Skip to main content

Analyzing Tie-Strength across Different Media

  • Conference paper
On the Move to Meaningful Internet Systems: OTM 2012 Workshops (OTM 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7567))

Abstract

Human interactions are becoming more and more important in computer systems. The interactions can be classified according to predefined rules, based on the assumption that relations between humans differ greatly. The tie-strength notion is used throughout the social sciences literature in order to denote this classification. The present paper researches how the tie-strength between two persons can be computed automatically by applying structural data from different sources, e.g. email, shared workspaces. This data can provide a virtual copy of the ego-centric network of a user and therefore be utilized for social intelligent computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gilbert, E., Karahalios, K.: Predicting tie-strength with social media. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems (CHI 2009), pp. 211–220. ACM, New York (2009)

    Google Scholar 

  2. Gilbert, E.: Predicting tie-strength in a new medium. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (CSCW 2012), pp. 1047–1056. ACM, New York (2012)

    Chapter  Google Scholar 

  3. Bird, C., Gourley, A., Devanbu, P.T., Gertz, M., Swaminathan, A.: Mining email social networks. In: Proceedings of the International Workshop on Mining Software Repositories, Shanghai (2006)

    Google Scholar 

  4. Culotta, A., Bekkerman, R., McCallum, A.: Extracting Social Networks and Contact Information from Email and the Web. In: Proceedings of CEAS-1 (2004)

    Google Scholar 

  5. Resig, J., Dawara, S., Homan, C.M., Teredesai, A.: Extracting social networks from instant messaging populations. In: Proc. of the 7th ACM SIGKDD Workshop on Link KDD (2004)

    Google Scholar 

  6. Nasirifard, P., Peristeras, V., Hayes, C., Decker, S.: Extracting and Utilizing Social Networks from Log Files of Shared Workspaces. In: Camarinha-Matos, L.M., Paraskakis, I., Afsarmanesh, H. (eds.) PRO-VE 2009. IFIP AICT, vol. 307, pp. 643–650. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  7. Granovetter, M.: The Strength of Weak Ties. American Journal of Sociology 78(6), 1360–1380 (1973)

    Article  Google Scholar 

  8. Feld, S.: The Focused Organization of Social Ties. American Journal of Sociology 86(5), 1015–1035 (1981)

    Article  Google Scholar 

  9. Marsden, P.V., Campbell, K.E.: Measuring Tie-strength. Social Forces 63(2), 482–501 (1984)

    Google Scholar 

  10. Cummings, J., Kiesler, S.: Who Works with Whom? Collaborative Tie-strength in Distributed Interdisciplinary Projects. In: Proceedings of the 3rd International e-Social Science Conference, Ann Arbor, Michigan, October 7-9 (2007)

    Google Scholar 

  11. Burt, R.: Structural Holes: The Social Structure of Competition. Harvard University Press (1995)

    Google Scholar 

  12. Roth, M., Flysher, G., Matias, Y., Leichtberg, A., Merom, R.: Suggesting Friends Using the Implicit Social Graph Categories and Subject Descriptors. Human Factors 371(9620), 233–241 (2010)

    Google Scholar 

  13. Ting, I.-H., Wu, H.-J., Chang, P.-S.: Analyzing Multi-source Social Data for Extracting and Mining Social Networks. In: 2009 International Conference on Computational Science and Engineering, vol. 4, pp. 815–820. IEEE (2009)

    Google Scholar 

  14. Haythornthwaite, C.: The strength and the impact of new media. In: Proceedings of the 34th Annual Hawaii International Conference on System Sciences, January 3-6, p. 10 (2001)

    Google Scholar 

  15. Hanneman, R.A., Riddle, M.: Introduction to Social Network Methods. Network, University of California, vol. 46, pp. 2890–2896 (2005)

    Google Scholar 

  16. Granovetter, M.: The Strength of Weak Ties: A Network Theory Revisited. In: Marsden, P.V., Lin, N. (eds.) Sociological Theory, vol. 1, pp. 201–233. John Wiley & Sons (1983)

    Google Scholar 

  17. Appelt, W.: WWW Based Collaboration with the BSCW System. In: Bartosek, M., Tel, G., Pavelka, J. (eds.) SOFSEM 1999. LNCS, vol. 1725, p. 66. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  18. Erickson, T., Smith, D.N., Kellogg, W.A., Laff, M.R., Richards, J.T., Bradner, E.: Socially translucent systems: Social proxies, persistent conversation and the design of ’Babble.’ In: Human Factors in Computing Systems: The Proceedings of CHI 1999. ACM Press (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeners, N., Nicolaescu, P., Prinz, W. (2012). Analyzing Tie-Strength across Different Media. In: Herrero, P., Panetto, H., Meersman, R., Dillon, T. (eds) On the Move to Meaningful Internet Systems: OTM 2012 Workshops. OTM 2012. Lecture Notes in Computer Science, vol 7567. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33618-8_74

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33618-8_74

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33617-1

  • Online ISBN: 978-3-642-33618-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics