Skip to main content
Log in

Lurking in social networks: topology-based analysis and ranking methods

  • Original Article
  • Published:
Social Network Analysis and Mining Aims and scope Submit manuscript

Abstract

The massive presence of silent members in online communities, the so-called lurkers, has long attracted the attention of researchers in social science, cognitive psychology, and computer–human interaction. However, the study of lurking phenomena represents an unexplored opportunity of research in data mining, information retrieval and related fields. In this paper, we take a first step towards the formal specification and analysis of lurking in social networks. We address the new problem of lurker ranking and propose the first centrality methods specifically conceived for ranking lurkers in social networks. Our approach utilizes only the network topology without probing into text contents or user relationships related to media. Using Twitter, Flickr, FriendFeed and GooglePlus as cases in point, our methods’ performance was evaluated against data-driven rankings as well as existing centrality methods, including the classic PageRank and alpha-centrality. Empirical evidence has shown the significance of our lurker ranking approach, and its uniqueness in effectively identifying and ranking lurkers in an online social network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. Experiments were carried out on an Intel Core i7-3960X CPU @ 3.30GHz, 64GB RAM machine.

  2. Inferring and modeling trust in OSNs is a challenging topic per se: more refined alternatives to our entropy-based inference of trust can certainly be found.

References

  • Abdi H (2007) The kendall rank correlation coefficient. In: Salkind N (ed) Encyclopedia of measurement and statistics. SAGE Publications, Thousand Oaks, CA

  • Adali S (2013) Modeling trust context in networks. Springer, Springer Briefs in Computer Science

    Book  Google Scholar 

  • Adali S, Escriva R, Goldberg MK, Hayvanovych M, Magdon-Ismail, M, Szymanski BK, Wallace WA, Williams GT (2010) Measuring behavioral trust in social networks. In: Proc. IEEE Int. Conf. on intelligence and security informatics, pp 150–152

  • Ahn YY, Han S, Kwak H, Moon SB, Jeong H (2007) Analysis of topological characteristics of huge online social networking services. In: Proc. ACM Conf. on world wide web (WWW), pp 835–844

  • Anand S, Chandramouli R, Subbalakshmi KP, Venkataraman M (2013) Altruism in social networks: good guys do finish first. Soc Netw Analys Min 3(2):167–177

    Article  Google Scholar 

  • Ardichvili A (2008) Learning and knowledge sharing in virtual communities of practice: motivators, barriers, and enablers. Adv Dev Hum Resour 10:541–554

    Article  Google Scholar 

  • Bakhshandeh R, Samadi M, Azimifar Z, Schaeffer J (2011) Degrees of separation in social networks. In: Proc. Symp. on Combinatorial Search (SOCS), pp 18–23

  • Bakshy E, Hofman JM, Mason WA, Watts DJ (2011) Everyone’s an influencer: quantifying influence on Twitter. In: Proc. ACM Conf. on web search and web data mining (WSDM), pp 65–74

  • Benevenuto F, Rodrigues T, Cha M, Almeida VAF (2009) Characterizing user behavior in online social networks. In: Proc. ACM SIGCOMM Conf. on internet measurement (IMC), pp 49–62

  • Bonacich P, Lloyd P (2001) Eigenvector-like measures of centrality for asymmetric relations. Soc Netw 23:191–201

    Article  Google Scholar 

  • Brin S, Page L (1998) The anatomy of a large-scale hypertextual Web search engine. Comput Netw ISDN Syst 30(1–7):107–117

    Article  Google Scholar 

  • Buckley C, Voorhees EM (2004) Retrieval evaluation with incomplete information. In: Proc. ACM SIGIR Conf. on research and development in information retrieval (SIGIR), pp 25–32

  • Budalakoti S, Bekkerman R (2012) Bimodal invitation-navigation fair bets model for authority identification in a social network. In: Proc. ACM Conf. on World Wide Web (WWW), pp 709–718

  • Celli F, Lascio FMLD, Magnani M, Pacelli B, Rossi L (2010) Social network data and practices: the case of Friendfeed. In: Proc. Int. Conf. on social computing, behavioral modeling, and prediction (SBP), pp 346–353

  • Cha M, Haddadi H, Benevenuto F, Gummadi PK (2010) Measuring user influence in twitter: the million follower fallacy. In: Proc. AAAI Conf. on weblogs and social media (ICWSM)

  • Chen FC, Chang HM (2011) Do lurking learners contribute less?: a knowledge co-construction perspective. In: Proc. Conf. on communities and technologies (C&T), pp 169–178

  • Chun H, Kwak H, Eom YH, Ahn YY, Moon SB, Jeong H (2008) Comparison of online social relations in volume vs interaction: a case study of Cyworld. In: Proc. ACM SIGCOMM Conf. on internet measurement (IMC), pp 57–70

  • Cranefield J, Yoong P, Huff SL (2011) Beyond lurking: the invisible follower-feeder in an online community ecosystem. In: Proc. Pacific Asia Conf. on information systems (PACIS), p 50 (2011).

