Welcome!

Agile Computing Authors: Roger Strukhoff, Elizabeth White, Peter Silva, Dana Gardner, Craig Lowell

Related Topics: Agile Computing

Agile Computing: Blog Feed Post

Karrie Karahalios: Strong and Weak Ties in Social Media

She says that strong ties can be love or hate, although we tend to assume strong ties are positive

Karrie Karahalios is giving a Berkman lunchtime talk entitled “Text and Tie Strength.” Karrie is a Berkman Fellow from the Univ. of Illinois.

NOTE: Live-blogging. Getting things wrong. Missing points. Omitting key information. Introducing artificial choppiness. Over-emphasizing small matters. Paraphrasing badly. Not running a spellpchecker. Mangling other people’s ideas and words. You are warned, people.

 

“What attracts people most is other people,” said William H. Whyte. People want to sit and talk. But what is the equivalent of a seat in a virtual space. Her group studies visualizations of group interaction. She shows examples, including how voting changes interactions, and how conversations cluster around topics.

Karrie grew up in a small town in Greece. Every Sunday her father would call from America. The call would come to the one phone, which was in a tavern. The people around expected the call and would participate. People use communication media differently in rural and urban areas, she says. E.g., rural communities used to like party lines; it was like a sub-net. Urban folks didn’t and the telephone companies moved to individual lines.

Her group sampled communication usage in rural and urban communities. They had five hypotheses. Rural people would have networks with:

fewer friends and comments

more women

more private profiles

friends are closer geographically

preference for strong ties over weak ties

The results showed that all but the last were true. In part this is because it’s hard to quantify strong and weak ties.

She suggests: Maybe there are two MySpaces: Rural and urban.

To understand weak vs. strong ties, her group explored Facebook. It’s quite binary: someone is either a friend or a stranger. The dog breeder who you met once has the same presence in your FB network as your husband.

Tie strength was invented by Mark Granovetter in the 1970s, in the book Getting a Job. Karrie says: “Strong ties are the people you really trust.” They help people through difficult times. And if a strong tie is depressed, you might get depressed also. “Weak ties are merely acquaintances.” Granovetter pointed out the utility of weak ties in “The Strength of Weak Ties.”

Her group looked at FB and wondered how to map FB parameters to tie strength. They set up a set of questions with continua, e.g., “How strong is your relationship with this person.” They assessed 2,184 friendships, from 35 university students and staff, along 70 parameters. E.g., friend-initiated wall posts, wall words exchanged, friend’s status updates, inbox intimacy words, together in photos, age differences, political differences, mutual friends, groups in common, links exchange by wall, applications in common, positive and negative emotional words, and days since first communication.

Her model had seven elements of tie strength: structure, emotional support, services, social distance, duration, intensity, intimacy. Her findings showed the relative importance of each of these (which I’ve listed in order, from least to most). The most predictive FB element was days since first communication. This may be because the first people you first connect with are the ones you are most tied to, although you may then not use FB for much communication with that person.

Karrie finds it quite interesting when her model doesn’t work. E.g., “This friend is an old ex” who was friended when they first began. She says that strong ties can be love or hate, although we tend to assume strong ties are positive; her model doesn’t include negative strong ties. Also, there are times when someone else’s account is used as a proxy for two others to communicate, e.g., neighbors who are feuding and only communicate through a three year old child’s FB account; Karrie’s model does not account for that.

How might this applied? Suppose you could organize your photos so your strong ties saw one set and your weak ties saw another? Trying to do this by hand is a nightmare.

They did this work in 2008. Then they wondered whether it applied to Twitter. The created wemeddle.com where you can see the people you follow on Twitter. It clusters them by the strength time. Photo colorization and size indicate strength. Karrie says she’s been surprised to find that she’s more interested in what her weak ties tweet.

Her group is studying the quantifiable data (e.g., server logs) but will also interview users.

Q: Your model users linear regression on Facebook?
A: Yes.

Q: How about a geo-map visualization?
Ethanz: Someone recently did this sort of thing for Facebook. There are areas with cross-national friendships and some without many.

Karrie wonders if there is a single model for strong and weak ties that applies to all social media.

Judith Donath adds that following links is a strong signal of a strong tie, which is information that the WeMeddle client could start tracking.

Karrie: In FB, we took advantage of reciprocity as an indicator of tie strength, but reciprocity for Twitter doesn’t work.

