Behavior Research Methods

, Volume 46, Issue 2, pp 430–438 | Cite as

Build your own social network laboratory with Social Lab: A tool for research in social media

Article

Abstract

Social networking has surpassed e-mail and instant messaging as the dominant form of online communication (Meeker, Devitt, & Wu, 2010). Currently, all large social networks are proprietary, making it difficult to impossible for researchers to make changes to such networks for the purpose of study design and access to user-generated data from the networks. To address this issue, the authors have developed and present Social Lab, an Internet-based free and open-source social network software system available from http://www.sociallab.es. Having full availability of navigation and communication data in Social Lab allows researchers to investigate behavior in social media on an individual and group level. Automated artificial users (“bots”) are available to the researcher to simulate and stimulate social networking situations. These bots respond dynamically to situations as they unfold. The bots can easily be configured with scripts and can be used to experimentally manipulate social networking situations in Social Lab. Examples for setting up, configuring, and using Social Lab as a tool for research in social media are provided.

Keywords

Internet-based research Internet science Social media Social engineering Social networking sites Open-source software 

References

  1. Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In G. Danezis & P. Golle (Eds.), Privacy Enhancing Technologies. Lecture Notes in Computer Science, Volume 4258, 2006, pp 36–58. Heidelberg: Springer Berlin. doi:10.1007/11957454_3
  2. Ben-Kiki, O., Evans, C., & Ingerson, B. (2009).Yaml Ain’t Markup Language (YAML)(tm) version 1.2. YAML.org, Tech. Rep., September 2009.Google Scholar
  3. Birnbaum, M. H. (2000). SurveyWiz and FactorWiz: JavaScript Web pages that make HTML forms for research on the Internet. Behavior Research Methods, Instruments, & Computers, 32(2), 339–346.CrossRefGoogle Scholar
  4. Buffardi, L. E., & Campbell, W. K. (2008). Narcissism and social networking Web sites. Personality and Social Psychology Bulletin, 34(10), 1303–1314.PubMedCrossRefGoogle Scholar
  5. Cialdini, R. B. (2001). Influence: Science and practice (Vol. 4). Boston, MA: Allyn and Bacon.Google Scholar
  6. Cranor, L., Hong, J., & Reiter, M. (2007). Teaching usable privacy and security: A guide for instructors. Retrieved May 1, 2013, from: http://cups.cs.cmu.edu/course-guide/
  7. D'Andrea, A., Ferri, F., & Grifoni, P. (2010). An overview of methods for Virtual Social Network Analysis. In A. Abraham, A.-E. Hassanien, & V. Snasel (Eds.), Computational Social Network Analysis: trends, tools and research advances (pp. 3–26). Berlin, Germany: Springer. doi:10.1007/978-1-84882-229-0 CrossRefGoogle Scholar
  8. Edbrooke, O., & Ambrose, M. L. (2012). Teaching privacy in the twenty-first century. Social Education, 76(4), 217–220.Google Scholar
  9. Fagerlund-Savisaari, A. (2010). Thanks for adding me! : The complexity of Facebook friendships and public privacy. Case: Finnish politicians. Tampereenammattikorkeakoulu. Retrieved May 1, 2013, from: http://publications.theseus.fi/bitstream/handle/10024/14558/Fagerlund-Savisaari_Anna.pdf
  10. Fischer-Hübner, S. & Lindskog, H. (2001).Teaching privacy-enhancing technologies.In Proceedings of the IFIP WG 11.8 2nd World Conference on Information Security Education. Perth, Australia, pp. 1–17.Google Scholar
  11. Göritz, A. S., & Birnbaum, M. H. (2005). Generic HTML Form Processor: A versatile PHP Script to save Web-collected data into a MySQL database. Behavior Research Methods, 37(4), 703–710.PubMedCrossRefGoogle Scholar
  12. Hauben, M., Hauben, R., & Truscott, T. (1997). Netizens: On the history and impact of Usenet and the Internet. Wiley-IEEE Computer Society Pr; 1 edition (April 27, 1997).Google Scholar
  13. Humphreys, L. M., Krishnamurthy, B., & Gill, P. (2010). How much is too much? Privacy issues on Twitter. Paper presented at the 60th Annual Conference ofthe International Communication Association. Singapore.Google Scholar
  14. Johnson, M. (2011a). From passport to MyWorld: Media awareness network extends digital literacy skills to secondary students. MediaSmarts, Media Awareness Network. Retrieved May 1, 2013, from: http://mediasmarts.ca/blog/passport-myworld-media-awareness-network-extends-digital-literacy-skills-secondary-students
