Academy of Sciences.

[13]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .

[14]  Linyuan Lu,et al.  Link Prediction in Complex Networks: A Survey , 2010, ArXiv.

[15]  Sinan Aral,et al.  The Diversity-Bandwidth Trade-off1 , 2011, American Journal of Sociology.

[16]  Eric Gilbert,et al.  Predicting tie strength with social media , 2009, CHI.

[17]  Adriana Iamnitchi,et al.  Relationships under the Microscope with Interaction-Backed Social Networks , 2013 .

[18]  N. Christakis,et al.  Dynamic spread of happiness in a large social network : longitudinal analysis of the Framingham Heart Study social network. Commentary , 2009 .

[19]  Mark S. Granovetter Getting a Job: A Study of Contacts and Careers , 1974 .

[20]  Adriana Iamnitchi,et al.  The power of indirect ties in friend-to-friend storage systems , 2014, 14-th IEEE International Conference on Peer-to-Peer Computing.

[21]  Adriana Iamnitchi,et al.  On the Design of Socially-Aware Distributed Systems , 2012 .

[22]  Michael McGill,et al.  Introduction to Modern Information Retrieval , 1983 .

[23]  G. C. Homans,et al.  Social Behavior: Its Elementary Forms. , 1975 .

[24]  Haiying Shen,et al.  SOAP: A Social network Aided Personalized and effective spam filter to clean your e-mail box , 2011, 2011 Proceedings IEEE INFOCOM.

[25]  M. De Domenico,et al.  The Anatomy of a Scientific Rumor , 2013, Scientific Reports.

[26]  Marshall Van Alstyne,et al.  The Diversity-Bandwidth Tradeoff , 2010 .

[27]  M. McPherson,et al.  Birds of a Feather: Homophily in Social Networks , 2001 .

[28]  Alexandru Iosup,et al.  TRIBLER: a social-based peer-to-peer system: Research Articles , 2008 .

[29]  Dino Pedreschi,et al.  "How Well Do We Know Each Other?" Detecting Tie Strength in Multidimensional Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[30]  Rossano Schifanella,et al.  The role of information diffusion in the evolution of social networks , 2013, KDD.

[31]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[32]  Matei Ripeanu,et al.  Cheating in Online Games: A Social Network Perspective , 2014, TOIT.

[33]  William W. Cohen,et al.  Recommendation as Classification: Using Social and Content-Based Information in Recommendation , 1998, AAAI/IAAI.

[35]  Daniel J. Brass,et al.  Relationships and Unethical Behavior: A Social Network Perspective , 1998 .

[36]  Jon M. Kleinberg,et al.  The link-prediction problem for social networks , 2007, J. Assoc. Inf. Sci. Technol..

[37]  Ben Y. Zhao,et al.  User interactions in social networks and their implications , 2009, EuroSys '09.

[38]  Jimeng Sun,et al.  Social influence analysis in large-scale networks , 2009, KDD.

[39]  Wolfgang Kellerer,et al.  Outtweeting the Twitterers - Predicting Information Cascades in Microblogs , 2010, WOSN.

[40]  Ian Witten,et al.  Data Mining , 2000 .

[41]  Lada A. Adamic,et al.  Friends and neighbors on the Web , 2003, Soc. Networks.

[42]  Adriana Iamnitchi,et al.  The Influence of Indirect Ties on Social Network Dynamics , 2014, SocInfo.

[43]  Noah E. Friedkin,et al.  Horizons of Observability and Limits of Informal Control in Organizations , 1983 .

[44]  Stan Matwin,et al.  Addressing the Curse of Imbalanced Training Sets: One-Sided Selection , 1997, ICML.

[45]  N. Christakis,et al.  The Spread of Obesity in a Large Social Network Over 32 Years , 2007, The New England journal of medicine.

[46]  Nitesh V. Chawla,et al.  SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..

[47]  Andrew S. Tanenbaum,et al.  Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.

[48]  Mehmet E. Yildiz,et al.  Asymmetric information diffusion via gossiping on static and dynamic networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[49]  Ciro Cattuto,et al.  What's in a crowd? Analysis of face-to-face behavioral networks , 2010, Journal of theoretical biology.

[50]  B. Wellman Structural analysis: From method and metaphor to theory and substance. , 1988 .

[51]  Leo Katz,et al.  A new status index derived from sociometric analysis , 1953 .

[52]  D. M. Chiu,et al.  Erasure code replication revisited , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..

[53]  Jun Wang,et al.  TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.

[54]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[55]  Lada A. Adamic,et al.  The role of social networks in information diffusion , 2012, WWW.

[56]  Daniel Z. Levin,et al.  The Strength of Weak Ties You Can Trust: The Mediating Role of Trust in Effective Knowledge Transfer , 2004, Manag. Sci..

[57]  Jennifer Neville,et al.  Using Transactional Information to Predict Link Strength in Online Social Networks , 2009, ICWSM.

[58]  Hakim Hacid,et al.  A predictive model for the temporal dynamics of information diffusion in online social networks , 2012, WWW.

[59]  Cécile Favre,et al.  Information diffusion in online social networks: a survey , 2013, SGMD.

[60]  Jennifer Neville,et al.  Modeling relationship strength in online social networks , 2010, WWW '10.

[61]  Raúl Gracia Tinedo,et al.  Analysis of data availability in F2F storage systems: When correlations matter , 2012, P2P.