Ethanz: Strong vs. weak is so murky. WeMeddle is a very nice provocation. Also: LiveJournal gives you valence, as opposed to FB that only lets you friend or not friend. At FB, every relationship is symmetrical. Twitter is more like celebrity: once you have over a few thousand people, you’re broadcasting. It’d be interesting to look at tech that enables a strong-weak tie continuum.

Karrie: There’s lots of lit on info flow, but not on how the strength of ties influences how you send info out across the network.

Judith: We’re all fooled by the asymmetry of Twitter, which makes for a bizarre set of ties. WeMeddle and your model might help us make sense of it.

Donnie Dong: Could WeMeddle combine FB and Twitter?
A: Yes, it’s possible. People would have to put in both logins.
Donnie: Twitter and FB are blocked in China. It’d be interesting to look at people who communities inside or outside the Wall.

Q: Have you looked at email? And have you looked at the connections among people twittering about disasters?
A: We haven’t looked at either of those things. Disaster relief would be fascinating to look at.
Ethan: There’s a report that during the Iranian uprising, there were only 60 Iranians tweeting, and the rest were Americans retweeting.

Q: Can you track how people gain trust, to move from outer circle to inner circle?
A: The trust problem is really hard. Trust with text — the literature hasn’t been very complete. With 140 chars you don’t get a lot of queues. On the other hand, looking at reputation systems might get you somewhere. I wish I had a better answer for you…

Q: [me] Doesn’t this suggest that strong and weak ties is too much of a polarity for the Web?
A: It suggests that trust doesn’t map to strong and weak. There may be several types of strong and weak ties.

Judith: Granovetter was really interested in homogeneous and heterogeneous ties.

Ethanz: Maybe look at John Kelly’s work on how blogs link to third parties. Look to see what everyone links to. You’ve got all the data, but if you grab the links people are linking to, you can imagine another way of clustering people.

Karrie: There’s lots of work recently about how information gets dispersed. E.g., to spread info quickly it’s better to have a network of people who believe things easily than having one large influencer. Also, it’d be very interesting to map people by complementarity, not just similarity. Overall, I’m really interested in how these ties evolve over time.

Wendy Seltzer: You could look at contextual work (a la Nissanbaum). E.g., do people name their groups at WeMeddle the same way, and how do people move people in and out of groups.
A: There’s a set of privacy questions. Suppose people publish the list of their inner circle. Why aren’t I on it? I don’t want to destroy any relationships with this work. What attracts people the most is other people.

More Stories By David Weinberger

David is the author of JOHO the blog (www.hyperorg.com/blogger). He is an independent marketing consultant and a frequent speaker at various conferences. "All I can promise is that I will be honest with you and never write something I don't believe in because someone is paying me as part of a relationship you don't know about. Put differently: All I'll hide are the irrelevancies."

@ThingsExpo Stories
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abil...
With so much going on in this space you could be forgiven for thinking you were always working with yesterday’s technologies. So much change, so quickly. What do you do if you have to build a solution from the ground up that is expected to live in the field for at least 5-10 years? This is the challenge we faced when we looked to refresh our existing 10-year-old custom hardware stack to measure the fullness of trash cans and compactors.
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market. In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions wi...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Is the ongoing quest for agility in the data center forcing you to evaluate how to be a part of infrastructure automation efforts? As organizations evolve toward bimodal IT operations, they are embracing new service delivery models and leveraging virtualization to increase infrastructure agility. Therefore, the network must evolve in parallel to become equally agile. Read this essential piece of Gartner research for recommendations on achieving greater agility.
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
SYS-CON Events announced today Telecom Reseller has been named “Media Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Pulzze Systems was happy to participate in such a premier event and thankful to be receiving the winning investment and global network support from G-Startup Worldwide. It is an exciting time for Pulzze to showcase the effectiveness of innovative technologies and enable them to make the world smarter and better. The reputable contest is held to identify promising startups around the globe that are assured to change the world through their innovative products and disruptive technologies. There w...
Akana has announced the availability of version 8 of its API Management solution. The Akana Platform provides an end-to-end API Management solution for designing, implementing, securing, managing, monitoring, and publishing APIs. It is available as a SaaS platform, on-premises, and as a hybrid deployment. Version 8 introduces a lot of new functionality, all aimed at offering customers the richest API Management capabilities in a way that is easier than ever for API and app developers to use.
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...