  15. Johnson, M. (2011b). Privacy pirates: An interactive unit on online privacy. MediaSmarts, Media Awareness Network. Retrieved May 1, 2013, from: http://mediasmarts.ca/blog/privacy-pirates-interactive-unit-online-privacy
  16. Johnson, M. (2011c). Winning the Cyber security game. MediaSmarts, Media Awareness Network. Retrieved May 1, 2013, from: http://cira.ca/assets/Documents/Publications/WinningCyberSecurityGameLesson.pdf
  17. Meeker, M., Devitt, S. & Wu, L. (2010, June 7), Internet trends, Morgan Stanley Research. Retrieved May 1, 2013, from: http://www.slideshare.net/CMSummit/ms-internet-trends060710final
  18. Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P., & Bhattacharjee, B. (2007). Measurement and analysis of online social networks. Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, IMC ’07, 29–42, New York, NY, USA.Google Scholar
  19. Nuñez, J., Garaizar, P. & Reips, U.-D. (2013). Online workshop on privacy using Social Lab, a social engineering wargame. 7th International Technology, Education and Development Conference, INTED 2013, 4th-6th March, Valencia (Spain).Google Scholar
  20. Ovaska, S. & Räihä, K.-J. (2009). Teaching privacy with Ubicomp scenarios in HCI classes. Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group. OZCHI 2009, 411, pp. 105–112. ACM, New York. 2009.Google Scholar
  21. Reips, U.-D. (2001). The Web Experimental Psychology Lab: Five years of data collection on the Internet. Behavior Research Methods, Instruments, and Computers, 33, 201–211.Google Scholar
  22. Reips, U.-D., & Birnbaum, M. H. (2011). Behavioral research and data collection via the Internet. In K.-P. L. Vu & R. W. Proctor (Eds.), The handbook of human factors in Web design (2nd ed., pp. 563–585). Mahwah, New Jersey: Erlbaum.CrossRefGoogle Scholar
  23. Reips, U.-D., & Buffardi, L. (2012). Studying migrants with the help of the Internet: Methods from psychology. Journal of Ethnic and Migration Studies, 38(9), 1405–1424. doi:10.1080/1369183X.2012.698208 CrossRefGoogle Scholar
  24. Reips, U.-D., & Funke, F. (2008). Interval level measurement with visual analogue scales in Internet-based research: VAS Generator. Behavior Research Methods, 40, 699–704.PubMedCrossRefGoogle Scholar
  25. Reips, U.-D., & Garaizar, P. (2011). Mining Twitter: Microblogging as a source for psychological wisdom of the crowds. Behavior Research Methods, 43, 635–642.PubMedCrossRefGoogle Scholar
  26. Reips, U.-D., & Krantz, J. H. (2010). Conducting true experiments on the Web. In S. Gosling & J. Johnson (Eds.), Advanced methods for conducting online behavioral research (pp. 193–216). Washington, DC: American Psychological Association.CrossRefGoogle Scholar
  27. Reips, U.-D., & Lengler, R. (2005). The Web Experiment List: A Web service for the recruitment of participants and archiving of Internet-based experiments. Behavior Research Methods, 37, 287–292Google Scholar
  28. Reips, U.-D., & Neuhaus, C. (2002). WEXTOR: A Web-based tool for generating and visualizing experimental designs and procedures. Behavior Research Methods, Instruments, and Computers, 34, 234–240.Google Scholar
  29. Reips, U.-D., & Stieger, S. (2004). Scientific LogAnalyzer: A Web-based tool for analyses of server log files in psychological research. Behavior Research Methods, 36(2), 304–311.CrossRefGoogle Scholar
  30. Stieger, S., & Reips, U.-D. (2008). Dynamic Interviewing Program (DIP): Automatic online interviews via the instant messenger ICQ. CyberPsychology and Behavior, 11, 201–207.PubMedCrossRefGoogle Scholar
  31. Stieger, S., & Reips, U.-D. (2010). What are participants doing while filling in an online questionnaire: A paradata collection tool and an empirical study. Computers in Human Behavior, 26, 1488–1495.CrossRefGoogle Scholar
  32. Watters, A. (2011). How recent changes to Twitter's terms of service might hurt academic research. Read Write, March 3rd, 2011. Retrieved May 1, 2013, from: http://readwrite.com/2011/03/03/how_recent_changes_to_twitters_terms_of_service_mi
  33. Whitty, M. T., Buchanan, T., Joinson, A. N., & Meredith, A. (2012). Not all lies are spontaneous: an examination of deception across different modes of communication. Journal of the American Society for Information Science and Technology, 63(1), 208–216.CrossRefGoogle Scholar

Copyright information

© Psychonomic Society, Inc. 2013

Authors and Affiliations

  1. 1.Deusto Institute of Technology (DeustoTech)Universidad de DeustoBilbaoSpain
  2. 2.Ikerbasque, Basque Foundation for ScienceBilbaoSpain

Personalised recommendations