  • Dhungel P, Wu D, Schonhorst B, Ross KW (2008) A measurement study of attacks on BitTorrent leechers. In: Proc. Conf. on peer-to-peer systems (IPTPS) p 7

  • Edelmann N (2013) Reviewing the definitions of “lurkers” and some implications for online research. Cyberpsychol Behav Soc Netw 16(9):645–649

    Article  Google Scholar 

  • Fagin R, Kumar R, Sivakumar D (2003) Comparing Top k Lists. SIAM J Discret Math 17(1):134–160

    Article  MathSciNet  MATH  Google Scholar 

  • Farzan R, DiMicco JM, Brownholtz B (2010) Mobilizing lurkers with a targeted task. In: Proc. AAAI Conf. on weblogs and social media (ICWSM), pp 235–238 (2010).

  • Fazeen M, Dantu R, Guturu P (2011) Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. Soc Netw Anal Min 1(3):241–254

    Article  Google Scholar 

  • Gayo-Avello D (2013) Nepotistic relationships in Twitter and their impact on rank prestige algorithms. Inf Process Manage 49(6):1250–1280

    Article  Google Scholar 

  • Girvan M, Newman MEJ (2002) Community structure in social and biological networks. Proc Natl Acad Sci (PNAS) 99(12):7821–7826

    Article  MathSciNet  MATH  Google Scholar 

  • Granovetter M (1973) The strength of weak ties. Am J Sociol 78(6):1360–1380

    Article  Google Scholar 

  • Gyöngyi Z, Garcia-Molina H, Pedersen JO (2004) Combating web spam with trustrank. In: Proc. Int. Conf. on very large data bases (VLDB), pp 576–587

  • Halfaker A, Keyes O, Taraborelli D (2013) Making peripheral participation legitimate: reader engagement experiments in Wikipedia. In: Proc. ACM Conf. on computer supported cooperative work (CSCW), pp 849–860

  • Jiang J, Wilson C, Wang X, Sha W, Huang P, Dai Y, Zhao BY (2013) Understanding latent interactions in online social networks. ACM Trans. on the Web 7(4), 18:1–18:39

  • Kahnwald N, Khler T (2006) Microlearning in virtual communities of practice? an explorative analysis of changing information behaviour. In: Proc. Microlearning Conf., pp 157–172

  • Kappler KE, de Querol RR (2011) Is there anybody out there? Social media as a new social fetish. In: Proc. ACM web science conf (WebSci)

  • Kollock P, Smith M (1996) Managing the virtual commons: cooperation and conflict in computer communities. computer-mediated communication: linguistic, social, and cross-cultural perspectives pp 109–128

  • Kumar R, Novak J, Tomkins A (2006) Structure and evolution of online social networks. In: Proc. ACM SIGKDD int. conf. on knowledge discovery and data mining (KDD), pp 611–617

  • Kwak H, Lee C, Park H, Moon SB (2010) What is Twitter, a social network or a news media? In: Proc. ACM Conf. on World Wide Web (WWW), pp 591–600

  • Lang J, Wu SF (2013) Social network user lifetime. Social Netw Anal Min3(3):285–297

    Article  Google Scholar 

  • Lave J, Wenger E (1991) Situated learning: legitimate peripheral participation. Cambridge University Press, Cambridge, UK

  • Leskovec J, Horvitz E (2008) Planetary-scale views on a large instant-messaging network. In: Proc. ACM Conf. on world wide web (WWW), pp 915–924

  • Li R, Wang S, Deng H, Wang R, Chang KCC (2012) Towards social user profiling: unified and discriminative influence model for inferring home locations. In: Proc. ACM SIGKDD Int. Conf. on knowledge discovery and data mining (KDD), pp 1023–1031

