communication, but have proved vulnerable to
unwanted machine-to-human communication.
Forbidding automated use is not the solution.
Twitter’s opening up of their API to the public has
resulted in some useful and entertaining twittering
machines, and is likely to stimulate the development
of positive new Twitter uses.
The solution is rather to create technical limits to
the automated use of the system so as to allow non-
automated use to flourish. This may be done by
increasing the cost (in money, time or human effort)
of performing particular automated behaviours. The
behaviours to target are ones that decrease the
usefulness of the system for non-automated users,
without being essential for legitimate marketing that
may provide revenue for the information system.
The suggestions in Section 5 propose limits of this
type.
Another observation is that to ensure that
marketers do not make a nuisance of themselves in a
social information network, it is not sufficient that
marketing messages are opt-in only. For example,
consider Twitter spammers that only send spam to
their followees, using DMs. They only spam users
who have opted to follow one of their accounts.
However, such spammers an incentive to catch the
attention of users and try to persuade them to opt in,
for example by following many users, publishing
automated “reply” tweets, or abusing trend words.
This attention-catching behaviour can itself be an
annoyance, even to users who never opt in.
Designers of social information systems with opt-in
marketing should try to ensure that it is not easy for
marketers to use automation to do a large amount of
attention-catching at a small (or zero) cost.
Access control mechanisms may help to address
these problems for information systems that are not
open to the public. They are less useful for a public
system such as Twitter, although it could be argued
that some of the limits on Twitter use suggested in
Section 5 are access control rules for particular
Twitter capabilities. Content validation may also
help protect against some kinds of automated
misbehaviour. For example, if it is possible to have a
service within a social information system that could
check that shortened URLs published in the system
do not lead to known phishing or malware-spreading
sites, this could be rather useful.
ACKNOWLEDGEMENTS
Thanks to Martin Arlitt and Phillippa Gill for their
assitance, and to the New York MOMA for their
permission to use the Klee picture in my
presentation.
REFERENCES
BBC, 2009. BBC Newsnight television interview with Ev
Harris, 5 August 2009.
Brooks, D. (ed), 2009, Twitter marketing tips, Emereo Pty
Ltd.
Cheng, A., Evans, M., 2009. Inside Twitter: an in-depth
look inside the Twitter world. Sysomos white paper,
June 2009. http://www.sysomos.com/insidetwitter/
Cosoi, A.C., Cosoi, M., 2009. A fractal approach to social
network spam detection. In VB2009, Virus Bulletin
Conference. Virus Bulletin Ltd.
Heil, B., Piskorski, M., 2009. New Twitter Research: Men
follow men and nobody tweets. Blog posting, 1 June
2009.
http://blogs.harvardbusiness.org/cs/2009/06/new_twitt
er_research_men_follo.html
Huberman, B., Romero, D. M., Wu, F., 2009. Social
networks that matter: Twitter under the microscope.
First Monday 14 (1-5), January 2009.
Java, A., Song, X., Finin, T., Tseng, B., 2007. Why we
Twitter: understanding microblogging usage and
communities. In Joint 9
th
WEBKDD and SNA-KDD
workshop. ACM Press.
Klee, P., 1922. The Twittering Machine [Die Zwitscher-
Maschine], in the collection of the Museum of Modern
Art, New York, http://www.moma.org . Digital image:
http://www.moma.org/explore/collection/provenance/i
tems/564.39.html
Krishnamurthy, B., Gill, P., Arlitt, M., 2008. A few chirps
about Twitter. In 1
st
Workshop on Online Social
Networks. ACM Press.
Mackey, J., 2009. The mystery behind FOLLOW and
UNFOLLOW on Twitter revealed. Open Press Wire
article, 8 March 2009,
http://openpresswire.com/internet/the-mystery-behind-
follow-and-unfollow-on-twitter-revealed/
Metablocks.com, 2009. Beware of Twitter spam – an
overview and guide. Blog posting, 29 June 2009.
http://www.metablocks.com/blog/2009/06/29/beware-
of-twitter-spam-an-overview-and-guide/
Poland, S., 2007. First Twitter bots launched: sports
teams, weather, stock quotes. Blog posting, 4 April
2007. http://blog.stevepoland.com/first-twitter-bots-
launched-sports-teams-weather-stock-quotes/
Solis, B., 2009. Revealing the People Defining Social
Networks. Blog posting on PR 2.0, 1 October 2009.
http://www.briansolis.com/2009/10/revealing-the-
people-defining-social-networks/
Smith, J., Linares, J., 2009. Dominate your market with
Twitter, Infinite Ideas Ltd.
Zarella, D., 2009. State of the Twittersphere, June 2009.
Hubspot.com white paper,
http://blog.hubspot.com/Portals/249/sotwitter09.pdf
WEBIST 2010 - 6th International Conference on Web Information Systems and Technologies
304