  • Malliaros FD, Vazirgiannis M (2013) To stay or not to stay: modeling engagement dynamics in social graphs. In: Proc. ACM Conf. on information and knowledge management (CIKM), pp 469–478

  • McAuley JJ, Leskovec J (2012) Learning to discover social circles in ego networks. In: neural information processing systems (NIPS), pp 548–556

  • Meo PD, Ferrara E, Abel F, Aroyo L, Houben GJ (2013) Analyzing user behavior across social sharing environments. ACM transactions on intelligent systems and technology 5(1)

  • Mislove A, Koppula HS, Gummadi KP, Druschel P, Bhattacharjee B (2008) Growth of the flickr social network. In: Proc. ACM SIGCOMM workshop on social networks (WOSN)

  • Mislove A, Marcon M, Gummadi PK, Druschel P, Bhattacharjee B (2007) Measurement and analysis of online social networks. In: Proc. ACM SIGCOMM Conf. on internet measurement (IMC), pp 29–42

  • Muller M (2012) Lurking as personal trait or situational disposition: lurking and contributing in enterprise social media. In: Proc. ACM Conf. on computer supported cooperative work (CSCW), pp 253–256

  • Nonnecke B, Preece JJ (2000) Lurker demographics: counting the silent. In: Proc. ACM Conf. on human factors in computing systems (CHI), pp 73–80

  • Onnela JP, Saramaki J, Hyvonen J, Szabó G, de Menezes MA, Kaski K, Barabási AL, Kertész J (2007) Analysis of a large-scale weighted network of one-to-one human communication. New J. Phys 9(179)

  • Preece JJ, Nonnecke B, Andrews D (2004) The top five reasons for lurking: improving community experiences for everyone. Comput Hum Behav 20(2):201–223

    Article  Google Scholar 

  • Radicchi F, Castellano C, Cecconi F, Loreto V, Parisi D (2004) Defining and identifying communities in networks. Proc Natl Acad Sci (PNAS) 101(9):2658–2663

    Article  Google Scholar 

  • Schneider A, von Krogh G, Jager P (2013) “What’s coming next?” Epistemic curiosity and lurking behavior in online communities. Comput Hum Behav 29:293–303

    Article  Google Scholar 

  • Schneider F, Feldmann A, Krishnamurthy B, Willinger W (2009) Understanding online social network usage from a network perspective. In: Proc. ACM SIGCOMM Conf. on internet measurement (IMC), pp 35–48

  • Soroka V, Rafaeli S (2006) Invisible participants: how cultural capital relates to lurking behavior. In: Proc. ACM Conf. on world wide web (WWW), pp 163–172

  • Tagarelli A, Interdonato R (2013a) Ranking vicarious learners in research collaboration networks. In: Urs S, Na JC, Buchanan G (eds.) Digital libraries: social media and community networks, LNCS, vol. 8279, pp 93–102. Springer International Publishing

  • Tagarelli A, Interdonato R (2013b) “Who’s out there?”: identifying and ranking lurkers in social networks. In: Proc. IEEE/ACM Conf. Advances in social networks analysis and mining (ASONAM), pp 215–222

  • Viswanath B, Mislove A, Cha M, Gummadi PK (2009) On the evolution of user interaction in Facebook. In: Proc. ACM SIGCOMM workshop on social networks (WOSN), pp 37–42

  • Wasserman S, Faust K (1994) Social networks analysis: methods and applications. Cambridge University Press, New York, US, Cambridge, UK

  • Webber W, Moffat A, Zobel J (2010) A similarity measure for indefinite rankings. ACM Trans Inf Syst 28(4):20

    Article  Google Scholar 

  • Wilson C, Sala A, Puttaswamy KPN, Zhao BY (2012) Beyond social graphs: user interactions in online social networks and their implications. ACM Trans Web 6(4):17

    Article  Google Scholar 

  • Xie W, Li C, Zhu F, Lim EP, Gong X (2012) When a friend in Twitter is a friend in life. In: Proc. ACM web science conf. (WebSci), pp 344–347

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrea Tagarelli.

Additional information

An abridged version of this paper appeared in Tagarelli and Interdonato (2013b).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tagarelli, A., Interdonato, R. Lurking in social networks: topology-based analysis and ranking methods. Soc. Netw. Anal. Min. 4, 230 (2014). https://doi.org/10.1007/s13278-014-0230-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13278-014-0230-4

Keywords

Navigation